军事学 >>> 军事学
搜索结果: 1-15 共查到军事学 electronic voting相关记录17条 . 查询时间(0.085 秒)
In this work, we propose a first version of an e-voting scheme that achieves end-to-end verifiability, everlasting privacy and efficient coercion resistance in the JCJ setting. Everlasting privacy is ...
We describe an efficient and secure decryption protocol to the Norwegian Internet voting project. We first adapt Groth’s shuffledecryption from 2010 to our purpose, and we prove all security proper...
We propose a new Direct-Recording Electronic (DRE)-based voting system that we call TRVote. The reliability of TRVote is ensured during the vote generation phase where the random challenges are genera...
E-voting protocols aim at achieving a wide range of sophisticated security properties and, consequently, commonly employ advanced cryptographic primitives. This makes their design as well as rigorou...
We propose a new voting scheme, BeleniosRF, that offers both strong receipt-freeness and end-to-end verifiability. It is strongly receipt-free in the sense that even dishonest voters cannot prove ho...
This paper presents a novel unifying framework for electronic voting in the universal composability model that includes a property which is new to universal composability but well-known to voting sy...
Electronic voting systems are among the most security critical distributed systems. Different trust concepts are implemented to mitigate the risk of conspiracies endangering security properties. These...
Abstract: We present a paper-based voting method that attempts to achieve the privacy of voters and election universal verifiability and integrity with only paper ballots and without using any cryptog...
This paper presents some proposals of protocols for two types of schemes such as verifiable delegation of computation and remote electronic voting, based on polynomial properties. Our protocols for ve...
The Direct Recording Electronic (DRE) system commonly uses touch-screen technology to directly record votes. It can provide several benefits in large-scale electronic voting, including usability, acce...
Mu and Varadharajan proposed an electronic voting scheme and claimed that their scheme authenticate the voters, protect the anonymity of them, and detect the identity of double voters. Due to some w...
Mu and Varadharajan proposed an electronic voting scheme and claimed that their scheme authenticate the voters, protect the anonymity of them, and detect the identity of double voters. Due to some w...
Mu et al. proposed an electronic voting protocol and claimed that it protects voter's anonymity, detects double voting and authenticates eligible voters. It has been shown that it does not protect v...
Many secure systems, such as contactless credit cards and secure entrance systems, are built with contactless smartcard RFID tech- nologies. In many cases these systems are claimed to be secure base...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...