1.
Azameti CY, Asiedu W, Asante G. Analysing the Potential Vulnerabilities in Online Voting Protocols: Homomorphic Encryption Approach. JCRINN [Internet]. 2025 Sep. 1 [cited 2025 Sep. 14];10(2):96-110. Available from: https://jcrinn.com/index.php/jcrinn/article/view/515