作者: BUMP 時(shí)間: 2025-3-21 20:53
Sarah A. Bologna,Marja Spierenburg in [.]. For example, we find that dispute resolution is met assuming an honest voting authority. Moreover, our work provides an understanding of privacy-preserving dispute resolution in general, which can be beneficial to similar analyses of other voting schemes.作者: Humble 時(shí)間: 2025-3-22 00:24 作者: 裂縫 時(shí)間: 2025-3-22 07:05
https://doi.org/10.1057/9781137298102ence of classical and Bayesian approaches, we show that BAs, suitably calibrated, are risk-limiting. Second, we compare the efficiency of the methods across a wide range of contest sizes and margins, focusing on the distribution of sample sizes required to attain a given risk limit. Third, we outlin作者: 食品室 時(shí)間: 2025-3-22 10:46
R. H. Hofman,W. H. A. Hofman,P. Dalyments. More specifically, based on these two case studies it analyses four different challenges on the processing of personal data in remote electronic voting under the GDPR: the definitions and categories of personal data processed in online voting projects; the separation of duties between data co作者: 易碎 時(shí)間: 2025-3-22 16:49 作者: 易碎 時(shí)間: 2025-3-22 20:51 作者: botany 時(shí)間: 2025-3-23 00:42
Bayesian Audits Are Average But Risk-Limiting Audits are Above Average,ure a large chance of correcting the outcome of an election when the reported outcome is wrong. “Nonpartisan” priors, i.e., priors that are invariant under relabeling the candidates, lead to upset probabilities that can be far smaller than the chance of correcting wrong reported outcomes. We demonst作者: 幾何學(xué)家 時(shí)間: 2025-3-23 05:18
A Unified Evaluation of Two-Candidate Ballot-Polling Election Auditing Methods,ence of classical and Bayesian approaches, we show that BAs, suitably calibrated, are risk-limiting. Second, we compare the efficiency of the methods across a wide range of contest sizes and margins, focusing on the distribution of sample sizes required to attain a given risk limit. Third, we outlin作者: Isthmus 時(shí)間: 2025-3-23 08:06
My Vote, My (Personal) Data: Remote Electronic Voting and the General Data Protection Regulation,ments. More specifically, based on these two case studies it analyses four different challenges on the processing of personal data in remote electronic voting under the GDPR: the definitions and categories of personal data processed in online voting projects; the separation of duties between data co作者: inquisitive 時(shí)間: 2025-3-23 11:00 作者: Silent-Ischemia 時(shí)間: 2025-3-23 16:39 作者: Anthrp 時(shí)間: 2025-3-23 19:52
Responses to Institutional Disrespect,sible to deliver effective cybersecurity awareness training using e-learning. We provide a general methodology on how to create cybersecurity awareness training and evaluate it based on Kirkpatrick’s model of evaluation [.]. We have conducted a pilot study of the methodology in context of the European Parliament election 2019.作者: 艱苦地移動(dòng) 時(shí)間: 2025-3-23 23:14
,Tripped at the Finishing Line: The ?land Islands Internet Voting Project,espite this, the project was canceled the evening before the expected release date. In this paper, we explore the causes of this failure using a two-pronged approach including Information System failure perspectives and the approach to e-voting Mirabilis, focusing on organizational elements which provoked the decision not to use the system.作者: 比喻好 時(shí)間: 2025-3-24 02:27 作者: interior 時(shí)間: 2025-3-24 08:48
Effective Cybersecurity Awareness Training for Election Officials,sible to deliver effective cybersecurity awareness training using e-learning. We provide a general methodology on how to create cybersecurity awareness training and evaluate it based on Kirkpatrick’s model of evaluation [.]. We have conducted a pilot study of the methodology in context of the European Parliament election 2019.作者: Modicum 時(shí)間: 2025-3-24 12:49 作者: 負(fù)擔(dān) 時(shí)間: 2025-3-24 16:20 作者: HEPA-filter 時(shí)間: 2025-3-24 20:49 作者: 使隔離 時(shí)間: 2025-3-25 02:10 作者: abracadabra 時(shí)間: 2025-3-25 05:00 作者: 公司 時(shí)間: 2025-3-25 08:38 作者: esthetician 時(shí)間: 2025-3-25 15:16 作者: acrimony 時(shí)間: 2025-3-25 16:15 作者: Flirtatious 時(shí)間: 2025-3-25 21:32 作者: 正常 時(shí)間: 2025-3-26 03:07
Peter Mooslechner,Martin Schürz and cultural customs hinder a broader application. In this work, the authors aim to contribute to a safer introduction of e-voting tools by applying a practical evaluation framework strongly based on the security requirements issued by the Council of Europe (CoE) in 2017 to .votes, a system that ha作者: Humble 時(shí)間: 2025-3-26 05:42 作者: evasive 時(shí)間: 2025-3-26 12:30
Institutional Development Performanceimes. While e-voting and i-voting are not particularly widespread, more and more illiberal countries are implementing these innovations, which has been overlooked in the academia so far. The paper attempts to fill in this gap. Firstly, we provide a general overview of the problem and identify the ke作者: Facilities 時(shí)間: 2025-3-26 15:34 作者: Dysarthria 時(shí)間: 2025-3-26 20:41 作者: palliative-care 時(shí)間: 2025-3-26 23:33 作者: surrogate 時(shí)間: 2025-3-27 01:58 作者: Ankylo- 時(shí)間: 2025-3-27 07:56 作者: 破布 時(shí)間: 2025-3-27 13:06
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/e/image/306448.jpg作者: 加花粗鄙人 時(shí)間: 2025-3-27 15:23
