作者: engrossed 時(shí)間: 2025-3-22 00:00
Improving the Computational Efficiency of Adaptive Audits of IRV Elections,t the reported winner really won or a full hand count?is conducted, revealing who really won. Second, it tests a richer collection of conditions, some of which can rule out many elimination orders at once. Third, it exploits relationships among those conditions, allowing it?to abandon testing those 作者: 廣口瓶 時(shí)間: 2025-3-22 03:09 作者: 寬大 時(shí)間: 2025-3-22 04:58 作者: 巨頭 時(shí)間: 2025-3-22 10:39 作者: folliculitis 時(shí)間: 2025-3-22 16:36 作者: folliculitis 時(shí)間: 2025-3-22 18:54 作者: Chandelier 時(shí)間: 2025-3-22 23:45 作者: 和平主義者 時(shí)間: 2025-3-23 04:14
Basic Infrastructure of the Metaverse,/claimed/proven to be coercion-resistant or receipt-free, the main conclusion of this work is that the coercion models should be re-evaluated, and new definitions of coercion and receipt-freeness are necessary. We propose such new definitions as part of this paper and investigate their implications.作者: BULLY 時(shí)間: 2025-3-23 08:16
,A Framework for Voters’ Trust Repair in Internet Voting,e highlights the importance of detecting the emergence of events that may violate trust among voters, understanding the severity and dimensions of trust violation, and strategically navigating trust repair. It also outlines open questions and identifies avenues for future research.作者: contrast-medium 時(shí)間: 2025-3-23 10:38 作者: Project 時(shí)間: 2025-3-23 15:21
,Expanding the?Toolbox: Coercion and?Vote-Selling at?Vote-Casting Revisited,/claimed/proven to be coercion-resistant or receipt-free, the main conclusion of this work is that the coercion models should be re-evaluated, and new definitions of coercion and receipt-freeness are necessary. We propose such new definitions as part of this paper and investigate their implications.作者: Gobble 時(shí)間: 2025-3-23 20:21 作者: 發(fā)怨言 時(shí)間: 2025-3-23 22:33 作者: aquatic 時(shí)間: 2025-3-24 03:53
,Efficient Cleansing in?Coercion-Resistant Voting,ue to revoting or coercion need to be removed before the tallying. In this paper, we propose a coercion-resistant Internet voting scheme that does not require the removal of invalid ballots, hence avoids the leakage of information, but still supports revoting. The scheme is very efficient and achieves linear tallying.作者: SEEK 時(shí)間: 2025-3-24 09:55
0302-9743 eaux and related methods. The papers cover a wide range of topics connected with electronic voting, including experiences and revisions of the actual uses of E-voting systems and corresponding processes in elections..978-3-031-72243-1978-3-031-72244-8Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: anchor 時(shí)間: 2025-3-24 14:13
Conference proceedings‘‘‘‘‘‘‘‘ 2025 Spain, during October 2-4, 2024..The 10 full papers included in this book were carefully reviewed and selected from 36 submissions..They present research on all aspects of the mechanization of reasoning with tableaux and related methods. The papers cover a wide range of topics connected with electr作者: 貴族 時(shí)間: 2025-3-24 18:25
Conference proceedings‘‘‘‘‘‘‘‘ 2025arch on all aspects of the mechanization of reasoning with tableaux and related methods. The papers cover a wide range of topics connected with electronic voting, including experiences and revisions of the actual uses of E-voting systems and corresponding processes in elections..作者: Thyroid-Gland 時(shí)間: 2025-3-24 20:30
https://doi.org/10.1007/978-1-4471-6551-4e random choices, we also evaluate whether the choices made by voters?are sufficiently “random” to provide verifiability and whether it?could affect their privacy. The study shows that, for?our population, Belenios-CaI is considered as usable with the random choices of the voters seeming sufficient for verifiability and privacy.作者: Largess 時(shí)間: 2025-3-25 02:27 作者: Trigger-Point 時(shí)間: 2025-3-25 06:43 作者: aneurysm 時(shí)間: 2025-3-25 10:38 作者: PTCA635 時(shí)間: 2025-3-25 12:20
