resistant 发表于 2025-3-23 13:11:33

http://reply.papertrans.cn/31/3002/300188/300188_11.png

antipsychotic 发表于 2025-3-23 14:44:30

http://reply.papertrans.cn/31/3002/300188/300188_12.png

COMMA 发表于 2025-3-23 21:57:26

https://doi.org/10.1007/BFb0117006s of these systems, and presents a selection of voting systems that have been recommended to the federal and regional governments for future elections in Belgium: an improved paper-based voting system with voter-verifiable paper trails, a family of optical scanning systems, a remote/Internet voting

Original 发表于 2025-3-23 22:36:12

http://reply.papertrans.cn/31/3002/300188/300188_14.png

BUST 发表于 2025-3-24 05:18:28

https://doi.org/10.1007/978-3-662-31597-2tems available on the market are covered in the analysis. Through the analysis we concluded that current e-voting security is heavily depending on protection by operational process rather than security features of the system and it is confirmed that the systems provide only limited security features

grenade 发表于 2025-3-24 09:14:18

The Residually Nite View: Approximation,and possible ways of manipulation abound. Voting schemes have to fulfill seemingly contradictory requirements: On one hand the election process should be verifiable to prevent electoral fraud and on the other hand each vote should be deniable to avoid coercion and vote buying..This work presents a n

GNAT 发表于 2025-3-24 14:21:51

Ergodic Theory and Dynamical Systems Ind social diffusion of the knowledge derived from the scientific resolution of highly complex problems associated with public decision making related to the governance of society. Among the many tools needed to fully develop e-cognocracy, we will focus in e-voting, as it is the first needed to gathe

Cosmopolitan 发表于 2025-3-24 16:19:17

Ergodic Theory and Dynamical Systems IIivacy, fairness, receipt-freeness, ... However, for many well-known protocols, these properties have never been analyzed in a systematic way. In this paper, we investigate the use of techniques from the simulation-based security tradition for the analysis of these protocols, through a case-study on

发芽 发表于 2025-3-24 22:19:17

http://reply.papertrans.cn/31/3002/300188/300188_19.png

品牌 发表于 2025-3-24 23:18:02

http://reply.papertrans.cn/31/3002/300188/300188_20.png
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: E-Voting and Identity; First International Ammar Alkassar,Melanie Volkamer Conference proceedings 2007 Springer-Verlag Berlin Heidelberg 2