標(biāo)題: Titlebook: E-Voting and Identity; First International Ammar Alkassar,Melanie Volkamer Conference proceedings 2007 Springer-Verlag Berlin Heidelberg 2 [打印本頁] 作者: AMASS 時間: 2025-3-21 16:32
書目名稱E-Voting and Identity影響因子(影響力)
書目名稱E-Voting and Identity影響因子(影響力)學(xué)科排名
書目名稱E-Voting and Identity網(wǎng)絡(luò)公開度
書目名稱E-Voting and Identity網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱E-Voting and Identity被引頻次
書目名稱E-Voting and Identity被引頻次學(xué)科排名
書目名稱E-Voting and Identity年度引用
書目名稱E-Voting and Identity年度引用學(xué)科排名
書目名稱E-Voting and Identity讀者反饋
書目名稱E-Voting and Identity讀者反饋學(xué)科排名
作者: 新義 時間: 2025-3-21 23:01 作者: Hemoptysis 時間: 2025-3-22 03:07 作者: 表臉 時間: 2025-3-22 05:02
https://doi.org/10.1007/978-3-662-34573-3We apply a technique inspired by Scantegrity to Punchscan and Prêt à Voter and show how this results in a mail-in ballot system that is auditable, simple to use and easy to understand.作者: 間接 時間: 2025-3-22 09:13 作者: gastritis 時間: 2025-3-22 15:53
Electronic Voting in Belgium: Past and Futures of these systems, and presents a selection of voting systems that have been recommended to the federal and regional governments for future elections in Belgium: an improved paper-based voting system with voter-verifiable paper trails, a family of optical scanning systems, a remote/Internet voting system, and a kiosk/intranet voting system.作者: gastritis 時間: 2025-3-22 18:27
Erblichkeitskreis der Torsionsdystonie,ergence of the Internet there has been the idea of conducting remote electronic elections. In this paper we reviewed 104 elections with a remote e-voting possibility based on research articles, working papers and also on press releases. We analyzed the cases with respect to the level where they take作者: browbeat 時間: 2025-3-23 00:58 作者: llibretto 時間: 2025-3-23 02:24 作者: Fester 時間: 2025-3-23 06:45
Erfolgreich abnehmen und schlank bleibenfferent attacks and threats may be carried out depending on the operational environment in which the system is used, i.e. the procedures that define how to operate the systems. We are interested in reasoning about the security of e-Voting procedures, namely on the risks and attacks that can be carri作者: resistant 時間: 2025-3-23 13:11 作者: antipsychotic 時間: 2025-3-23 14:44 作者: COMMA 時間: 2025-3-23 21:57
https://doi.org/10.1007/BFb0117006s of these systems, and presents a selection of voting systems that have been recommended to the federal and regional governments for future elections in Belgium: an improved paper-based voting system with voter-verifiable paper trails, a family of optical scanning systems, a remote/Internet voting 作者: Original 時間: 2025-3-23 22:36 作者: BUST 時間: 2025-3-24 05:18
https://doi.org/10.1007/978-3-662-31597-2tems available on the market are covered in the analysis. Through the analysis we concluded that current e-voting security is heavily depending on protection by operational process rather than security features of the system and it is confirmed that the systems provide only limited security features作者: grenade 時間: 2025-3-24 09:14
The Residually Nite View: Approximation,and possible ways of manipulation abound. Voting schemes have to fulfill seemingly contradictory requirements: On one hand the election process should be verifiable to prevent electoral fraud and on the other hand each vote should be deniable to avoid coercion and vote buying..This work presents a n作者: GNAT 時間: 2025-3-24 14:21
Ergodic Theory and Dynamical Systems Ind social diffusion of the knowledge derived from the scientific resolution of highly complex problems associated with public decision making related to the governance of society. Among the many tools needed to fully develop e-cognocracy, we will focus in e-voting, as it is the first needed to gathe作者: Cosmopolitan 時間: 2025-3-24 16:19
Ergodic Theory and Dynamical Systems IIivacy, fairness, receipt-freeness, ... However, for many well-known protocols, these properties have never been analyzed in a systematic way. In this paper, we investigate the use of techniques from the simulation-based security tradition for the analysis of these protocols, through a case-study on 作者: 發(fā)芽 時間: 2025-3-24 22:19 作者: 品牌 時間: 2025-3-24 23:18 作者: 支形吊燈 時間: 2025-3-25 05:02
