搜索结果: 1-4 共查到“军事学 voting protocols”相关记录4条 . 查询时间(0.109 秒)
There have been intensive research efforts in the last two decades or so to design and deploy electronic voting (e-voting) protocols/systems which allow voters and/or external auditors to check that t...
E-voting protocols aim at achieving a wide range of sophisticated security
properties and, consequently, commonly employ advanced cryptographic
primitives. This makes their design as well as rigorou...
Two Simple Code-Verification Voting Protocols
Cybernetica AS, Estonia Tallinn University, Estonia
2011/7/25
Norwegian nationwide Internet voting will make use of a setting that we will call the code-verification voting. The concrete protocol that will be used in Norway was proposed by Scytl and improved by ...
Two Simple Code-Verification Voting Protocols
applications / Code-verification voting Internet voting malicious voter PC
2012/3/27
Norwegian nationwide Internet voting will make use of a setting that we will call the code-verification voting. The concrete protocol that will be used in Norway was proposed by Scytl and improved by ...