標(biāo)題: Titlebook: E-Voting and Identity; 4th International Co James Heather,Steve Schneider,Vanessa Teague Conference proceedings 2013 Springer-Verlag Berlin [打印本頁] 作者: Ford 時間: 2025-3-21 17:54
書目名稱E-Voting and Identity影響因子(影響力)
書目名稱E-Voting and Identity影響因子(影響力)學(xué)科排名
書目名稱E-Voting and Identity網(wǎng)絡(luò)公開度
書目名稱E-Voting and Identity網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱E-Voting and Identity被引頻次
書目名稱E-Voting and Identity被引頻次學(xué)科排名
書目名稱E-Voting and Identity年度引用
書目名稱E-Voting and Identity年度引用學(xué)科排名
書目名稱E-Voting and Identity讀者反饋
書目名稱E-Voting and Identity讀者反饋學(xué)科排名
作者: 心胸狹窄 時間: 2025-3-21 21:19 作者: 混沌 時間: 2025-3-22 03:24 作者: CEDE 時間: 2025-3-22 08:29 作者: Glossy 時間: 2025-3-22 11:53
Formal Model-Based Validation for Tally Systems,of non-isomorphic test cases ., once and for all. Using such a system test suite, any digital election technology (proprietary or open source) can be rigorously evaluated for correctness. Doing so will vastly improve the confidence experts have—and can only improve the level of trust citizens have—i作者: anachronistic 時間: 2025-3-22 13:13
Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs,eration protocol for the encryption scheme underlying their voting scheme. As a second contribution, we decompress their abstract scheme description, identify elementary operations, and count the number of such operations required for mixing and verification. Based on timings for elementary operatio作者: anachronistic 時間: 2025-3-22 19:39
Conference proceedings 2013in Guildford, UK, during July 17-19, 2013. The 12 revised full papers presented were carefully selected from 26 submissions. The papers include a range of works on end-to-end verifiable election systems, verifiably correct complex tallying algorithms, human perceptions of verifiability, formal model作者: 固定某物 時間: 2025-3-23 00:13 作者: ATP861 時間: 2025-3-23 01:50 作者: miracle 時間: 2025-3-23 09:05
on officials, tested in a public test organized by the city in June 2011, and used in its municipal election in November 2011. We are not aware of any other precinct-based end-to-end independently-verifiable election for public office where the protocol enabled participation by voters with visual disabilities.作者: 勉勵 時間: 2025-3-23 10:35 作者: 粘土 時間: 2025-3-23 15:25
Vote Casting in Any Preferred Constituency: A New Voting Channel, any constituency can be constitutionally compliant, while maintaining the current electoral system. We also consider the integration of the new German electronic ID card for voter identification and authentication.作者: 過于平凡 時間: 2025-3-23 21:18
Attacking the Verification Code Mechanism in the Norwegian Internet Voting System,ios appear. We show how an adversary may exploit these scenarios in systems providing vote updating and point out the consequences for the vote integrity in the Norwegian system. We also give a list of possible counter-measures and system enhancements to prevent and detect such attacks.作者: 努力趕上 時間: 2025-3-24 00:29 作者: Glossy 時間: 2025-3-24 03:22
,Prêt à Voter Providing Everlasting Privacy,acy towards the authorities can be achieved by implementing several organisational measures. A legal evaluation of these measures demonstrates that the level of privacy achieved would be acceptable under German law.作者: 生命層 時間: 2025-3-24 08:41
On the Specification and Verification of Voting Schemes,ed model-checking can be used to test whether these criteria are met. As a case study, we then analyse an existing voting scheme for electing the board of trustees for a major international conference and discuss its deficiencies.作者: 葡萄糖 時間: 2025-3-24 11:53
A Formal Model for the Requirement of Verifiability in Electronic Voting by Means of a Bulletin Boaility is a specific security function, which is subject to certification itself. This paper presents a formal security requirements model for the verifiability of electronic voting systems by means of a Bulletin Board that publishes all important communication steps without violating the secrecy of voting.作者: Ascribe 時間: 2025-3-24 18:46
Analysis of an Electronic Boardroom Voting System,ns of this system, exhibiting potential attacks. We then formally model the system in the applied pi-calculus, and prove that two versions ensure both vote correctness (even if the devices are corrupted) and ballot secrecy (assuming the devices are honest).作者: 艱苦地移動 時間: 2025-3-24 19:14 作者: Fallibility 時間: 2025-3-24 23:36 作者: Mere僅僅 時間: 2025-3-25 06:11 作者: 污點 時間: 2025-3-25 11:26
