Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
E-Voting: Election Phases and Security Measures
Graph Chatbot
Related lectures (29)
Digital Voting Systems: Security and Verifiability
Explores the security and verifiability of digital voting systems, including in-person and remote e-voting, focusing on protection against tampering and ballot counting efficiency.
Electronic Voting: Processes and Approaches
Explores electronic voting processes, approaches, and technologies, emphasizing integrity, fairness, and transparency in voting systems.
E-Voting: Research and Challenges
Explores e-voting research, digital algorithms, privacy challenges, and cryptographic methods in ensuring legitimacy and participation.
Decentralized E-Voting: Challenges and Solutions
Explores challenges and solutions in decentralized e-voting systems, emphasizing integrity, privacy, and coercion resistance.
E-Voting: Decentralized Systems for Democracy
Delves into e-voting systems, emphasizing decentralized democracy, election phases, and challenges in ensuring verifiability and security.
Social Influence and Choice
Explores social influence, democracy, individual autonomy, equality, and decision-making models.
E-voting: individual verifiability
Explores individual verifiability in the e-voting system, covering verifiable protocols, zero-knowledge proofs, and vote integrity.
Election Methods: Desirable Properties
Discusses election methods' desirable properties, multi-winner methods, district representation, gerrymandering, and the tyranny of the majority.
Weak Fiat-Shamir: Vulnerabilities in Cryptographic Protocols
Covers vulnerabilities in the Fiat-Shamir heuristic and its impact on Helios voting security.
Anonymity in Communication: Tor and Cryptographic Protocols
Explores anonymity in communication, focusing on Tor, cryptographic protocols, and challenges in achieving perfect anonymity.
Coalitions and Group Decisions
Explores Cooperative Game Theory, focusing on group decisions, voting protocols, manipulation, and the challenges of games with more than two players.
Untitled
Sybil Attacks and Defenses
Explores Sybil attacks, defense mechanisms, strong identity checking, and biometric identity systems for online security.
Mechanism Design and Crowdfunding
Explores mechanism design, crowdfunding, prediction markets, and quadratic voting.
Democratic Decision Making: Liquid Democracy
Explores liquid democracy, discussing its challenges and benefits in enhancing voter participation and decision-making processes.
UN Global Compacts
Explores the UN Global Compacts, focusing on migration and refugees, including Switzerland's stance and the impact on national sovereignty.
Mixnet based on Paillier
Explores a mixnet based on a secure verifiable shuffle system and its applications.
Casting & Molding: Physics of Manufacturing
Explores molding processes, casting physics, defects, key parameters, metal injection molding, and ongoing research on micro-/nano-scale casting.
Authentication and Best Practices: Challenges and Solutions
Explores authentication, identity theft risks, privacy protection, and ethical data handling.
Information Security: Communication, Calculation, Threats
Explores information security in communication, calculation, and digital threats, emphasizing data protection and access control.
Previous
Page 1 of 2
Next