نتایج جستجو برای: anonymity of voter
تعداد نتایج: 21164998 فیلتر نتایج به سال:
We develop a formal model in which the government provides public goods in different policy fields for its citizens. We start from the basic premise that two office-motivated candidates have differential capabilities in different policy fields, and compete by proposing how to allocate government resources to those fields. The model has a unique equilibrium that differs substantially from the st...
The Computing Research and Education Association of Australasia (CORE) is an association of university departments of computer science in Australia and New Zealand. This submission has been authorised by the President of CORE. The authors are both Computer Science and Engineering researchers whose main interest is in electronic voting and security. We have previously made submissions to parliam...
Voter turnout is considered the “canary in the coal mine” when it comes to assessing the health of civic participation in a democracy; low turnout in particular is indicative of broader problems. Although voter turnout is quite high in both Sweden and Finland, turnout is notably higher in Sweden despite a long list of similarities between the two countries. Why is there this puzzling discrepanc...
Abstract This paper considers contact processes with additional voter model dynamics. For such models, results of Lloyd and Sudbury can be applied to find a self-duality, as well as dualities and thinning relations with systems of random walks with annihilation, branching, coalescence, and deaths. We show that similar relations, which are known from the literature for certain interacting SDE’s,...
Recently, many e-voting systems have been proposed for successful election. It should be satisfied many requirements for successful e-voting. In this paper, we propose the ballot-cancellation scheme in order to manage invalid ballots. Many proposed e-voting systems have been proposed without considering invalid ballots. It can be happened an invalid ballot during e-voting, and then we should co...
We describe information security requirements for a secure and functional Internet voting scheme. Then we present the voting scheme with multiple parties; this voting scheme satisfies all these security requirements. In this scheme, the voter gets a signed key from the registrar, where the registrar signs the key as blinded. The voter uses this signed key during the voting period. All other par...
As social networking takes to the mobile world, smartphone apps provide users with ever-changing ways to interact with each other. Over the past few years, an increasing number of apps have entered the market offering end-to-end encryption, self-destructing messages, and/or some degree of anonymity. However, little work has carefully examined the features they offer. To this end, this paper pre...
Anonymous database search protocols allow users to query a database anonymously. This can be achieved by letting the users form a peerto-peer community and post queries on behalf of each other. In this article we discuss an application of combinatorial configurations (also known as regular and uniform partial linear spaces) to a protocol for anonymous database search, as defining the key-distri...
Anonymity has become a significant issue in security field by recent advances in information technology and internet. The main objective of anonymity is hiding and side a system. Many methods and protocols have been proposed with different anonymity services to provide anonymity requirements in various fields until now. Each anonymity method or protocol is developed using particular approach. I...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید