派博傳思國際中心

標(biāo)題: Titlebook: E-Voting and Identity; 4th International Co James Heather,Steve Schneider,Vanessa Teague Conference proceedings 2013 Springer-Verlag Berlin [打印本頁]

作者: Ford    時間: 2025-3-21 17:54
書目名稱E-Voting and Identity影響因子(影響力)




書目名稱E-Voting and Identity影響因子(影響力)學(xué)科排名




書目名稱E-Voting and Identity網(wǎng)絡(luò)公開度




書目名稱E-Voting and Identity網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱E-Voting and Identity被引頻次




書目名稱E-Voting and Identity被引頻次學(xué)科排名




書目名稱E-Voting and Identity年度引用




書目名稱E-Voting and Identity年度引用學(xué)科排名




書目名稱E-Voting and Identity讀者反饋




書目名稱E-Voting and Identity讀者反饋學(xué)科排名





作者: 心胸狹窄    時間: 2025-3-21 21:19

作者: 混沌    時間: 2025-3-22 03:24

作者: CEDE    時間: 2025-3-22 08:29

作者: Glossy    時間: 2025-3-22 11:53
Formal Model-Based Validation for Tally Systems,of non-isomorphic test cases ., once and for all. Using such a system test suite, any digital election technology (proprietary or open source) can be rigorously evaluated for correctness. Doing so will vastly improve the confidence experts have—and can only improve the level of trust citizens have—i
作者: anachronistic    時間: 2025-3-22 13:13
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs,eration protocol for the encryption scheme underlying their voting scheme. As a second contribution, we decompress their abstract scheme description, identify elementary operations, and count the number of such operations required for mixing and verification. Based on timings for elementary operatio
作者: anachronistic    時間: 2025-3-22 19:39
Conference proceedings 2013in Guildford, UK, during July 17-19, 2013. The 12 revised full papers presented were carefully selected from 26 submissions. The papers include a range of works on end-to-end verifiable election systems, verifiably correct complex tallying algorithms, human perceptions of verifiability, formal model
作者: 固定某物    時間: 2025-3-23 00:13

作者: ATP861    時間: 2025-3-23 01:50

作者: miracle    時間: 2025-3-23 09:05
on officials, tested in a public test organized by the city in June 2011, and used in its municipal election in November 2011. We are not aware of any other precinct-based end-to-end independently-verifiable election for public office where the protocol enabled participation by voters with visual disabilities.
作者: 勉勵    時間: 2025-3-23 10:35

作者: 粘土    時間: 2025-3-23 15:25
Vote Casting in Any Preferred Constituency: A New Voting Channel, any constituency can be constitutionally compliant, while maintaining the current electoral system. We also consider the integration of the new German electronic ID card for voter identification and authentication.
作者: 過于平凡    時間: 2025-3-23 21:18
Attacking the Verification Code Mechanism in the Norwegian Internet Voting System,ios appear. We show how an adversary may exploit these scenarios in systems providing vote updating and point out the consequences for the vote integrity in the Norwegian system. We also give a list of possible counter-measures and system enhancements to prevent and detect such attacks.
作者: 努力趕上    時間: 2025-3-24 00:29

作者: Glossy    時間: 2025-3-24 03:22
,Prêt à Voter Providing Everlasting Privacy,acy towards the authorities can be achieved by implementing several organisational measures. A legal evaluation of these measures demonstrates that the level of privacy achieved would be acceptable under German law.
作者: 生命層    時間: 2025-3-24 08:41
On the Specification and Verification of Voting Schemes,ed model-checking can be used to test whether these criteria are met. As a case study, we then analyse an existing voting scheme for electing the board of trustees for a major international conference and discuss its deficiencies.
作者: 葡萄糖    時間: 2025-3-24 11:53
A Formal Model for the Requirement of Verifiability in Electronic Voting by Means of a Bulletin Boaility is a specific security function, which is subject to certification itself. This paper presents a formal security requirements model for the verifiability of electronic voting systems by means of a Bulletin Board that publishes all important communication steps without violating the secrecy of voting.
作者: Ascribe    時間: 2025-3-24 18:46
Analysis of an Electronic Boardroom Voting System,ns of this system, exhibiting potential attacks. We then formally model the system in the applied pi-calculus, and prove that two versions ensure both vote correctness (even if the devices are corrupted) and ballot secrecy (assuming the devices are honest).
作者: 艱苦地移動    時間: 2025-3-24 19:14

作者: Fallibility    時間: 2025-3-24 23:36

作者: Mere僅僅    時間: 2025-3-25 06:11

作者: 污點    時間: 2025-3-25 11:26
Conference proceedings 2013e of works on end-to-end verifiable election systems, verifiably correct complex tallying algorithms, human perceptions of verifiability, formal models of verifiability and, of course, attacks on systems formerly advertised as verifiable.
作者: esoteric    時間: 2025-3-25 15:24