https://doi.org/10.1007/978-3-642-47089-9ernet is exposed to virus, worms, spyware, malware and other threats that can endanger the election’s integrity. For instance, it is possible to write a virus that changes the voter’s vote to one predetermined vote on election’s day. It is possible to write such a virus so that the voter would not n作者: 博愛家 時間: 2025-3-25 08:29 作者: Classify 時間: 2025-3-25 13:47
978-3-540-77492-1Springer-Verlag Berlin Heidelberg 2007作者: 高度贊揚 時間: 2025-3-25 19:16 作者: 易彎曲 時間: 2025-3-25 20:26
old purpose: it is an independent analysis of RIES-KOA and it is the first application of the Protection Profile. We indicate several issues with RIES-KOA and the Protection Profile, respectively, as learned during the analysis.作者: 無底 時間: 2025-3-26 02:58 作者: 突襲 時間: 2025-3-26 04:33
Springer Tracts in Modern Physics 27gitales Wahlstift-System” - DWS). The main reasons for favoring this electronic voting system have been its closeness to the conventional voting procedure and therefore its acceptance among the voters, its security, and its verifiability.作者: 招待 時間: 2025-3-26 11:43
https://doi.org/10.1007/978-3-662-31597-2 and there is large room for technical improvement. Typical security issues are lack of protection mechanism of programs and data on tabulation machines. This vulnerability enables malicious poll worker or manufacturer to insert malicious code to generate arbitrary election results.作者: VALID 時間: 2025-3-26 13:40 作者: 不規(guī)則的跳動 時間: 2025-3-26 17:12 作者: AFFIX 時間: 2025-3-27 00:28 作者: 開始沒有 時間: 2025-3-27 04:31
Remote Voting Schemes: A Comparative Analysisremote voting channels used in the United Sates for overseas voters binding elections. We also identify which are the main criteria requirements used to evaluate the implementation of these remote voting channels, and provide a general comparison of the fulfilment of these requirements by these remote voting channels.作者: blackout 時間: 2025-3-27 08:06 作者: cruise 時間: 2025-3-27 09:35 作者: In-Situ 時間: 2025-3-27 15:26
The Digital Voting Pen at the Hamburg Elections 2008: Electronic Voting Closest to Conventional Votigitales Wahlstift-System” - DWS). The main reasons for favoring this electronic voting system have been its closeness to the conventional voting procedure and therefore its acceptance among the voters, its security, and its verifiability.作者: expdient 時間: 2025-3-27 21:25
The Security Analysis of e-Voting in Japan and there is large room for technical improvement. Typical security issues are lack of protection mechanism of programs and data on tabulation machines. This vulnerability enables malicious poll worker or manufacturer to insert malicious code to generate arbitrary election results.作者: inspiration 時間: 2025-3-28 01:01
Threat Analysis of a Practical Voting Scheme with Receiptsng phase only needs to be audited if the final results fail to achieve some conditions. However, we will show that this scheme is vulnerable to some threats, adversaries can not only violate voter privacy, but also forge the election result.作者: Nonporous 時間: 2025-3-28 05:29 作者: Amorous 時間: 2025-3-28 07:17
The Residually Nite View: Approximation,vote buying attacks on voting schemes are presented which show that it can be dangerous to let the voter contribute randomness to the voting scheme..A proof-of-concept implementation of the scheme shows the practicality of the scheme: all costly computations can be moved to a non time critical pre-voting phase.作者: Latency 時間: 2025-3-28 13:28 作者: Noctambulant 時間: 2025-3-28 17:29
Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generatorvote buying attacks on voting schemes are presented which show that it can be dangerous to let the voter contribute randomness to the voting scheme..A proof-of-concept implementation of the scheme shows the practicality of the scheme: all costly computations can be moved to a non time critical pre-voting phase.作者: 旁觀者 時間: 2025-3-28 19:39
