勉励 发表于 2025-3-23 10:35:18
http://reply.papertrans.cn/31/3002/300185/300185_11.png粘土 发表于 2025-3-23 15:25:20
Vote Casting in Any Preferred Constituency: A New Voting Channel, any constituency can be constitutionally compliant, while maintaining the current electoral system. We also consider the integration of the new German electronic ID card for voter identification and authentication.过于平凡 发表于 2025-3-23 21:18:20
Attacking the Verification Code Mechanism in the Norwegian Internet Voting System,ios appear. We show how an adversary may exploit these scenarios in systems providing vote updating and point out the consequences for the vote integrity in the Norwegian system. We also give a list of possible counter-measures and system enhancements to prevent and detect such attacks.努力赶上 发表于 2025-3-24 00:29:00
http://reply.papertrans.cn/31/3002/300185/300185_14.pngGlossy 发表于 2025-3-24 03:22:38
,Prêt à Voter Providing Everlasting Privacy,acy towards the authorities can be achieved by implementing several organisational measures. A legal evaluation of these measures demonstrates that the level of privacy achieved would be acceptable under German law.生命层 发表于 2025-3-24 08:41:55
On the Specification and Verification of Voting Schemes,ed model-checking can be used to test whether these criteria are met. As a case study, we then analyse an existing voting scheme for electing the board of trustees for a major international conference and discuss its deficiencies.葡萄糖 发表于 2025-3-24 11:53:50
A Formal Model for the Requirement of Verifiability in Electronic Voting by Means of a Bulletin Boaility is a specific security function, which is subject to certification itself. This paper presents a formal security requirements model for the verifiability of electronic voting systems by means of a Bulletin Board that publishes all important communication steps without violating the secrecy of voting.Ascribe 发表于 2025-3-24 18:46:03
Analysis of an Electronic Boardroom Voting System,ns of this system, exhibiting potential attacks. We then formally model the system in the applied pi-calculus, and prove that two versions ensure both vote correctness (even if the devices are corrupted) and ballot secrecy (assuming the devices are honest).艰苦地移动 发表于 2025-3-24 19:14:46
http://reply.papertrans.cn/31/3002/300185/300185_19.pngFallibility 发表于 2025-3-24 23:36:59
http://reply.papertrans.cn/31/3002/300185/300185_20.png