模仿 发表于 2025-3-30 11:02:33

Transparency and Technical Measures to Establish Trust in Norwegian Internet Votingernet elections are scheduled for fall 2011. Notably, transparency is taken as a guideline in the project. This article discusses transparency and other measures the Norwegians apply that are suited to establish profound trust, i.e. trust that grounds on the system’s technical features, rather than

聪明 发表于 2025-3-30 14:08:18

Internet Voting System with Cast as Intended Verificationrification methods can be used to audit this process, so that voters do not need to trust the voting client software. In this paper we present the revision of our initial proposal for the eValg2011 project for an Internet voting protocol providing cast as intended verification functionalities, and e

发出眩目光芒 发表于 2025-3-30 18:46:13

Linear Logical Voting Protocolsge. Because the gap between legal text and source code is very large, it is difficult to trust that the program meets its legal specification. In response, we promote linear logic as a high-level language for both specifying and implementing voting protocols. Our linear logical specifications of the

IST 发表于 2025-3-30 23:53:24

http://reply.papertrans.cn/31/3002/300186/300186_54.png

evince 发表于 2025-3-31 04:29:59

The Bug That Made Me President a Browser- and Web-Security Case Study on Helios Votingion website we discovered several small flaws that can have a large security critical impact. An attacker is able to extract sensitive information, manipulate voting results, and modify the displayed information of Helios without any deep technical knowledge or laboratory-like prerequisites. Display
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: E-Voting and Identity; Third International Aggelos Kiayias,Helger Lipmaa Conference proceedings 2012 Springer-Verlag Berlin Heidelberg 201