Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
On the notion of 'software independence'in voting systems
This paper defines and explores the notion of 'software independence'in voting systems:'A
voting system is software independent if an (undetected) change or error in its software …
voting system is software independent if an (undetected) change or error in its software …
Coercion-resistant electronic elections
We introduce a model for electronic election schemes that involves a more powerful
adversary than previous work. In particular, we allow the adversary to demand of coerced …
adversary than previous work. In particular, we allow the adversary to demand of coerced …
Spam detection on twitter using traditional classifiers
Social networking sites have become very popular in recent years. Users use them to find
new friends, updates their existing friends with their latest thoughts and activities. Among …
new friends, updates their existing friends with their latest thoughts and activities. Among …
Civitas: Toward a secure voting system
Civitas is the first electronic voting system that is coercion-resistant, universally and voter
verifiable, and suitable for remote voting. This paper describes the design and …
verifiable, and suitable for remote voting. This paper describes the design and …
Accountability: definition and relationship to verifiability
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting,
auction, identity-based encryption, and certain forms of secure multi-party computation …
auction, identity-based encryption, and certain forms of secure multi-party computation …
Selene: Voting with transparent verifiability and coercion-mitigation
End-to-end verifiable voting schemes typically involve voters handling an encrypted ballot in
order to confirm that their vote is accurately included in the tally. While this may be …
order to confirm that their vote is accurately included in the tally. While this may be …
PrÊt À Voter: a Voter-Verifiable Voting System
¿¿¿¿¿¿ Pre¿ ta¿ Voter provides a practical approach to end-to-end verifiable elections with
a simple, familiar voter-experience. It assures a high degree of transparency while …
a simple, familiar voter-experience. It assures a high degree of transparency while …
Remote electronic voting in uncontrolled environments: A classifying survey
Remote electronic voting, often called online or Internet voting, has been subject to research
for the last four decades. It is regularly discussed in public debates, especially in the context …
for the last four decades. It is regularly discussed in public debates, especially in the context …
[ספר][B] Real-world electronic voting: Design, analysis and deployment
Real-World Electronic Voting: Design, Analysis and Deployment captures all major
developments in electronic voting since 2003 in a real-world setting. It covers three broad …
developments in electronic voting since 2003 in a real-world setting. It covers three broad …
DEEPSEC: deciding equivalence properties in security protocols theory and practice
Automated verification has become an essential part in the security evaluation of
cryptographic protocols. Recently, there has been a considerable effort to lift the theory and …
cryptographic protocols. Recently, there has been a considerable effort to lift the theory and …