[1]
C. Y. Azameti, W. Asiedu, and G. Asante, “Analysing the Potential Vulnerabilities in Online Voting Protocols: Homomorphic Encryption Approach”,
JCRINN
, vol. 10, no. 2, pp. 96–110, Sep. 2025.