和平 发表于 2025-3-28 17:44:12

http://reply.papertrans.cn/48/4719/471836/471836_41.png

Nebulous 发表于 2025-3-28 21:56:33

rtunately, in most electronic voting systems the proofs for individual verifiability are non-intuitive and, moreover, need trusted devices to be checked. Based on the remote voting system JCJ/Civitas, we propose Trivitas, a protocol that achieves direct and end-to-end individual verifiability, while

玉米 发表于 2025-3-29 02:12:03

http://reply.papertrans.cn/48/4719/471836/471836_43.png

vitrectomy 发表于 2025-3-29 05:08:58

http://reply.papertrans.cn/48/4719/471836/471836_44.png

混合物 发表于 2025-3-29 07:27:39

Oluseyi Adeyemi,Dmitrij Slepniov,Brian Vejrum Wæhrens,Harry Boer,Xiaobo Wuiable identi?cation and reliable non-identi?ability each at its part during the process. And only a few processes may change their outer appearance so much with the advent of new IT as voting and identity management do. So it was no surprise in FIDIS, the interdisciplinary Network of Excellence work

Crepitus 发表于 2025-3-29 13:49:33

http://reply.papertrans.cn/48/4719/471836/471836_46.png

隐语 发表于 2025-3-29 16:48:11

http://reply.papertrans.cn/48/4719/471836/471836_47.png

AORTA 发表于 2025-3-29 21:57:43

Torbjørn H. Netlandate election in New South Wales, Australia. During the election, we performed an independent security analysis of parts of the live iVote system and uncovered severe vulnerabilities that could be leveraged to manipulate votes, violate ballot privacy, and subvert the verification mechanism. These vul
页: 1 2 3 4 [5]
查看完整版本: Titlebook: International Operations Networks; John Johansen,Sami Farooq,Yang Cheng Book 2014 Springer-Verlag London 2014 Global Manufacturing Operati