Showing 1 - 17 results of 17 for search '"electronic voting"', query time: 0.05s Refine Results
  1. 1
  2. 2
  3. 3

    Boardroom electronic voting scheme based on DC-net by Long-hai LI, Shao-feng FU, Cheng-qiang HUANG

    Published 2012-09-01
    Subjects: “…electronic voting…”
    Get full text
    Article
  4. 4

    Electronic Voting Protocol Using Identity-Based Cryptography by Gina Gallegos-Garcia, Horacio Tapia-Recillas

    Published 2015-01-01
    “…Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. …”
    Get full text
    Article
  5. 5
  6. 6

    ENSURING HUMAN RIGHTS IN THE CONTEXT OF IMPLEMENTATION OF ELECTRONIC VOTING IN UKRAINE: PERSPECTIVES AND RISKS by Liudmyla Gudz

    Published 2024-05-01
    “…However, recent events in Brazil and the United States show that unscrupulous politicians can challenge the operation of any electronic voting system, which can lead to mass protests and unrest. …”
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Virtual general meetings by Radović Vuk G.

    Published 2024-01-01
    Subjects:
    Get full text
    Article
  13. 13
  14. 14

    Design of a SMS Based Voting System. by Owembabazi Justus

    Published 2023
    “…Related literature about the electronic voting was cited. The Waterfall project development method was used for this project. …”
    Get full text
    Thesis
  15. 15

    LEADERSHIP, GOOD GOVERNANCE AND DEVELOPMENT IN NIGERIA by ADENIYI ADEKUNLE

    Published 2023-12-01
    “…The paper recommended the use of electronic voting systems and the demonstration of material and human security as solutions to problems. …”
    Get full text
    Article
  16. 16

    An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing by Hossein Pilaram, Taraneh Eghlidos, Rahim Toluee

    Published 2021-01-01
    “…Abstract Secret sharing is a cryptographic technique used in many different applications such as cloud computing, multi‐party computation and electronic voting. Security concerns in these applications are data privacy, availability, integrity and verifiability, where secret sharing provides proper solutions. …”
    Get full text
    Article
  17. 17

    Development of the blockchain curriculum system based on the PRIDE teaching mode by Yizhong LIU, Jianwei LIU, Qianhong WU

    Published 2024-02-01
    “…In recent years, with the widespread attention received by its currency attributes from all sectors of society, blockchain technology has been rapidly developed.Being an emerging technology, blockchain technology possessed characteristics such as decentralization, immutability, and anonymity that found extensive applications in digital currency, supply chain management, electronic voting and other fields.In response to the government's call, universities across the country began offering blockchain courses.However, during the actual teaching process, common problems such as lack of educational resources and untimely curriculum updates were encountered.Many blockchain courses in universities remained at the theoretical level and lacked practical application and practice, resulting in poor learning effectiveness and difficulty in meeting societal needs.To address these problems, a blockchain curriculum construction scheme based on the PRIDE teaching model was proposed.This scheme combined the advantages of traditional teaching models with the characteristics of blockchain courses were combined, incorporating political teaching, research teaching, inspiration teaching, seminar teaching, and example teaching into blockchain courses.The aim was to improve students’ learning effectiveness and practical application abilities.Through years of teaching verification, it was proven that this scheme successfully resolved the issues existing in traditional blockchain courses and improved learning effectiveness and practical application abilities.Additionally, the scheme met the requirements for training cyberspace security talent, providing a strong talent guarantee for the development and application of blockchain technology in China while achieving significant teaching effects.…”
    Get full text
    Article