派博傳思國際中心

標(biāo)題: Titlebook: E-Voting and Identity; First International Ammar Alkassar,Melanie Volkamer Conference proceedings 2007 Springer-Verlag Berlin Heidelberg 2 [打印本頁]

作者: AMASS    時間: 2025-3-21 16:32
書目名稱E-Voting and Identity影響因子(影響力)




書目名稱E-Voting and Identity影響因子(影響力)學(xué)科排名




書目名稱E-Voting and Identity網(wǎng)絡(luò)公開度




書目名稱E-Voting and Identity網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱E-Voting and Identity被引頻次




書目名稱E-Voting and Identity被引頻次學(xué)科排名




書目名稱E-Voting and Identity年度引用




書目名稱E-Voting and Identity年度引用學(xué)科排名




書目名稱E-Voting and Identity讀者反饋




書目名稱E-Voting and Identity讀者反饋學(xué)科排名





作者: 新義    時間: 2025-3-21 23:01

作者: Hemoptysis    時間: 2025-3-22 03:07

作者: 表臉    時間: 2025-3-22 05:02
https://doi.org/10.1007/978-3-662-34573-3We apply a technique inspired by Scantegrity to Punchscan and Prêt à Voter and show how this results in a mail-in ballot system that is auditable, simple to use and easy to understand.
作者: 間接    時間: 2025-3-22 09:13

作者: gastritis    時間: 2025-3-22 15:53
Electronic Voting in Belgium: Past and Futures of these systems, and presents a selection of voting systems that have been recommended to the federal and regional governments for future elections in Belgium: an improved paper-based voting system with voter-verifiable paper trails, a family of optical scanning systems, a remote/Internet voting system, and a kiosk/intranet voting system.
作者: gastritis    時間: 2025-3-22 18:27
Erblichkeitskreis der Torsionsdystonie,ergence of the Internet there has been the idea of conducting remote electronic elections. In this paper we reviewed 104 elections with a remote e-voting possibility based on research articles, working papers and also on press releases. We analyzed the cases with respect to the level where they take
作者: browbeat    時間: 2025-3-23 00:58

作者: llibretto    時間: 2025-3-23 02:24

作者: Fester    時間: 2025-3-23 06:45
Erfolgreich abnehmen und schlank bleibenfferent attacks and threats may be carried out depending on the operational environment in which the system is used, i.e. the procedures that define how to operate the systems. We are interested in reasoning about the security of e-Voting procedures, namely on the risks and attacks that can be carri
作者: resistant    時間: 2025-3-23 13:11

作者: antipsychotic    時間: 2025-3-23 14:44

作者: COMMA    時間: 2025-3-23 21:57
https://doi.org/10.1007/BFb0117006s of these systems, and presents a selection of voting systems that have been recommended to the federal and regional governments for future elections in Belgium: an improved paper-based voting system with voter-verifiable paper trails, a family of optical scanning systems, a remote/Internet voting
作者: Original    時間: 2025-3-23 22:36

作者: BUST    時間: 2025-3-24 05:18
https://doi.org/10.1007/978-3-662-31597-2tems available on the market are covered in the analysis. Through the analysis we concluded that current e-voting security is heavily depending on protection by operational process rather than security features of the system and it is confirmed that the systems provide only limited security features
作者: grenade    時間: 2025-3-24 09:14
The Residually Nite View: Approximation,and possible ways of manipulation abound. Voting schemes have to fulfill seemingly contradictory requirements: On one hand the election process should be verifiable to prevent electoral fraud and on the other hand each vote should be deniable to avoid coercion and vote buying..This work presents a n
作者: GNAT    時間: 2025-3-24 14:21
Ergodic Theory and Dynamical Systems Ind social diffusion of the knowledge derived from the scientific resolution of highly complex problems associated with public decision making related to the governance of society. Among the many tools needed to fully develop e-cognocracy, we will focus in e-voting, as it is the first needed to gathe
作者: Cosmopolitan    時間: 2025-3-24 16:19
Ergodic Theory and Dynamical Systems IIivacy, fairness, receipt-freeness, ... However, for many well-known protocols, these properties have never been analyzed in a systematic way. In this paper, we investigate the use of techniques from the simulation-based security tradition for the analysis of these protocols, through a case-study on
作者: 發(fā)芽    時間: 2025-3-24 22:19

