Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[PDF][PDF] Human factors in coercion resistant internet voting–a review of existing solutions and open challenges
While Internet voting has a potential of improving the democratic processes, it introduces
new challenges to the security of the election, such as the possibility of voter coercion due to …
new challenges to the security of the election, such as the possibility of voter coercion due to …
Electronic scoring scheme based on real paillier encryption algorithms
W Rong-Bing, L Ya-Nan, X Hong-Yan, F Yong… - IEEE …, 2019 - ieeexplore.ieee.org
Paillier algorithm has higher time efficiency than other homomorphic encryption algorithms
due to only one power operation is required, but its encryption range is limited to integer …
due to only one power operation is required, but its encryption range is limited to integer …
A secure e-Government's e-voting system
MH Sedky, EMR Hamed - 2015 Science and Information …, 2015 - ieeexplore.ieee.org
This paper proposed a reliable cost effective secure electronic voting system that can be
used in cost effectively way in many development countries like Egypt. The important …
used in cost effectively way in many development countries like Egypt. The important …
A survey of cryptographic and stegano-cryptographic models for secure electronic voting system
The success rate of an electronic voting system in electronic decision making is dependent
on security, authenticity and integrity of pre-electoral, electoral and post electoral phases of …
on security, authenticity and integrity of pre-electoral, electoral and post electoral phases of …
[KİTAP][B] Human-centered system design for electronic governance
S Saeed, CG Reddick - 2013 - books.google.com
As e-government policies and procedures become widely practiced and implemented, it is
apparent that the success of technology in e-government hangs on its consistentency with …
apparent that the success of technology in e-government hangs on its consistentency with …
Commutative re-encryption techniques: Significance and analysis
Commutative re-encryption techniques are important tools for different applications where
the encryption and decryption operations are performed in arbitrary order. These techniques …
the encryption and decryption operations are performed in arbitrary order. These techniques …
A proposal for the use of blockchain in the portuguese voting system
BF Braz - 2021 - search.proquest.com
The key objective of this proposal is to present one of the problems that the Portuguese
economy, as well as other European countries, have been facing in regard to the civil …
economy, as well as other European countries, have been facing in regard to the civil …
Democratic governance: a review of secured digital electoral service infrastructure
LMP Selvam, V Ponnusamy, K Rafique - … recent technologies for …, 2020 - igi-global.com
In any democratic nation, electoral processes pave the way to democratic governance. In
regards to this, a fully digitized online voting system should be introduced, and governments …
regards to this, a fully digitized online voting system should be introduced, and governments …
Authentication mechanisms for E-Voting
The e-government paradigm became an essential path for governments to reach citizens
and businesses and to improve service and public performance. One of the important tools …
and businesses and to improve service and public performance. One of the important tools …
An approach to the efficient security algorithms used in voting scanning in an electoral process
It was considered that the security of information is an important factor in an electoral
process in a country; for the frequent problems that have been detected in the scanning of …
process in a country; for the frequent problems that have been detected in the scanning of …