First Page | Document Content | |
---|---|---|
Date: 2007-09-27 15:46:01Security Cyberwarfare Voluntary Voting System Guidelines Electronic voting Voting machine Voter-verified paper audit trail Threat Access control Voting system Computer security Election technology Politics | Security Requirements Table of Contents2Add to Reading ListSource URL: votingintegrity.orgDownload Document from Source WebsiteFile Size: 355,07 KBShare Document on Facebook |