How to Detect Malicious Behaviors in a Card-Based Majority Voting Protocol with Three Inputs | IEEE Conference Publication | IEEE Xplore