作者: 初次登臺    時間: 2025-3-25 16:39

作者: perimenopause    時間: 2025-3-25 21:58

作者: 歪曲道理    時間: 2025-3-26 01:00

作者: VOC    時間: 2025-3-26 04:44

作者: Chauvinistic    時間: 2025-3-26 09:31

作者: Increment    時間: 2025-3-26 14:18

作者: 故意釣到白楊    時間: 2025-3-26 19:53
On the Specification and Verification of Voting Schemes,ting. We argue that formal methods can and should be used to ensure that such schemes behave as intended and are conform to the desired democratic properties. Specifically, we define two semantic criteria for single transferable vote (STV) schemes, formulated in first-order logic, and show how bound
作者: GREG    時間: 2025-3-26 21:26
Formal Model-Based Validation for Tally Systems,ing all past elections and seeing if the new system gives the same answer as an older, perhaps erroneous, system did. This amounts to a few dozen system tests and, typically, few-to-no unit tests. These systems are used today in a dozen countries to determine the outcome of national elections. This
作者: ASTER    時間: 2025-3-27 03:55

作者: Hypomania    時間: 2025-3-27 08:03
Attacking the Verification Code Mechanism in the Norwegian Internet Voting System, their vote has been cast and recorded as intended. For this to work properly, a secure and independent auxiliary channel for transmitting the verification codes to the voters is required. The Norwegian system assumes that SMS satisfies the necessary requirements for such a channel. This paper demon
作者: 濕潤    時間: 2025-3-27 11:41

作者: 雜役    時間: 2025-3-27 15:48

作者: 與野獸博斗者    時間: 2025-3-27 18:10

作者: Maximizer    時間: 2025-3-27 23:27
Mental Models of Verifiability in Voting,s work, voters have been found to be confused about the concept of and motivation for verifiability in electronic voting when confronted with it. In order to better communicate verifiability to voters, we identify mental models of verifiability in voting using a questionnaire distributed online in G
作者: 協(xié)奏曲    時間: 2025-3-28 04:07
,Prêt à Voter Providing Everlasting Privacy,ymisation process, such that only unconditional hiding commitments and zero knowledge proofs are published for verification, thus ensuring privacy towards the public. This paper presents a security analysis carried out in a collaboration between computer scientists and legal researchers. On the tech
作者: prodrome    時間: 2025-3-28 09:54

作者: institute    時間: 2025-3-28 12:57
A Practical Coercion Resistant Voting Scheme Revisited,ks and can be applied in large scale voting scenarios as it has linear time complexity. However, this scheme has two intrinsic drawbacks. As it does not allow revocation of credentials of ineligible voters, voters need to obtain fresh credentials before each new election. Also, authorities could gen
作者: 思考才皺眉    時間: 2025-3-28 16:03
James Heather,Steve Schneider,Vanessa TeagueState of the art report.Unique visibility.Fast conference proceedings
作者: 泥沼    時間: 2025-3-28 20:25
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/e/image/300185.jpg
作者: PAGAN    時間: 2025-3-29 01:26
E-Voting and Identity978-3-642-39185-9Series ISSN 0302-9743 Series E-ISSN 1611-3349
作者: RALES    時間: 2025-3-29 07:02
C. H. Li,C. K. Lee,P. K. S. Tam to validate the operation of their platform by utilizing a platform independent feedback: the voting system reaches out to the voter to convince her that the vote was cast as intended. This poses two major problems: first, the system should not learn the actual vote; second, the voter should be abl
作者: 魔鬼在游行    時間: 2025-3-29 07:40

作者: TAP    時間: 2025-3-29 13:26

作者: 智力高    時間: 2025-3-29 16:56

作者: SENT    時間: 2025-3-29 21:06

作者: Immunoglobulin    時間: 2025-3-30 01:25
Rekonstruktive Bildungsforschungt functioning. There are two ways to assure the correct functioning of a system. Firstly, before using a system, neutral experts can evaluate and certify the security of its implementation. Secondly, while using the system, its users can verify its outcome by appropriate verification tools. Verifiab




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
海丰县| 慈溪市| 濮阳市| 闽侯县| 南汇区| 内乡县| 济宁市| 阿坝县| 孝义市| 紫金县| 湖口县| 普陀区| 长子县| 沁水县| 兰坪| 酉阳| 万州区| 沁阳市| 黔东| 芜湖市| 同心县| 自治县| 泊头市| 清新县| 通渭县| 信丰县| 五河县| 嘉鱼县| 石林| 阜平县| 光山县| 紫阳县| 吉安县| 南安市| 汕头市| 拉萨市| 新竹县| 灵丘县| 永吉县| 浦东新区| 五寨县|