支形吊灯 发表于 2025-3-25 05:02:24

https://doi.org/10.1007/978-3-642-47089-9ernet is exposed to virus, worms, spyware, malware and other threats that can endanger the election’s integrity. For instance, it is possible to write a virus that changes the voter’s vote to one predetermined vote on election’s day. It is possible to write such a virus so that the voter would not n

博爱家 发表于 2025-3-25 08:29:52

http://reply.papertrans.cn/31/3002/300188/300188_22.png

Classify 发表于 2025-3-25 13:47:29

978-3-540-77492-1Springer-Verlag Berlin Heidelberg 2007

高度赞扬 发表于 2025-3-25 19:16:23

http://reply.papertrans.cn/31/3002/300188/300188_24.png

易弯曲 发表于 2025-3-25 20:26:57

old purpose: it is an independent analysis of RIES-KOA and it is the first application of the Protection Profile. We indicate several issues with RIES-KOA and the Protection Profile, respectively, as learned during the analysis.

无底 发表于 2025-3-26 02:58:22

http://reply.papertrans.cn/31/3002/300188/300188_26.png

突袭 发表于 2025-3-26 04:33:24

Springer Tracts in Modern Physics 27gitales Wahlstift-System” - DWS). The main reasons for favoring this electronic voting system have been its closeness to the conventional voting procedure and therefore its acceptance among the voters, its security, and its verifiability.

招待 发表于 2025-3-26 11:43:34

https://doi.org/10.1007/978-3-662-31597-2 and there is large room for technical improvement. Typical security issues are lack of protection mechanism of programs and data on tabulation machines. This vulnerability enables malicious poll worker or manufacturer to insert malicious code to generate arbitrary election results.

VALID 发表于 2025-3-26 13:40:01

http://reply.papertrans.cn/31/3002/300188/300188_29.png

不规则的跳动 发表于 2025-3-26 17:12:40

http://reply.papertrans.cn/31/3002/300188/300188_30.png
页: 1 2 [3] 4 5 6 7
查看完整版本: Titlebook: E-Voting and Identity; First International Ammar Alkassar,Melanie Volkamer Conference proceedings 2007 Springer-Verlag Berlin Heidelberg 2