派博傳思國際中心

標題: Titlebook: E-Voting and Identity; Second International Peter Y. A. Ryan,Berry Schoenmakers Conference proceedings 2009 Springer-Verlag Berlin Heidelbe [打印本頁]

作者: GERD847    時間: 2025-3-21 19:21
書目名稱E-Voting and Identity影響因子(影響力)




書目名稱E-Voting and Identity影響因子(影響力)學科排名




書目名稱E-Voting and Identity網(wǎng)絡(luò)公開度




書目名稱E-Voting and Identity網(wǎng)絡(luò)公開度學科排名




書目名稱E-Voting and Identity被引頻次




書目名稱E-Voting and Identity被引頻次學科排名




書目名稱E-Voting and Identity年度引用




書目名稱E-Voting and Identity年度引用學科排名




書目名稱E-Voting and Identity讀者反饋




書目名稱E-Voting and Identity讀者反饋學科排名





作者: Daily-Value    時間: 2025-3-21 23:33
Masked Ballot Voting for Receipt-Free Online Elections,ce Masked Ballot, an online voting scheme that mitigates these attacks while using a more practical assumption: untappable channels are available but only . the election. During the election voters cast ballots over completely public channels without relying on untappable channels, anonymous channel
作者: molest    時間: 2025-3-22 01:51

作者: 狂怒    時間: 2025-3-22 07:23

作者: 機構(gòu)    時間: 2025-3-22 12:11

作者: transdermal    時間: 2025-3-22 15:34

作者: transdermal    時間: 2025-3-22 17:07

作者: 支架    時間: 2025-3-22 23:28

作者: AGGER    時間: 2025-3-23 01:58

作者: disrupt    時間: 2025-3-23 06:08

作者: CLAM    時間: 2025-3-23 11:24

作者: BARK    時間: 2025-3-23 15:37
Implications of Graphics on Usability and Accessibility for the Voter,d in detail. The question of whether certain types of graphics would help people with cognitive disabilities vote is then considered in light of research and best practices for usability and accessibility.
作者: Crayon    時間: 2025-3-23 18:23

作者: 騷動    時間: 2025-3-23 23:57
A Design of Secure Preferential E-Voting,rithm is exploited not only to count the votes without revealing them but also to adjust the votes when a new round of counting is needed. Moreover, it achieves all the security properties usually desired in e-voting.
作者: 枯燥    時間: 2025-3-24 03:26
RIES - Rijnland Internet Election System: A Cursory Study of Published Source Code,ssibly handling a million votes or more. While RIES was more extensively studied to find cryptographic shortcomings, our work shows that more down–to–earth secure design practices can be at least as important, and the aspects need to be examined much sooner than right before an election.
作者: 看法等    時間: 2025-3-24 09:19

作者: 忍耐    時間: 2025-3-24 13:07

作者: 窩轉(zhuǎn)脊椎動物    時間: 2025-3-24 15:05
Siloxane-modified epoxy resins,nd coercion via subtle signature attacks during the counting. We introduce a minimum disclosure counting scheme for the alternative vote preferential system. Minimum disclosure provides protection from signature attacks by revealing only the winning candidate.
作者: Chameleon    時間: 2025-3-24 19:17

作者: Vulnerary    時間: 2025-3-25 00:52
Treatise on Basic Philosophy: Volume 6he voter’s vote, allows the voter to verify, at the end of the election, that her vote was cast and counted as intended by just performing the match of a few small strings. Moreover, w.r.t. a general code voting system, our solution comes with only a minor change in the voting interaction.
作者: cuticle    時間: 2025-3-25 05:04

作者: SPER    時間: 2025-3-25 10:49

作者: Atheroma    時間: 2025-3-25 14:47

作者: Indict    時間: 2025-3-25 16:56
https://doi.org/10.1007/978-3-662-34574-0 proxy re-encryption are not needed. Also, no machine involved in the production of ballots needs to store a secret key. Moreover, unlike the protocol by Xia et al., in our protocol all authorities can be held accountable in case they misbehave in an observable way.
作者: Phagocytes    時間: 2025-3-25 20:53
Not-So Hidden Information:,ow that as the number of candidates increases, the adversary’s advantage through the use of contracts decreases. We also consider the use of contracts in a heterogeneous population of voters and for financially constrained adversaries.
作者: GRAVE    時間: 2025-3-26 03:33
,Improving and Simplifying a Variant of Prêt à Voter, proxy re-encryption are not needed. Also, no machine involved in the production of ballots needs to store a secret key. Moreover, unlike the protocol by Xia et al., in our protocol all authorities can be held accountable in case they misbehave in an observable way.
作者: BLAZE    時間: 2025-3-26 07:31