Simulation-Based Analysis of E2E Voting Systemselection fairness guarantee from this protocol. Guided by the reasons that make our security proof fail, we propose a simple variant of the ThreeBallot protocol and show that this variant emulates our functionality.作者: 小鹿 時間: 2025-3-29 01:57
Conference proceedings 2007ti?cation and reliable non-identi?ability each at its part during the process. And only a few processes may change their outer appearance so much with the advent of new IT as voting and identity management do. So it was no surprise in FIDIS, the interdisciplinary Network of Excellence working on the作者: habile 時間: 2025-3-29 05:54 作者: 百靈鳥 時間: 2025-3-29 08:40 作者: vascular 時間: 2025-3-29 15:22 作者: 事物的方面 時間: 2025-3-29 18:42 作者: 敵手 時間: 2025-3-29 23:39 作者: hallow 時間: 2025-3-30 03:02
Remote Voting Schemes: A Comparative Analysisiability issues that are part of postal voting have helped to introduce new remote voting channels based on electronic means. In the United States, electronic voting channels based on fax, email or Internet, are or have been used in binding elections. In this paper we identify which are the current 作者: Genistein 時間: 2025-3-30 06:24
Internet-Voting: Opportunity or Threat for Democracy?retical research provides satisfying algorithms for some of the challenges raised by i-voting and that some real world experiments have already been developed and performed..Unfortunately, in current i-voting systems, the citizen loses his/her control over the overall electoral process. Indeed, only作者: Anticlimax 時間: 2025-3-30 09:27 作者: Eviction 時間: 2025-3-30 15:07
Compliance of RIES to the Proposed e-Voting Protection Profileof Commons) elections in 2006. Although the system has been used in other elections in the Netherlands as well, there have been few independent evaluations of the system. In this paper, we apply the recently proposed Protection Profile for e-voting systems to the RIES-KOA system. This serves a two-f作者: exigent 時間: 2025-3-30 20:28 作者: 豐滿有漂亮 時間: 2025-3-30 23:03
Electronic Voting in Belgium: Past and Futures of these systems, and presents a selection of voting systems that have been recommended to the federal and regional governments for future elections in Belgium: an improved paper-based voting system with voter-verifiable paper trails, a family of optical scanning systems, a remote/Internet voting 作者: 危險 時間: 2025-3-31 03:51
The Digital Voting Pen at the Hamburg Elections 2008: Electronic Voting Closest to Conventional Votistate parliament will be complicated and time consuming. To nevertheless enable the Election Supervisor to announce the preliminary results of the election on the evening of the Election Day the Parliament has chosen to make use of an electronic voting system, i.e. the Digital Voting Pen System (“Di作者: 令人發(fā)膩 時間: 2025-3-31 06:19
The Security Analysis of e-Voting in Japantems available on the market are covered in the analysis. Through the analysis we concluded that current e-voting security is heavily depending on protection by operational process rather than security features of the system and it is confirmed that the systems provide only limited security features作者: STYX 時間: 2025-3-31 09:25 作者: BUMP 時間: 2025-3-31 13:28
Enhancing the Trust and Perceived Security in e-Cognocracynd social diffusion of the knowledge derived from the scientific resolution of highly complex problems associated with public decision making related to the governance of society. Among the many tools needed to fully develop e-cognocracy, we will focus in e-voting, as it is the first needed to gathe作者: 清楚 時間: 2025-3-31 17:33
Simulation-Based Analysis of E2E Voting Systemsivacy, fairness, receipt-freeness, ... However, for many well-known protocols, these properties have never been analyzed in a systematic way. In this paper, we investigate the use of techniques from the simulation-based security tradition for the analysis of these protocols, through a case-study on 作者: 爆炸 時間: 2025-4-1 01:37 作者: 言行自由 時間: 2025-4-1 05:12