作者: 品牌    時間: 2025-3-24 23:18

作者: 支形吊燈    時間: 2025-3-25 05:02
https://doi.org/10.1007/978-3-642-47089-9ernet is exposed to virus, worms, spyware, malware and other threats that can endanger the election’s integrity. For instance, it is possible to write a virus that changes the voter’s vote to one predetermined vote on election’s day. It is possible to write such a virus so that the voter would not n
作者: 博愛家    時間: 2025-3-25 08:29

作者: Classify    時間: 2025-3-25 13:47
978-3-540-77492-1Springer-Verlag Berlin Heidelberg 2007
作者: 高度贊揚    時間: 2025-3-25 19:16

作者: 易彎曲    時間: 2025-3-25 20:26
old purpose: it is an independent analysis of RIES-KOA and it is the first application of the Protection Profile. We indicate several issues with RIES-KOA and the Protection Profile, respectively, as learned during the analysis.
作者: 無底    時間: 2025-3-26 02:58

作者: 突襲    時間: 2025-3-26 04:33
Springer Tracts in Modern Physics 27gitales Wahlstift-System” - DWS). The main reasons for favoring this electronic voting system have been its closeness to the conventional voting procedure and therefore its acceptance among the voters, its security, and its verifiability.
作者: 招待    時間: 2025-3-26 11:43
https://doi.org/10.1007/978-3-662-31597-2 and there is large room for technical improvement. Typical security issues are lack of protection mechanism of programs and data on tabulation machines. This vulnerability enables malicious poll worker or manufacturer to insert malicious code to generate arbitrary election results.
作者: VALID    時間: 2025-3-26 13:40

作者: 不規(guī)則的跳動    時間: 2025-3-26 17:12

作者: AFFIX    時間: 2025-3-27 00:28

作者: 開始沒有    時間: 2025-3-27 04:31
Remote Voting Schemes: A Comparative Analysisremote voting channels used in the United Sates for overseas voters binding elections. We also identify which are the main criteria requirements used to evaluate the implementation of these remote voting channels, and provide a general comparison of the fulfilment of these requirements by these remote voting channels.
作者: blackout    時間: 2025-3-27 08:06

作者: cruise    時間: 2025-3-27 09:35

作者: In-Situ    時間: 2025-3-27 15:26
The Digital Voting Pen at the Hamburg Elections 2008: Electronic Voting Closest to Conventional Votigitales Wahlstift-System” - DWS). The main reasons for favoring this electronic voting system have been its closeness to the conventional voting procedure and therefore its acceptance among the voters, its security, and its verifiability.
作者: expdient    時間: 2025-3-27 21:25
The Security Analysis of e-Voting in Japan and there is large room for technical improvement. Typical security issues are lack of protection mechanism of programs and data on tabulation machines. This vulnerability enables malicious poll worker or manufacturer to insert malicious code to generate arbitrary election results.
作者: inspiration    時間: 2025-3-28 01:01
Threat Analysis of a Practical Voting Scheme with Receiptsng phase only needs to be audited if the final results fail to achieve some conditions. However, we will show that this scheme is vulnerable to some threats, adversaries can not only violate voter privacy, but also forge the election result.
作者: Nonporous    時間: 2025-3-28 05:29

作者: Amorous    時間: 2025-3-28 07:17
The Residually Nite View: Approximation,vote buying attacks on voting schemes are presented which show that it can be dangerous to let the voter contribute randomness to the voting scheme..A proof-of-concept implementation of the scheme shows the practicality of the scheme: all costly computations can be moved to a non time critical pre-voting phase.
作者: Latency    時間: 2025-3-28 13:28

作者: Noctambulant    時間: 2025-3-28 17:29
Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generatorvote buying attacks on voting schemes are presented which show that it can be dangerous to let the voter contribute randomness to the voting scheme..A proof-of-concept implementation of the scheme shows the practicality of the scheme: all costly computations can be moved to a non time critical pre-voting phase.
作者: 旁觀者    時間: 2025-3-28 19:39
Simulation-Based Analysis of E2E Voting Systemselection fairness guarantee from this protocol. Guided by the reasons that make our security proof fail, we propose a simple variant of the ThreeBallot protocol and show that this variant emulates our functionality.
作者: 小鹿    時間: 2025-3-29 01:57
Conference proceedings 2007ti?cation and reliable non-identi?ability each at its part during the process. And only a few processes may change their outer appearance so much with the advent of new IT as voting and identity management do. So it was no surprise in FIDIS, the interdisciplinary Network of Excellence working on the
作者: habile    時間: 2025-3-29 05:54

