標(biāo)題: Titlebook: E-Voting and Identity; 5th International Co Rolf Haenni,Reto E. Koenig,Douglas Wikstr?m Conference proceedings 2015 Springer International [打印本頁(yè)] 作者: interleukins 時(shí)間: 2025-3-21 16:49
書目名稱E-Voting and Identity影響因子(影響力)
書目名稱E-Voting and Identity影響因子(影響力)學(xué)科排名
書目名稱E-Voting and Identity網(wǎng)絡(luò)公開度
書目名稱E-Voting and Identity網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱E-Voting and Identity被引頻次
書目名稱E-Voting and Identity被引頻次學(xué)科排名
書目名稱E-Voting and Identity年度引用
書目名稱E-Voting and Identity年度引用學(xué)科排名
書目名稱E-Voting and Identity讀者反饋
書目名稱E-Voting and Identity讀者反饋學(xué)科排名
作者: LURE 時(shí)間: 2025-3-22 00:13
The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Electionn the number of votes taken while the system was vulnerable. We also found protocol flaws, including vote verification that was itself susceptible to manipulation. This incident underscores the difficulty of conducting secure elections online and carries lessons for voters, election officials, and t作者: 膝蓋 時(shí)間: 2025-3-22 01:24
Vote Validatability in Mix-Net-Based eVotingid vote is produced by a software bug, it might be only detected after the election period has finished. In particular, voters would not be able to cast a valid vote again..In this work we formalize the concept of having a system that detects invalid votes during the election period. In addition, we作者: aerial 時(shí)間: 2025-3-22 06:40 作者: PRISE 時(shí)間: 2025-3-22 09:03
,Flie?barkeit und Zustandsdiagramm,wed to cast more than one ballot (aka single vote casting)? In this paper we propose a simple ballot casting protocol, using return codes, for allowing a voter to verify votes in a single vote casting election. We do so without significantly impacting the number of operations in the client side. Thi作者: LINE 時(shí)間: 2025-3-22 15:44
https://doi.org/10.1057/9780230244306n the number of votes taken while the system was vulnerable. We also found protocol flaws, including vote verification that was itself susceptible to manipulation. This incident underscores the difficulty of conducting secure elections online and carries lessons for voters, election officials, and t作者: LINE 時(shí)間: 2025-3-22 19:44 作者: Lumbar-Spine 時(shí)間: 2025-3-23 01:02
Essays on Women in Western Esotericismss, the Swiss Federal Tribunal (supreme court) ruled that the complaints could not be heard on their merits, because they did not allege that weaknesses had actually been exploited in a specific vote. This decision differs from those taken in other jurisdictions and highlights the difficulties of br作者: 走路左晃右晃 時(shí)間: 2025-3-23 04:43
0302-9743 E-Voting and Identity, VoteID 2015, held in Bern, Switzerland, in September 2015. The 10 revised full papers presented, including one keynote and three invited talks, were carefully selected from 26 submissions. The papers deal with real-world electronic systems; advanced voting protocols; document作者: deciduous 時(shí)間: 2025-3-23 05:45
https://doi.org/10.1007/978-3-663-04826-8onsidered irregular (e.g. inability to cast a valid vote or failed verifications). We observe several interesting phenomena, e.g. that older people are generally faster Internet voters and that women use the vote verification option significantly less than men.作者: delegate 時(shí)間: 2025-3-23 09:42
andwritten number recognition for preferential elections and handwriting recognition for write-in areas. We will also propose some particular adjustments that can be made to those general techniques in the specific context of electoral documents.作者: 牛的細(xì)微差別 時(shí)間: 2025-3-23 17:05 作者: 壟斷 時(shí)間: 2025-3-23 20:10 作者: 來自于 時(shí)間: 2025-3-23 23:03 作者: cloture 時(shí)間: 2025-3-24 05:40 作者: 意外 時(shí)間: 2025-3-24 07:35
https://doi.org/10.1007/978-3-662-30470-9 we remove the trust in the mail. We propose both single and multi-seat elections, using PSMT protocols (SCN 2012) where with the help of visual aids, humans can carry out mod10 addition correctly with a 99?% degree of accuracy. We introduce an unconditionally secure MIX based on the combinatorics of set systems.作者: 包庇 時(shí)間: 2025-3-24 13:32 作者: Fortify 時(shí)間: 2025-3-24 17:23
