Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Privacy and verifiability in voting systems: Methods, developments and trends
One of the most challenging aspects in computer-supported voting is to combine the
apparently conflicting requirements of privacy and verifiability. On the one hand, privacy …
apparently conflicting requirements of privacy and verifiability. On the one hand, privacy …
[หนังสือ][B] Introduction to cryptography
H Delfs, H Knebl, H Knebl - 2002 - Springer
VI Preface methods from information theory. Unconditionally secure schemes are now
addressed in an extra chapter, Chapter 10.• Unconditional security is not achievable without …
addressed in an extra chapter, Chapter 10.• Unconditional security is not achievable without …
PrÊt À Voter: a Voter-Verifiable Voting System
¿¿¿¿¿¿ Pre¿ ta¿ Voter provides a practical approach to end-to-end verifiable elections with
a simple, familiar voter-experience. It assures a high degree of transparency while …
a simple, familiar voter-experience. It assures a high degree of transparency while …
Remote electronic voting in uncontrolled environments: A classifying survey
Remote electronic voting, often called online or Internet voting, has been subject to research
for the last four decades. It is regularly discussed in public debates, especially in the context …
for the last four decades. It is regularly discussed in public debates, especially in the context …
Accounttrade: Accountable protocols for big data trading against dishonest consumers
We propose AccountTrade, a set of accountable protocols, for big data trading among
dishonest consumers. To secure the big data trading environment, our protocols achieve …
dishonest consumers. To secure the big data trading environment, our protocols achieve …
Selections: Internet voting with over-the-shoulder coercion-resistance
We present Selections, a new cryptographic voting protocol that is end-to-end verifiable and
suitable for Internet voting. After a one-time in-person registration, voters can cast ballots in …
suitable for Internet voting. After a one-time in-person registration, voters can cast ballots in …
A new approach towards coercion-resistant remote e-voting in linear time
O Spycher, R Koenig, R Haenni… - … Cryptography and Data …, 2012 - Springer
Remote electronic voting has attracted increasing attention in cryptographic research. A
promising protocol presented by Juels et al. is currently widely discussed. Although it offers …
promising protocol presented by Juels et al. is currently widely discussed. Although it offers …
Is the JCJ voting system really coercion-resistant?
Coercion-resistance is a security property of electronic voting, often considered as a must-
have for high-stake elections. The JCJ voting scheme, proposed in 2005 by Juels, Catalano …
have for high-stake elections. The JCJ voting scheme, proposed in 2005 by Juels, Catalano …
Accounttrade: Accountability against dishonest big data buyers and sellers
In this paper, a set of accountable protocols denoted as AccountTrade is proposed for big
data trading among dishonest consumers. For achieving a secure big data trading …
data trading among dishonest consumers. For achieving a secure big data trading …
Towards practical and secure coercion-resistant electronic elections
Coercion-resistance is the most effective property to fight coercive attacks in Internet
elections. This notion was introduced by Juels, Catalano, and Jakobsson (JCJ) at WPES …
elections. This notion was introduced by Juels, Catalano, and Jakobsson (JCJ) at WPES …