作者: 百靈鳥    時間: 2025-3-29 08:40

作者: vascular    時間: 2025-3-29 15:22

作者: 事物的方面    時間: 2025-3-29 18:42

作者: 敵手    時間: 2025-3-29 23:39

作者: hallow    時間: 2025-3-30 03:02
Remote Voting Schemes: A Comparative Analysisiability issues that are part of postal voting have helped to introduce new remote voting channels based on electronic means. In the United States, electronic voting channels based on fax, email or Internet, are or have been used in binding elections. In this paper we identify which are the current
作者: Genistein    時間: 2025-3-30 06:24
Internet-Voting: Opportunity or Threat for Democracy?retical research provides satisfying algorithms for some of the challenges raised by i-voting and that some real world experiments have already been developed and performed..Unfortunately, in current i-voting systems, the citizen loses his/her control over the overall electoral process. Indeed, only
作者: Anticlimax    時間: 2025-3-30 09:27

作者: Eviction    時間: 2025-3-30 15:07
Compliance of RIES to the Proposed e-Voting Protection Profileof Commons) elections in 2006. Although the system has been used in other elections in the Netherlands as well, there have been few independent evaluations of the system. In this paper, we apply the recently proposed Protection Profile for e-voting systems to the RIES-KOA system. This serves a two-f
作者: exigent    時間: 2025-3-30 20:28

作者: 豐滿有漂亮    時間: 2025-3-30 23:03
Electronic Voting in Belgium: Past and Futures of these systems, and presents a selection of voting systems that have been recommended to the federal and regional governments for future elections in Belgium: an improved paper-based voting system with voter-verifiable paper trails, a family of optical scanning systems, a remote/Internet voting
作者: 危險    時間: 2025-3-31 03:51
The Digital Voting Pen at the Hamburg Elections 2008: Electronic Voting Closest to Conventional Votistate parliament will be complicated and time consuming. To nevertheless enable the Election Supervisor to announce the preliminary results of the election on the evening of the Election Day the Parliament has chosen to make use of an electronic voting system, i.e. the Digital Voting Pen System (“Di
作者: 令人發(fā)膩    時間: 2025-3-31 06:19
The Security Analysis of e-Voting in Japantems available on the market are covered in the analysis. Through the analysis we concluded that current e-voting security is heavily depending on protection by operational process rather than security features of the system and it is confirmed that the systems provide only limited security features
作者: STYX    時間: 2025-3-31 09:25

作者: BUMP    時間: 2025-3-31 13:28
Enhancing the Trust and Perceived Security in e-Cognocracynd social diffusion of the knowledge derived from the scientific resolution of highly complex problems associated with public decision making related to the governance of society. Among the many tools needed to fully develop e-cognocracy, we will focus in e-voting, as it is the first needed to gathe
作者: 清楚    時間: 2025-3-31 17:33
Simulation-Based Analysis of E2E Voting Systemsivacy, fairness, receipt-freeness, ... However, for many well-known protocols, these properties have never been analyzed in a systematic way. In this paper, we investigate the use of techniques from the simulation-based security tradition for the analysis of these protocols, through a case-study on
作者: 爆炸    時間: 2025-4-1 01:37

作者: 言行自由    時間: 2025-4-1 05:12





歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
永修县| 饶平县| 金乡县| 兴城市| 喀什市| 蒲江县| 巧家县| 满洲里市| 枣强县| 寿宁县| 莱阳市| 万安县| 莒南县| 连云港市| 普陀区| 托克托县| 沙雅县| 安远县| 安国市| 张掖市| 新蔡县| 大连市| 黑山县| 平南县| 乌拉特后旗| 云龙县| 泸定县| 连云港市| 元阳县| 阜阳市| 那坡县| 米脂县| 宁海县| 九江市| 青州市| 长汀县| 理塘县| 镇雄县| 积石山| 静海县| 淳安县|