0302-9743 and applications of voting systems, also including legal, social or political aspects, amongst others; turning out to be an important global referent in relation to this issue..978-3-030-60346-5978-3-030-60347-2Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Hyaluronic-Acid 時(shí)間: 2025-3-27 21:12
0302-9743 9- in Bregenz, Austria, in October 2020. The 14 full papers presented were carefully reviewed and selected from 55 submissions..The conference collected the most relevant debates on the development of Electronic Voting, from aspects relating to security and usability through to practical experiences作者: cyanosis 時(shí)間: 2025-3-27 21:58 作者: Gnrh670 時(shí)間: 2025-3-28 03:20
Henrik Schmiegelow,Michèle Schmiegelowpite the severe limitations of the property specification language in the model checker..The aim of this work is to open a new path, rather then deliver the ultimate outcome of formal analysis. A comprehensive model of Prêt à Voter, more accurate specification of requirements, and exhaustive verification are planned for the future.作者: Biomarker 時(shí)間: 2025-3-28 06:46
Peter Mooslechner,Martin Schürzo contribute to a gradual and secure implementation of e-voting solutions in the democratic processes. The authors believe it can constitute a useful source of information for election officials, researchers and voters.作者: Ringworm 時(shí)間: 2025-3-28 13:25
Institutional Development Performancefor other countries in the near future. The research exposes the potential of e-voting, and in particular, i-voting as a tool for the regime stability and provides some avenues of the future research.作者: 肉身 時(shí)間: 2025-3-28 16:33 作者: 帶來(lái)墨水 時(shí)間: 2025-3-28 20:21
Towards Model Checking of Voting Protocols in ,pite the severe limitations of the property specification language in the model checker..The aim of this work is to open a new path, rather then deliver the ultimate outcome of formal analysis. A comprehensive model of Prêt à Voter, more accurate specification of requirements, and exhaustive verification are planned for the future.作者: Antigen 時(shí)間: 2025-3-29 02:36
E-Voting System Evaluation Based on the Council of Europe Recommendations: ,Votes,o contribute to a gradual and secure implementation of e-voting solutions in the democratic processes. The authors believe it can constitute a useful source of information for election officials, researchers and voters.作者: embolus 時(shí)間: 2025-3-29 06:37 作者: gene-therapy 時(shí)間: 2025-3-29 07:35
Does Vote Verification Work: Usage and Impact of Confidence Building Technology in Internet Voting,andidate selection. The effects of verifying on confidence in the vote being correctly taken into account are substantial - vote verifiers show a stronger belief in the election integrity. Overall, verification technology seems to be building confidence in the system and being used by the more risk aware voting population.作者: RALES 時(shí)間: 2025-3-29 11:56
Conference proceedings 2020t relevant debates on the development of Electronic Voting, from aspects relating to security and usability through to practical experiences and applications of voting systems, also including legal, social or political aspects, amongst others; turning out to be an important global referent in relation to this issue..作者: Chandelier 時(shí)間: 2025-3-29 15:55
Die Freigabe der Kernforschung, true result. The challenge arising in Australian Federal Senate elections is that they use a complicated Single Transferable Vote (STV) method for which it is intractable to compute the true MOV, hence we must rely on greedy methods to find small manipulations.作者: Accord 時(shí)間: 2025-3-29 22:15 作者: allergy 時(shí)間: 2025-3-30 01:14 作者: Stable-Angina 時(shí)間: 2025-3-30 05:12 作者: 擁護(hù)者 時(shí)間: 2025-3-30 10:05
Shifting the Balance-of-Power in STV Elections,SA, it is worthwhile understanding how little a change in the recorded ballots could change an election result. In this paper we construct manipulations of the ballots in order to change the overall balance of power in an Australian Federal Senate election – the upper house of Parliament. This gives作者: 飛來(lái)飛去真休 時(shí)間: 2025-3-30 13:00 作者: 搖晃 時(shí)間: 2025-3-30 17:25 作者: 指耕作 時(shí)間: 2025-3-31 00:11
Revisiting Practical and Usable Coercion-Resistant Remote E-Voting,e it usable and practical. In JCJ the user needs to handle cryptographic credentials and be able to fake these in case of coercion. In a series of three papers Neumann et al. analysed the usability of JCJ, and constructed and implemented a practical credential handling system using a smart card whic作者: cliche 時(shí)間: 2025-3-31 02:15
Privacy-Preserving Dispute Resolution in the Improved Bingo Voting,n can be . by such mechanisms. However, these mechanisms are useless if not triggered by voters, who should not have to choose to either raise a dispute or keep their vote private. Hence, voting schemes should include privacy-preserving dispute resolution..In this work, we advance the formal analysi作者: Epithelium 時(shí)間: 2025-3-31 06:11
Bayesian Audits Are Average But Risk-Limiting Audits are Above Average,ballots selected at random from a trustworthy paper trail of votes. Risk-limiting audits (RLAs) control the probability that, if the reported outcome is wrong, it is not corrected before the outcome becomes official. RLAs keep this probability below the specified “risk limit.” Bayesian audits (BAs)