Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Lecture
Untitled
Graph Chatbot
Related lectures (18)
Election Methods: Desirable Properties
Discusses election methods' desirable properties, multi-winner methods, district representation, gerrymandering, and the tyranny of the majority.
Coalitions and Group Decisions
Explores Cooperative Game Theory, focusing on group decisions, voting protocols, manipulation, and the challenges of games with more than two players.
Digital Voting Systems: Security and Verifiability
Explores the security and verifiability of digital voting systems, including in-person and remote e-voting, focusing on protection against tampering and ballot counting efficiency.
E-Voting: Election Phases and Security Measures
Discusses election phases, ballot security, privacy, and transparency in e-voting.
Untitled
Electronic Voting: Processes and Approaches
Explores electronic voting processes, approaches, and technologies, emphasizing integrity, fairness, and transparency in voting systems.
E-Voting: Decentralized Systems for Democracy
Delves into e-voting systems, emphasizing decentralized democracy, election phases, and challenges in ensuring verifiability and security.
Social Influence and Choice
Explores social influence, democracy, individual autonomy, equality, and decision-making models.
Decentralized E-Voting: Challenges and Solutions
Explores challenges and solutions in decentralized e-voting systems, emphasizing integrity, privacy, and coercion resistance.
E-Voting: Research and Challenges
Explores e-voting research, digital algorithms, privacy challenges, and cryptographic methods in ensuring legitimacy and participation.
E-voting: individual verifiability
Explores individual verifiability in the e-voting system, covering verifiable protocols, zero-knowledge proofs, and vote integrity.
Anonymity and Governance in Online Forums
Discusses anonymity, dark side issues, mitigation strategies, and governance in online forums.
Weak Fiat-Shamir: Vulnerabilities in Cryptographic Protocols
Covers vulnerabilities in the Fiat-Shamir heuristic and its impact on Helios voting security.
Anonymity in Communication: Tor and Cryptographic Protocols
Explores anonymity in communication, focusing on Tor, cryptographic protocols, and challenges in achieving perfect anonymity.
UN Global Compacts
Explores the UN Global Compacts, focusing on migration and refugees, including Switzerland's stance and the impact on national sovereignty.
Mixnet based on Paillier
Explores a mixnet based on a secure verifiable shuffle system and its applications.
Numerical Analysis: Implicit Schemes
Covers implicit schemes in numerical analysis for solving partial differential equations.
Mechanism Design and Crowdfunding
Explores mechanism design, crowdfunding, prediction markets, and quadratic voting.
Previous
Page 1 of 1
Next