Centre for Internet & Society

Did you not find what you were looking for? Try the Advanced Search to refine your search.

Search results 8 items matching your search terms.

Subscribe to an always-updated feed of these search terms

Can EVM vulnerabilities be used to game the Indian election?
At first glance, it may seem like an easy deduction to make; that if the machines used for casting votes are themselves technologically vulnerable, then ... by Karan Saini last modified Jun 05, 2019 03:33 AM — Filed under: , ,
E-Commerce Submission
by Karan Saini last modified Apr 01, 2019 11:54 AM
E-commerce_submission_by_CIS.pdf
by Karan Saini last modified Apr 10, 2019 11:34 AM
Improving the Processes for Disclosing Security Vulnerabilities to Government Entities in India.pdf
by Karan Saini last modified Mar 20, 2019 08:12 AM
The Localisation Gambit.pdf
by Karan Saini last modified May 21, 2019 03:23 PM
Call for submissions: The Surveillance Industry and Human Rights.pdf
by Karan Saini last modified Feb 20, 2019 10:46 AM
Intermediary Liability Rules 2018.pdf
by Karan Saini last modified Feb 07, 2019 07:32 AM
Submission to UN High Level Panel on Digital Co-operation.pdf
by Karan Saini last modified Feb 07, 2019 07:18 AM