標題: Titlebook: E-Voting and Identity; Third International Aggelos Kiayias,Helger Lipmaa Conference proceedings 2012 Springer-Verlag Berlin Heidelberg 201 [打印本頁] 作者: TOUT 時間: 2025-3-21 18:38
書目名稱E-Voting and Identity影響因子(影響力)
書目名稱E-Voting and Identity影響因子(影響力)學科排名
書目名稱E-Voting and Identity網(wǎng)絡公開度
書目名稱E-Voting and Identity網(wǎng)絡公開度學科排名
書目名稱E-Voting and Identity被引頻次
書目名稱E-Voting and Identity被引頻次學科排名
書目名稱E-Voting and Identity年度引用
書目名稱E-Voting and Identity年度引用學科排名
書目名稱E-Voting and Identity讀者反饋
書目名稱E-Voting and Identity讀者反饋學科排名
作者: 滋養(yǎng) 時間: 2025-3-21 20:43
978-3-642-32746-9Springer-Verlag Berlin Heidelberg 2012作者: 抵押貸款 時間: 2025-3-22 03:18 作者: 氣候 時間: 2025-3-22 05:00 作者: 污點 時間: 2025-3-22 08:50 作者: 充滿人 時間: 2025-3-22 13:37
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/e/image/300186.jpg作者: 充滿人 時間: 2025-3-22 19:26
Entwicklung der chemischen Krystallographiell be used, where so-called return codes allow voters to verify that their ballots will be counted as cast..This paper discusses a slightly simplified version of the cryptographic protocol. The description and analysis of the simplified protocol contains most of the ideas and concepts used to build 作者: gain631 時間: 2025-3-23 01:06 作者: 考古學 時間: 2025-3-23 03:24 作者: Flavouring 時間: 2025-3-23 06:08 作者: anesthesia 時間: 2025-3-23 11:23 作者: IRATE 時間: 2025-3-23 15:08 作者: consent 時間: 2025-3-23 20:03
that her vote is correctly encrypted with a soundness of 1???2., with 20?≤?.?≤?30, just by performing a match of a small string (4-5 characters). Due to its simplicity, verifying the election public data (vote encryptions and tally) in MP3 is 2.6 times faster than with MP2 and the vote encryption cr作者: LIEN 時間: 2025-3-23 22:16 作者: inspiration 時間: 2025-3-24 03:10
https://doi.org/10.1007/978-3-030-61018-0e is correctly recorded. The assistant interacts with the voting system while the voter votes on the machine in the polling booth. We present an independently-verifiable, coercion-resistant protocol based on this model. Unlike all other independently-verifiable protocols, this one is completely pape作者: 巨頭 時間: 2025-3-24 07:33 作者: 凝結劑 時間: 2025-3-24 13:32 作者: 珠寶 時間: 2025-3-24 18:53
strong mathematical requirements. However many practical problems with e-election systems in general cannot be solved by cryptology. In this paper we consider some of these practical problems by examining deficiencies that are common to the many e-election systems currently used in Australia, inclu作者: browbeat 時間: 2025-3-24 22:29 作者: syring 時間: 2025-3-25 00:35
Internet Voting System with Cast as Intended Verificationrification methods can be used to audit this process, so that voters do not need to trust the voting client software. In this paper we present the revision of our initial proposal for the eValg2011 project for an Internet voting protocol providing cast as intended verification functionalities, and evaluate its security.作者: 狂熱文化 時間: 2025-3-25 07:02
Conference proceedings 2012llinn, Estonia, in September 2011. .The 15 revised full papers presented were carefully reviewed and selected from 33 submissions. They are organized in topical sections on Norwegian internet voting, voting systems I and II, prêt à voter and trivitas, and experiences.作者: Statins 時間: 2025-3-25 11:21 作者: 無畏 時間: 2025-3-25 12:03 作者: 根除 時間: 2025-3-25 16:32
https://doi.org/10.1007/978-3-030-61018-0endently-verifiable, coercion-resistant protocol based on this model. Unlike all other independently-verifiable protocols, this one is completely paperless and does not require the voter to perform any tasks outside the polling booth. We provide property definitions, rigorous claims and a description of a prototype.作者: ADAGE 時間: 2025-3-25 21:21
Conference proceedings 2012llinn, Estonia, in September 2011. .The 15 revised full papers presented were carefully reviewed and selected from 33 submissions. They are organized in topical sections on Norwegian internet voting, voting systems I and II, prêt à voter and trivitas, and experiences.作者: Fatten 時間: 2025-3-26 02:09
An Efficient and Highly Sound Voter Verification Technique and Its Implementationto its simplicity, verifying the election public data (vote encryptions and tally) in MP3 is 2.6 times faster than with MP2 and the vote encryption creation on devices with low computational power, e.g. smart cards, is approximately 6 times better than the best of the previous MP specifications (MP1 and MP2).作者: 額外的事 時間: 2025-3-26 06:51 作者: 隱藏 時間: 2025-3-26 09:31
0302-9743 nted were carefully reviewed and selected from 33 submissions. They are organized in topical sections on Norwegian internet voting, voting systems I and II, prêt à voter and trivitas, and experiences.978-3-642-32746-9978-3-642-32747-6Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: 有限 時間: 2025-3-26 15:30
https://doi.org/10.1007/978-3-662-07056-7mere assertions. We show whether at all, how and to which degree these measures are implemented and point out room for enhancements. We also address general challenges of projects which try to reach a high level of transparency for others as lessons learned.作者: Lacunar-Stroke 時間: 2025-3-26 18:10
