搜索结果: 1-5 共查到“军事学 voting systems”相关记录5条 . 查询时间(0.093 秒)
Authentication with weaker trust assumptions for voting systems
voting systems cryptographic protocols
2018/3/5
Some voting systems are reliant on external authentication services. Others use cryptography to implement their own. We combine digital signatures and non-interactive proofs to derive a generic constr...
We give a survey of existing attacks against end-to-end verifiable voting systems in the academic literature. We discuss attacks on the integrity of the election, attacks on the privacy of voters, and...
Cats and Dogs An Integrity for Voting Systems Based on Paper Ballots
Paper ballot Paper PUF Voting Integrity
2016/1/6
Abstract—Voting systems based on paper ballots has a long history with various problems. Vote-selling and correct outcome are two major problems among many. In this work, we propose a new solution to ...
One of the most challenging aspects in computer-supported voting is to combine the apparently conflicting requirements of privacy and verifiability. On the one hand, privacy requires that a vote canno...
Relay Attacks on RFID-Based Electronic Voting Systems
Relay Attacks RFID-Based Electronic Voting Systems
2009/9/2
Many secure systems, such as contactless credit cards and
secure entrance systems, are built with contactless smartcard RFID tech-
nologies. In many cases these systems are claimed to be secure base...