https://doi.org/10.1007/978-3-031-72244-8Open Access; Electronic Voting; E-voting; Internet Voting; Electronic Voting Machines; Security作者: GOAT 時(shí)間: 2025-3-25 18:03
David Duenas-Cid,Peter Roenne,Jordi Barrat EsteveThis book is open access, which means that you have free and unlimited access作者: 青少年 時(shí)間: 2025-3-25 20:16 作者: 棲息地 時(shí)間: 2025-3-26 03:56
https://doi.org/10.1007/978-3-658-40438-3rion, it provides a direct form of E2E verifiability: voters verify the presence of their votes in plaintext in the tally. However, in contrast to Selene or Hyperion, the privacy of this protocol is everlasting. In addition, our protocol offers the novel feature of everlasting receipt-freeness and coercion mitigation.作者: Kidney-Failure 時(shí)間: 2025-3-26 07:26 作者: 關(guān)心 時(shí)間: 2025-3-26 10:42
978-3-031-72243-1The Editor(s) (if applicable) and The Author(s) 2025作者: Nerve-Block 時(shí)間: 2025-3-26 15:17
Electronic Voting978-3-031-72244-8Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: sacrum 時(shí)間: 2025-3-26 18:58 作者: 褲子 時(shí)間: 2025-3-26 22:03 作者: GLADE 時(shí)間: 2025-3-27 03:10 作者: 虛構(gòu)的東西 時(shí)間: 2025-3-27 05:56
V. Dragutan,L. Popescu,S. Coca,M. Dimoniequestion of trust repair. This article introduces a framework for trust repair in i-voting by integrating insights from trust repair in other research areas, as well as concepts developed for and used in the e-voting literature. The article traces the process of trust repair from the different belie作者: 法官 時(shí)間: 2025-3-27 10:13 作者: Bureaucracy 時(shí)間: 2025-3-27 16:16 作者: 吵鬧 時(shí)間: 2025-3-27 17:50 作者: 配偶 時(shí)間: 2025-3-28 00:55
https://doi.org/10.1007/978-3-658-40438-3rion, it provides a direct form of E2E verifiability: voters verify the presence of their votes in plaintext in the tally. However, in contrast to Selene or Hyperion, the privacy of this protocol is everlasting. In addition, our protocol offers the novel feature of everlasting receipt-freeness and c作者: Lament 時(shí)間: 2025-3-28 04:39
Basic Infrastructure of the Metaverse,techniques to resist or partially mitigate coercion and vote-buying, we explicitly demonstrate that they generally underestimate the power of malicious actors by not accounting for current technological tools that could support coercion and vote-selling. In this paper, we give several examples of ho作者: Capture 時(shí)間: 2025-3-28 07:00 作者: 門窗的側(cè)柱 時(shí)間: 2025-3-28 11:16
,Belenios with?Cast-as-Intended: Towards a?Usable Interface, elections to date. We modify the design of Belenios-Cai from the user perspective without changing its core cryptographic mechanism. The goal is to increase?its usability by letting the voter simply check whether two symbols?are equal or different..We conducted a user-study among 165 participants i作者: FAST 時(shí)間: 2025-3-28 15:33
Threshold Receipt-Free Single-Pass eVoting,he availability of a helping server that?is trusted for receipt-freeness, and only for that property. ?This appealing design led to a number of subsequent works that made?this approach non-interactive and more efficient. Still, in all of?these works, receipt-freeness depends on the honesty of one si作者: HAUNT 時(shí)間: 2025-3-28 21:45
Improving the Computational Efficiency of Adaptive Audits of IRV Elections,ntests with any number of candidates, but the original implementation incurred memory and computation costs that grew superexponentially with?the number of candidates. This paper improves the algorithmic implementation of AWAIRE in three ways that make it practical to audit IRV contests?with 55?cand作者: Mere僅僅 時(shí)間: 2025-3-29 01:45 作者: aggrieve 時(shí)間: 2025-3-29 06:50 作者: ablate 時(shí)間: 2025-3-29 07:29