標題: Titlebook: E-Voting and Identity; Second International Peter Y. A. Ryan,Berry Schoenmakers Conference proceedings 2009 Springer-Verlag Berlin Heidelbe [打印本頁] 作者: GERD847 時間: 2025-3-21 19:21
書目名稱E-Voting and Identity影響因子(影響力)
書目名稱E-Voting and Identity影響因子(影響力)學科排名
書目名稱E-Voting and Identity網(wǎng)絡(luò)公開度
書目名稱E-Voting and Identity網(wǎng)絡(luò)公開度學科排名
書目名稱E-Voting and Identity被引頻次
書目名稱E-Voting and Identity被引頻次學科排名
書目名稱E-Voting and Identity年度引用
書目名稱E-Voting and Identity年度引用學科排名
書目名稱E-Voting and Identity讀者反饋
書目名稱E-Voting and Identity讀者反饋學科排名
作者: Daily-Value 時間: 2025-3-21 23:33
Masked Ballot Voting for Receipt-Free Online Elections,ce Masked Ballot, an online voting scheme that mitigates these attacks while using a more practical assumption: untappable channels are available but only . the election. During the election voters cast ballots over completely public channels without relying on untappable channels, anonymous channel作者: molest 時間: 2025-3-22 01:51 作者: 狂怒 時間: 2025-3-22 07:23 作者: 機構(gòu) 時間: 2025-3-22 12:11 作者: transdermal 時間: 2025-3-22 15:34 作者: transdermal 時間: 2025-3-22 17:07 作者: 支架 時間: 2025-3-22 23:28 作者: AGGER 時間: 2025-3-23 01:58 作者: disrupt 時間: 2025-3-23 06:08 作者: CLAM 時間: 2025-3-23 11:24 作者: BARK 時間: 2025-3-23 15:37
Implications of Graphics on Usability and Accessibility for the Voter,d in detail. The question of whether certain types of graphics would help people with cognitive disabilities vote is then considered in light of research and best practices for usability and accessibility.作者: Crayon 時間: 2025-3-23 18:23 作者: 騷動 時間: 2025-3-23 23:57
A Design of Secure Preferential E-Voting,rithm is exploited not only to count the votes without revealing them but also to adjust the votes when a new round of counting is needed. Moreover, it achieves all the security properties usually desired in e-voting.作者: 枯燥 時間: 2025-3-24 03:26
RIES - Rijnland Internet Election System: A Cursory Study of Published Source Code,ssibly handling a million votes or more. While RIES was more extensively studied to find cryptographic shortcomings, our work shows that more down–to–earth secure design practices can be at least as important, and the aspects need to be examined much sooner than right before an election.作者: 看法等 時間: 2025-3-24 09:19 作者: 忍耐 時間: 2025-3-24 13:07 作者: 窩轉(zhuǎn)脊椎動物 時間: 2025-3-24 15:05
Siloxane-modified epoxy resins,nd coercion via subtle signature attacks during the counting. We introduce a minimum disclosure counting scheme for the alternative vote preferential system. Minimum disclosure provides protection from signature attacks by revealing only the winning candidate.作者: Chameleon 時間: 2025-3-24 19:17 作者: Vulnerary 時間: 2025-3-25 00:52
Treatise on Basic Philosophy: Volume 6he voter’s vote, allows the voter to verify, at the end of the election, that her vote was cast and counted as intended by just performing the match of a few small strings. Moreover, w.r.t. a general code voting system, our solution comes with only a minor change in the voting interaction.作者: cuticle 時間: 2025-3-25 05:04 作者: SPER 時間: 2025-3-25 10:49 作者: Atheroma 時間: 2025-3-25 14:47 作者: Indict 時間: 2025-3-25 16:56
https://doi.org/10.1007/978-3-662-34574-0 proxy re-encryption are not needed. Also, no machine involved in the production of ballots needs to store a secret key. Moreover, unlike the protocol by Xia et al., in our protocol all authorities can be held accountable in case they misbehave in an observable way.作者: Phagocytes 時間: 2025-3-25 20:53
Not-So Hidden Information:,ow that as the number of candidates increases, the adversary’s advantage through the use of contracts decreases. We also consider the use of contracts in a heterogeneous population of voters and for financially constrained adversaries.作者: GRAVE 時間: 2025-3-26 03:33
,Improving and Simplifying a Variant of Prêt à Voter, proxy re-encryption are not needed. Also, no machine involved in the production of ballots needs to store a secret key. Moreover, unlike the protocol by Xia et al., in our protocol all authorities can be held accountable in case they misbehave in an observable way.作者: BLAZE 時間: 2025-3-26 07:31 作者: Amnesty 時間: 2025-3-26 10:34
