Sciweavers

683 search results - page 5 / 137
» Voting Technologies and Trust
Sort
View
WWW
2006
ACM
14 years 11 months ago
The credibility of the posted information in a recommendation system based on a map
We propose a method for estimating the credibility of the posted information from users. The system displays these information on the map. Since posted information can include sub...
Koji Yamamoto, Daisuke Katagami, Katsumi Nitta, Ak...
ICECCS
2005
IEEE
154views Hardware» more  ICECCS 2005»
14 years 4 months ago
Customizable Framework for Managing Trusted Components Deployed on Middleware
Due to the widespread trust threat under the open and dynamic Internet environment, the computer community has endeavored to engage in the studies of technologies for protecting a...
Minghui Zhou, Wenpin Jiao, Hong Mei
ICISS
2009
Springer
14 years 5 months ago
Remote Electronic Voting with Revocable Anonymity
We present a new remote, coercion-free electronic voting protocol which satisfies a number of properties previously considered contradictory. We introduce (and justify) the idea ...
Matt Smart, Eike Ritter
VOTEID
2007
Springer
14 years 5 months ago
Threat Analysis of a Practical Voting Scheme with Receipts
Kutylowski et al. have introduced a voter-verifiable electronic voting scheme ”a practical voting scheme with receipts”, which provides each voter with a receipt. The voter ca...
Sébastien Foulle, Steve Schneider, Jacques ...
DEXAW
2003
IEEE
108views Database» more  DEXAW 2003»
14 years 4 months ago
Electronic Voting Systems: Security Implications of the Administrative Workflow
With the rapid growth of the Internet, online voting appears to be a reasonable alternative to conventional elections and other opinion expressing processes. Current research focu...
Costas Lambrinoudakis, Spyros Kokolakis, Maria Kar...