作者: Amnesty    時間: 2025-3-26 10:34
Minimum Disclosure Counting for the Alternative Vote,nd coercion via subtle signature attacks during the counting. We introduce a minimum disclosure counting scheme for the alternative vote preferential system. Minimum disclosure provides protection from signature attacks by revealing only the winning candidate.
作者: amnesia    時間: 2025-3-26 13:44
Reports of China’s Basic Researchd in detail. The question of whether certain types of graphics would help people with cognitive disabilities vote is then considered in light of research and best practices for usability and accessibility.
作者: palliative-care    時間: 2025-3-26 18:31

作者: 使出神    時間: 2025-3-27 00:45
https://doi.org/10.1007/BFb0017912rithm is exploited not only to count the votes without revealing them but also to adjust the votes when a new round of counting is needed. Moreover, it achieves all the security properties usually desired in e-voting.
作者: 脫水    時間: 2025-3-27 03:46

作者: LOPE    時間: 2025-3-27 07:48
J. L. Kardos,M. P. Dudukovi?,R. Dave introduce concepts for discussing its implications for e-voting beyond the Netherlands. We introduce the term . to denote any physical, digital or social evidence of a voter’s choices in an election. From this perspective, we provide a framework for risk classification as well as an overview of countermeasures against such traces.
作者: manifestation    時間: 2025-3-27 12:38

作者: SPECT    時間: 2025-3-27 15:28

作者: 灰姑娘    時間: 2025-3-27 20:04

作者: 挫敗    時間: 2025-3-28 00:33
978-3-642-04134-1Springer-Verlag Berlin Heidelberg 2009
作者: 模范    時間: 2025-3-28 03:08
https://doi.org/10.1007/BFb0047943an dictate to a voter, either through duress or by offering payment, that increase the probability of a compliant voter constructing a vote for the adversary’s preferred candidate. Using a representative E2E system, we place the attacks in game-theoretic terms and study the effectiveness of three pr
作者: 準則    時間: 2025-3-28 07:36
https://doi.org/10.1007/BFb0008753ce Masked Ballot, an online voting scheme that mitigates these attacks while using a more practical assumption: untappable channels are available but only . the election. During the election voters cast ballots over completely public channels without relying on untappable channels, anonymous channel
作者: Inclement    時間: 2025-3-28 12:42

作者: 血友病    時間: 2025-3-28 14:54
Reports of China’s Basic Researche both photographs and party logos that indicate specific candidates or political parties, informational icons such as arrows and alert symbols, and animations or other video. After an overview of the history of graphics on ballots, usability and accessibility issues concerning graphics are discusse
作者: blithe    時間: 2025-3-28 19:26

作者: 適宜    時間: 2025-3-28 23:08
Becoming-Grounded: The Cabralian Option,ples. For technological solutions, this translates into security requirements that have to be fulfilled by the operational environment in which the voting takes place. Therefore [26] introduced the concept of providing the technical and organizational implementation of a remote electronic election b
作者: 彈藥    時間: 2025-3-29 06:38

作者: Terminal    時間: 2025-3-29 09:14

作者: charisma    時間: 2025-3-29 12:11
https://doi.org/10.1007/BFb0017912 is a very simple solution to preferential e-voting it is vulnerable to a coercion attack. The coercion attack especially attacks preferential e-voting scheme only outputs the election result and does not reveal any vote, so is invulnerable to the attack. Homomorphism of the employed encryption algo
作者: Kernel    時間: 2025-3-29 18:31
Epoxy Resins and Composites IIIe code to RIES showed a significant lack of security-awareness among the programmers which – among other things – appears to have left RIES vulnerable to near-trivial attacks. If it had not been for independent studies finding problems, RIES would have been used in the 2008 Water Board elections, po
作者: Bravura    時間: 2025-3-29 23:47

作者: 使?jié)M足    時間: 2025-3-30 01:47
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/e/image/300187.jpg
作者: 神經(jīng)    時間: 2025-3-30 07:25
The Concept of Electrochemical Double Layer in the Case of Weakly Adsorbed Anionsion of the problem is essential to the correct interpretation of most molecular mechanisms at charged interfaces (electrodes, colloids, etc.). Moreover, it constitutes . a challenging theoretical problem of the statistical mechanics of strong electrolytes. Furthermore, particularly since many of the




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
故城县| 铜鼓县| 龙陵县| 阳原县| 南昌县| 托里县| 德保县| 福清市| 固阳县| 蓝田县| 九龙县| 齐齐哈尔市| 军事| 株洲市| 英吉沙县| 逊克县| 通化市| 清镇市| 韶关市| 高密市| 双鸭山市| 新绛县| 岳池县| 桐柏县| 马鞍山市| 隆化县| 巴中市| 胶州市| 莎车县| 昌邑市| 乃东县| 桦川县| 兰州市| 丹江口市| 桐柏县| 丹阳市| 华宁县| 肇东市| 连云港市| 文安县| 达孜县|