Minimum Disclosure Counting for the Alternative Vote,nd coercion via subtle signature attacks during the counting. We introduce a minimum disclosure counting scheme for the alternative vote preferential system. Minimum disclosure provides protection from signature attacks by revealing only the winning candidate.作者: amnesia 時間: 2025-3-26 13:44
Reports of China’s Basic Researchd in detail. The question of whether certain types of graphics would help people with cognitive disabilities vote is then considered in light of research and best practices for usability and accessibility.作者: palliative-care 時間: 2025-3-26 18:31 作者: 使出神 時間: 2025-3-27 00:45
https://doi.org/10.1007/BFb0017912rithm is exploited not only to count the votes without revealing them but also to adjust the votes when a new round of counting is needed. Moreover, it achieves all the security properties usually desired in e-voting.作者: 脫水 時間: 2025-3-27 03:46 作者: LOPE 時間: 2025-3-27 07:48
J. L. Kardos,M. P. Dudukovi?,R. Dave introduce concepts for discussing its implications for e-voting beyond the Netherlands. We introduce the term . to denote any physical, digital or social evidence of a voter’s choices in an election. From this perspective, we provide a framework for risk classification as well as an overview of countermeasures against such traces.作者: manifestation 時間: 2025-3-27 12:38 作者: SPECT 時間: 2025-3-27 15:28 作者: 灰姑娘 時間: 2025-3-27 20:04 作者: 挫敗 時間: 2025-3-28 00:33
978-3-642-04134-1Springer-Verlag Berlin Heidelberg 2009作者: 模范 時間: 2025-3-28 03:08
https://doi.org/10.1007/BFb0047943an dictate to a voter, either through duress or by offering payment, that increase the probability of a compliant voter constructing a vote for the adversary’s preferred candidate. Using a representative E2E system, we place the attacks in game-theoretic terms and study the effectiveness of three pr作者: 準則 時間: 2025-3-28 07:36
https://doi.org/10.1007/BFb0008753ce Masked Ballot, an online voting scheme that mitigates these attacks while using a more practical assumption: untappable channels are available but only . the election. During the election voters cast ballots over completely public channels without relying on untappable channels, anonymous channel作者: Inclement 時間: 2025-3-28 12:42 作者: 血友病 時間: 2025-3-28 14:54
Reports of China’s Basic Researche both photographs and party logos that indicate specific candidates or political parties, informational icons such as arrows and alert symbols, and animations or other video. After an overview of the history of graphics on ballots, usability and accessibility issues concerning graphics are discusse作者: blithe 時間: 2025-3-28 19:26 作者: 適宜 時間: 2025-3-28 23:08
Becoming-Grounded: The Cabralian Option,ples. For technological solutions, this translates into security requirements that have to be fulfilled by the operational environment in which the voting takes place. Therefore [26] introduced the concept of providing the technical and organizational implementation of a remote electronic election b作者: 彈藥 時間: 2025-3-29 06:38 作者: Terminal 時間: 2025-3-29 09:14 作者: charisma 時間: 2025-3-29 12:11
https://doi.org/10.1007/BFb0017912 is a very simple solution to preferential e-voting it is vulnerable to a coercion attack. The coercion attack especially attacks preferential e-voting scheme only outputs the election result and does not reveal any vote, so is invulnerable to the attack. Homomorphism of the employed encryption algo作者: Kernel 時間: 2025-3-29 18:31
Epoxy Resins and Composites IIIe code to RIES showed a significant lack of security-awareness among the programmers which – among other things – appears to have left RIES vulnerable to near-trivial attacks. If it had not been for independent studies finding problems, RIES would have been used in the 2008 Water Board elections, po作者: Bravura 時間: 2025-3-29 23:47 作者: 使?jié)M足 時間: 2025-3-30 01:47
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/e/image/300187.jpg作者: 神經(jīng) 時間: 2025-3-30 07:25
The Concept of Electrochemical Double Layer in the Case of Weakly Adsorbed Anionsion of the problem is essential to the correct interpretation of most molecular mechanisms at charged interfaces (electrodes, colloids, etc.). Moreover, it constitutes . a challenging theoretical problem of the statistical mechanics of strong electrolytes. Furthermore, particularly since many of the