Return to Article Details Analysing the Potential Vulnerabilities in Online Voting Protocols: Homomorphic Encryption Approach Download Download PDF