Conference proceedings 2015n Bern, Switzerland, in September 2015. The 10 revised full papers presented, including one keynote and three invited talks, were carefully selected from 26 submissions. The papers deal with real-world electronic systems; advanced voting protocols; document analysis, machine-checked reasoning, e-vot作者: 影響帶來 時(shí)間: 2025-3-24 22:25
Verifiable Internet Elections with Everlasting Privacy and Minimal Trustminimum and makes our protocol remarkably simple. Since computational intractability assumptions are only necessary to prevent the creation of invalid votes during the voting period, but not to protect the secrecy of the vote, the protocol even offers a solution to the everlasting privacy problem.作者: 肉身 時(shí)間: 2025-3-25 02:57 作者: 協(xié)議 時(shí)間: 2025-3-25 06:40
Machine-Checked Reasoning About Complex Voting Schemes Using Higher-Order LogicL program .. We are currently verifying that the formalisation of the implementation implies the formalisation of the specification: that is, we are using the HOL4 interactive theorem prover to prove the implication . ...作者: incredulity 時(shí)間: 2025-3-25 10:45 作者: LATER 時(shí)間: 2025-3-25 12:57
978-3-319-22269-1Springer International Publishing Switzerland 2015作者: Statins 時(shí)間: 2025-3-25 17:25
Rolf Haenni,Reto E. Koenig,Douglas Wikstr?mIncludes supplementary material: 作者: senile-dementia 時(shí)間: 2025-3-25 23:42
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/e/image/300189.jpg作者: AVANT 時(shí)間: 2025-3-26 04:02 作者: 油膏 時(shí)間: 2025-3-26 08:14 作者: REP 時(shí)間: 2025-3-26 10:14 作者: 熱情的我 時(shí)間: 2025-3-26 14:30
https://doi.org/10.1007/978-3-663-04826-8ociodemographic characteristics of voters and technical aspects of voting. Special attention is paid to voting and verification sessions that can be considered irregular (e.g. inability to cast a valid vote or failed verifications). We observe several interesting phenomena, e.g. that older people ar作者: fallible 時(shí)間: 2025-3-26 17:49 作者: mortgage 時(shí)間: 2025-3-26 23:04 作者: pester 時(shí)間: 2025-3-27 01:57 作者: 無目標(biāo) 時(shí)間: 2025-3-27 07:47 作者: 衣服 時(shí)間: 2025-3-27 12:56 作者: aphasia 時(shí)間: 2025-3-27 17:11 作者: NEXUS 時(shí)間: 2025-3-27 20:56
The Peace of Westphalia, 1648–1948he Australian state of Tasmania into higher-order logic, producing .. Based on this logical specification, we then encoded an SML program to count ballots according to this specification inside the interactive theorem prover HOL4, giving us .. We then manually transliterated the program as a real SM作者: 浪費(fèi)時(shí)間 時(shí)間: 2025-3-28 01:26
Essays on Women in Western Esotericisme system used until recently in Geneva was a simple Internet voting system which assumed that the voter’s personal computer had not been compromised. This was considered risky already at the time and various counter-measures were considered. The one that was implemented in practice was to limit the 作者: 黑豹 時(shí)間: 2025-3-28 03:40 作者: Orchiectomy 時(shí)間: 2025-3-28 07:25 作者: 沉積物 時(shí)間: 2025-3-28 10:37
2015 Neuchatel’s Cast-as-Intended Verification Mechanismrough a voting client, one of the most important dangers a designer faces are malicious voting clients (e.g. infected by a malware), which may change the voter’s selections. A previous approach for achieving cast-as-intended verification in this setting uses the so-called Return Codes. These allow a作者: galley 時(shí)間: 2025-3-28 15:51 作者: 向下五度才偏 時(shí)間: 2025-3-28 21:13 作者: fleeting 時(shí)間: 2025-3-29 01:09 作者: 放大 時(shí)間: 2025-3-29 06:31 作者: nitric-oxide 時(shí)間: 2025-3-29 08:28
Vote Validatability in Mix-Net-Based eVotingistics of Mix-Net-based eVoting is that ballots are usually decrypted individually and, as a consequence, invalid votes can be detected during the tallying of the election. In particular, this means that the ballot does not need to contain a proof of the vote being valid..However, allowing for inval作者: 釘牢 時(shí)間: 2025-3-29 12:29 作者: 諷刺滑稽戲劇 時(shí)間: 2025-3-29 18:19
Document Analysis Techniques for Automatic Electoral Document Processing: A Surveys community that can be applied in each case. We will cover Optical Mark Recognition techniques to detect voter selections in the Australian Ballot, handwritten number recognition for preferential elections and handwriting recognition for write-in areas. We will also propose some particular adjustme