和平
发表于 2025-3-28 17:44:12
http://reply.papertrans.cn/48/4719/471836/471836_41.png
Nebulous
发表于 2025-3-28 21:56:33
rtunately, in most electronic voting systems the proofs for individual verifiability are non-intuitive and, moreover, need trusted devices to be checked. Based on the remote voting system JCJ/Civitas, we propose Trivitas, a protocol that achieves direct and end-to-end individual verifiability, while
玉米
发表于 2025-3-29 02:12:03
http://reply.papertrans.cn/48/4719/471836/471836_43.png
vitrectomy
发表于 2025-3-29 05:08:58
http://reply.papertrans.cn/48/4719/471836/471836_44.png
混合物
发表于 2025-3-29 07:27:39
Oluseyi Adeyemi,Dmitrij Slepniov,Brian Vejrum Wæhrens,Harry Boer,Xiaobo Wuiable identi?cation and reliable non-identi?ability each at its part during the process. And only a few processes may change their outer appearance so much with the advent of new IT as voting and identity management do. So it was no surprise in FIDIS, the interdisciplinary Network of Excellence work
Crepitus
发表于 2025-3-29 13:49:33
http://reply.papertrans.cn/48/4719/471836/471836_46.png
隐语
发表于 2025-3-29 16:48:11
http://reply.papertrans.cn/48/4719/471836/471836_47.png
AORTA
发表于 2025-3-29 21:57:43
Torbjørn H. Netlandate election in New South Wales, Australia. During the election, we performed an independent security analysis of parts of the live iVote system and uncovered severe vulnerabilities that could be leveraged to manipulate votes, violate ballot privacy, and subvert the verification mechanism. These vul