搜索结果: 1-4 共查到“军事学 voting protocols”相关记录4条 . 查询时间(0.077 秒)
Verifiability Notions for E-Voting Protocols
e-voting verifiability protocol analysis
font style='font-size:12px;'>
2016/3/18
There have been intensive research efforts in the last two decades or so to design and deploy electronic voting (e-voting) protocols/systems which allow voters and/or external auditors to check that t...
Type-Based Verification of Electronic Voting Protocols
e-voting type systems verifiability
font style='font-size:12px;'>
2016/1/4
E-voting protocols aim at achieving a wide range of sophisticated security
properties and, consequently, commonly employ advanced cryptographic
primitives. This makes their design as well as rigorou...
Two Simple Code-Verification Voting Protocols
Cybernetica AS, Estonia Tallinn University, Estonia
font style='font-size:12px;'>
2011/7/25
Norwegian nationwide Internet voting will make use of a setting that we will call the code-verification voting. The concrete protocol that will be used in Norway was proposed by Scytl and improved by ...
Two Simple Code-Verification Voting Protocols
applications / Code-verification voting Internet voting malicious voter PC
font style='font-size:12px;'>
2012/3/27
Norwegian nationwide Internet voting will make use of a setting that we will call the code-verification voting. The concrete protocol that will be used in Norway was proposed by Scytl and improved by ...