orthopedist 发表于 2025-3-25 04:23:17

https://doi.org/10.1007/978-3-662-63438-7nd discusses electronic voting machines (direct recording electronic voting machines and the Digital Election Pen). The fourth part focuses on remote electronic voting systems (including possible implementations of voter authentication, the secrecy of the vote, and the client-side voting software).

DEBT 发表于 2025-3-25 09:59:40

Eine Theologie der Menschenrechte,he requirements for stand-alone direct recording electronic voting machines). Then, the exact target of evaluation is defined. The partition for the requirements is also taken over from the previous section: First, the security and functional requirements are defined and then, the assurance, usability, and operational requirements.

ethereal 发表于 2025-3-25 15:11:51

http://reply.papertrans.cn/32/3174/317319/317319_23.png

共同时代 发表于 2025-3-25 16:38:26

http://reply.papertrans.cn/32/3174/317319/317319_24.png

不公开 发表于 2025-3-25 23:23:31

Requirements for Remote Electronic Votinghe requirements for stand-alone direct recording electronic voting machines). Then, the exact target of evaluation is defined. The partition for the requirements is also taken over from the previous section: First, the security and functional requirements are defined and then, the assurance, usability, and operational requirements.

Fierce 发表于 2025-3-26 01:52:04

Book 2009nities who are in the vanguard of technologies. The crucial aspect of security for electronic voting systems is subject to research by computer scientists as well as by legal, social and political scientists. The essential question is how to provide a trustworthy base for secure electronic voting, a

淡紫色花 发表于 2025-3-26 05:25:23

http://reply.papertrans.cn/32/3174/317319/317319_27.png

Common-Migraine 发表于 2025-3-26 11:22:00

Proof of Conceptetrieved from the extended and improved core Protection Profile as described in the previous chapter. This analysis is based on a system description deduced from available documents. The result is provided in this chapter.

Control-Group 发表于 2025-3-26 13:39:42

http://reply.papertrans.cn/32/3174/317319/317319_29.png

originality 发表于 2025-3-26 19:45:29

1865-1348 d protocols and in the application by communities who are in the vanguard of technologies. The crucial aspect of security for electronic voting systems is subject to research by computer scientists as well as by legal, social and political scientists. The essential question is how to provide a trust
页: 1 2 [3] 4 5
查看完整版本: Titlebook: Evaluation of Electronic Voting; Requirements and Eva Melanie Volkamer Book 2009 Springer-Verlag Berlin Heidelberg 2009 IT applications in