https://doi.org/10.1007/978-3-642-95242-5 single-winner first-past-the-post (SW-FPTP) and single transferable vote (STV) protocols demonstrate that this approach leads to concise implementations that closely correspond to their legal specification, thereby increasing trust.作者: 叫喊 時間: 2025-3-26 22:00
The Economics of the Countrysidemproves upon the first by offering an informational dispute resolution procedure and a public paper audit trail through the use of self-blanking invisible ink confirmation codes. We then present a security analysis of the improved system.作者: 很像弓] 時間: 2025-3-27 01:41
stem to affect the results of the election?.This paper attempts to tease out some of the possible effects, by analysing ballot data from the 2008 Australian Capital Territory (ACT) Legislative Assembly Election.作者: 熄滅 時間: 2025-3-27 05:48 作者: PAC 時間: 2025-3-27 10:36 作者: Mendicant 時間: 2025-3-27 16:07 作者: seduce 時間: 2025-3-27 21:45 作者: 藕床生厭倦 時間: 2025-3-27 22:33 作者: Pulmonary-Veins 時間: 2025-3-28 02:41
Efficient Vote Authorization in Coercion-Resistant Internet Votingity sets. The size of these anonymity sets serves as an adjustable security parameter, which determines the degree of coercion-resistance. The main advantage of the new protocol is to move computational complexity introduced in recent works from the voter side to the tallying authority side.作者: 嘮叨 時間: 2025-3-28 09:32
Feasibility Analysis of Prêt à Voter for German Federal Elections some remain open for further legal and technical discussions. Thus, a final decision is not yet possible. Aspects analysed are the ballot paper layout, different processes from ballot printing through to the publishing of results, as well as verifiability, and the overall election management.作者: 消極詞匯 時間: 2025-3-28 13:13
Towards Best Practice for E-election Systems systems, and we then make recommendations for improving practice. We argue that best practice guidelines for e-election systems need to be explicitly articulated and should include four key elements: failure-critical engineering, risk assessment, a culture of audit and strong transparency.作者: 一再遛 時間: 2025-3-28 15:31 作者: 有抱負者 時間: 2025-3-28 22:21 作者: 反復拉緊 時間: 2025-3-28 23:38 作者: CUB 時間: 2025-3-29 05:20 作者: 故意 時間: 2025-3-29 08:43 作者: 易于出錯 時間: 2025-3-29 12:46
Trivitas: Voters Directly Verifying Votess, we observe that the association between any credential and its corresponding vote can be made public at the end of the election process, without compromising coercion-resistance. The voter has more intuitive and direct evidence that her intended vote has not been changed and will be counted in th作者: daredevil 時間: 2025-3-29 19:26 作者: Suggestions 時間: 2025-3-29 19:42
Overview of Autonomous Unmanned Systems,s, we observe that the association between any credential and its corresponding vote can be made public at the end of the election process, without compromising coercion-resistance. The voter has more intuitive and direct evidence that her intended vote has not been changed and will be counted in th作者: 不真 時間: 2025-3-30 02:00
The Application of I-Voting for Estonian Parliamentary Elections of 2011作者: Homocystinuria 時間: 2025-3-30 04:47
The Norwegian Internet Voting Protocolll be used, where so-called return codes allow voters to verify that their ballots will be counted as cast..This paper discusses a slightly simplified version of the cryptographic protocol. The description and analysis of the simplified protocol contains most of the ideas and concepts used to build 作者: 模仿 時間: 2025-3-30 11:02
Transparency and Technical Measures to Establish Trust in Norwegian Internet Votingernet elections are scheduled for fall 2011. Notably, transparency is taken as a guideline in the project. This article discusses transparency and other measures the Norwegians apply that are suited to establish profound trust, i.e. trust that grounds on the system’s technical features, rather than 作者: 聰明 時間: 2025-3-30 14:08
Internet Voting System with Cast as Intended Verificationrification methods can be used to audit this process, so that voters do not need to trust the voting client software. In this paper we present the revision of our initial proposal for the eValg2011 project for an Internet voting protocol providing cast as intended verification functionalities, and e作者: 發(fā)出眩目光芒 時間: 2025-3-30 18:46
Linear Logical Voting Protocolsge. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification. In response, we promote linear logic as a high-level language for both specifying and implementing voting protocols. Our linear logical specifications of the作者: IST 時間: 2025-3-30 23:53 作者: evince 時間: 2025-3-31 04:29
The Bug That Made Me President a Browser- and Web-Security Case Study on Helios Votingion website we discovered several small flaws that can have a large security critical impact. An attacker is able to extract sensitive information, manipulate voting results, and modify the displayed information of Helios without any deep technical knowledge or laboratory-like prerequisites. Display