Conference proceedings 2013e of works on end-to-end verifiable election systems, verifiably correct complex tallying algorithms, human perceptions of verifiability, formal models of verifiability and, of course, attacks on systems formerly advertised as verifiable.作者: esoteric 時間: 2025-3-25 15:24 作者: 初次登臺 時間: 2025-3-25 16:39 作者: perimenopause 時間: 2025-3-25 21:58 作者: 歪曲道理 時間: 2025-3-26 01:00 作者: VOC 時間: 2025-3-26 04:44 作者: Chauvinistic 時間: 2025-3-26 09:31 作者: Increment 時間: 2025-3-26 14:18 作者: 故意釣到白楊 時間: 2025-3-26 19:53
On the Specification and Verification of Voting Schemes,ting. We argue that formal methods can and should be used to ensure that such schemes behave as intended and are conform to the desired democratic properties. Specifically, we define two semantic criteria for single transferable vote (STV) schemes, formulated in first-order logic, and show how bound作者: GREG 時間: 2025-3-26 21:26
Formal Model-Based Validation for Tally Systems,ing all past elections and seeing if the new system gives the same answer as an older, perhaps erroneous, system did. This amounts to a few dozen system tests and, typically, few-to-no unit tests. These systems are used today in a dozen countries to determine the outcome of national elections. This 作者: ASTER 時間: 2025-3-27 03:55 作者: Hypomania 時間: 2025-3-27 08:03
Attacking the Verification Code Mechanism in the Norwegian Internet Voting System, their vote has been cast and recorded as intended. For this to work properly, a secure and independent auxiliary channel for transmitting the verification codes to the voters is required. The Norwegian system assumes that SMS satisfies the necessary requirements for such a channel. This paper demon作者: 濕潤 時間: 2025-3-27 11:41 作者: 雜役 時間: 2025-3-27 15:48 作者: 與野獸博斗者 時間: 2025-3-27 18:10 作者: Maximizer 時間: 2025-3-27 23:27
Mental Models of Verifiability in Voting,s work, voters have been found to be confused about the concept of and motivation for verifiability in electronic voting when confronted with it. In order to better communicate verifiability to voters, we identify mental models of verifiability in voting using a questionnaire distributed online in G作者: 協(xié)奏曲 時間: 2025-3-28 04:07
,Prêt à Voter Providing Everlasting Privacy,ymisation process, such that only unconditional hiding commitments and zero knowledge proofs are published for verification, thus ensuring privacy towards the public. This paper presents a security analysis carried out in a collaboration between computer scientists and legal researchers. On the tech作者: prodrome 時間: 2025-3-28 09:54 作者: institute 時間: 2025-3-28 12:57
A Practical Coercion Resistant Voting Scheme Revisited,ks and can be applied in large scale voting scenarios as it has linear time complexity. However, this scheme has two intrinsic drawbacks. As it does not allow revocation of credentials of ineligible voters, voters need to obtain fresh credentials before each new election. Also, authorities could gen作者: 思考才皺眉 時間: 2025-3-28 16:03
James Heather,Steve Schneider,Vanessa TeagueState of the art report.Unique visibility.Fast conference proceedings作者: 泥沼 時間: 2025-3-28 20:25
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/e/image/300185.jpg作者: PAGAN 時間: 2025-3-29 01:26
E-Voting and Identity978-3-642-39185-9Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: RALES 時間: 2025-3-29 07:02
C. H. Li,C. K. Lee,P. K. S. Tam to validate the operation of their platform by utilizing a platform independent feedback: the voting system reaches out to the voter to convince her that the vote was cast as intended. This poses two major problems: first, the system should not learn the actual vote; second, the voter should be abl作者: 魔鬼在游行 時間: 2025-3-29 07:40 作者: TAP 時間: 2025-3-29 13:26 作者: 智力高 時間: 2025-3-29 16:56 作者: SENT 時間: 2025-3-29 21:06 作者: Immunoglobulin 時間: 2025-3-30 01:25
Rekonstruktive Bildungsforschungt functioning. There are two ways to assure the correct functioning of a system. Firstly, before using a system, neutral experts can evaluate and certify the security of its implementation. Secondly, while using the system, its users can verify its outcome by appropriate verification tools. Verifiab