找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: E-Voting and Identity; 4th International Co James Heather,Steve Schneider,Vanessa Teague Conference proceedings 2013 Springer-Verlag Berlin

[复制链接]
楼主: Ford
发表于 2025-3-23 10:35:18 | 显示全部楼层
发表于 2025-3-23 15:25:20 | 显示全部楼层
Vote Casting in Any Preferred Constituency: A New Voting Channel, any constituency can be constitutionally compliant, while maintaining the current electoral system. We also consider the integration of the new German electronic ID card for voter identification and authentication.
发表于 2025-3-23 21:18:20 | 显示全部楼层
Attacking the Verification Code Mechanism in the Norwegian Internet Voting System,ios appear. We show how an adversary may exploit these scenarios in systems providing vote updating and point out the consequences for the vote integrity in the Norwegian system. We also give a list of possible counter-measures and system enhancements to prevent and detect such attacks.
发表于 2025-3-24 00:29:00 | 显示全部楼层
发表于 2025-3-24 03:22:38 | 显示全部楼层
,Prêt à Voter Providing Everlasting Privacy,acy towards the authorities can be achieved by implementing several organisational measures. A legal evaluation of these measures demonstrates that the level of privacy achieved would be acceptable under German law.
发表于 2025-3-24 08:41:55 | 显示全部楼层
On the Specification and Verification of Voting Schemes,ed model-checking can be used to test whether these criteria are met. As a case study, we then analyse an existing voting scheme for electing the board of trustees for a major international conference and discuss its deficiencies.
发表于 2025-3-24 11:53:50 | 显示全部楼层
A Formal Model for the Requirement of Verifiability in Electronic Voting by Means of a Bulletin Boaility is a specific security function, which is subject to certification itself. This paper presents a formal security requirements model for the verifiability of electronic voting systems by means of a Bulletin Board that publishes all important communication steps without violating the secrecy of voting.
发表于 2025-3-24 18:46:03 | 显示全部楼层
Analysis of an Electronic Boardroom Voting System,ns of this system, exhibiting potential attacks. We then formally model the system in the applied pi-calculus, and prove that two versions ensure both vote correctness (even if the devices are corrupted) and ballot secrecy (assuming the devices are honest).
发表于 2025-3-24 19:14:46 | 显示全部楼层
发表于 2025-3-24 23:36:59 | 显示全部楼层
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-4 09:03
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表