نتایج جستجو برای: anonymity of voter

تعداد نتایج: 21164998  

2008
Ben Riva

Many electronic voting protocols assume the voter votes with some computing device. This raises the question whether a voter can trust the device he is using. Three years ago, Chaum, and independently Neff, proposed what we call bare-handed electronic voting, where voters do not need any computational power in the voting booth. Their protocols have a strong unforgeability guarantee. The price f...

Journal: :Japanese Sociological Review 1980

2017
Leon Kellerhals Viatcheslav Korenwein Philipp Zschoche Robert Bredereck Jiehua Chen

Voter control problems model situations in which an external agent tries to affect the result of an election by adding or deleting the fewest number of voters. The goal of the agent is to make a specific candidate either win (constructive control) or lose (destructive control) the election. We study the constructive and destructive voter control problems when adding and deleting voters have a c...

2008
Joshua Johnson

Voter turnout statistics in elections across the United States reveal that political participation is too low. The United States Constitution was designed in a way to give the American people effective, elected representation at multiple levels. This can only be fulfilled if people actually turn out to vote. This study seeks to explain political participation at the city level. In city level po...

2013
Stéphanie Delaune Lucca Hirschi

Privacy is a general requirement that needs to be studied in different contexts. In a previous report, we identify some applications for wich privacy plays an important role, and with significant interest in terms of societal impact. In this report, we describe some case studies that we will use as a guideline for our research agenda. Our goal is to establish a repository of protocols that are ...

Journal: :journal of advances in computer research 0
masoumeh pourhasan department of computer engineering, faculty of engineering, chalous branch, islamic azad university, chalous, mazandaran, iran abbas karimi department of computer engineering, faculty of engineering, arak branch, islamic azad university, arak, markazi, iran

some applications are critical and must designed fault tolerant system. usually voting algorithm is one of the principle elements of a fault tolerant system. two kinds of voting algorithm are used in most applications, they are majority voting algorithm and weighted average algorithm these algorithms have some problems. majority confronts with the problem of threshold limits and voter of weight...

2004
Andrei Serjantov

Anonymity on the Internet is a property commonly identified with privacy of electronic communications. A number of different systems exist which claim to provide anonymous email and web browsing, but their effectiveness has hardly been evaluated in practice. In this thesis we focus on the anonymity properties of such systems. First, we show how the anonymity of anonymity systems can be quantifi...

1995
John G Matsusaka

Voting research is rich in empirical regularities yet a parsimonious theory of voter turnout that can match the facts has proven to be elusive. This paper argues that voter turnout patterns can be explained by extending the traditional rational voter model to include limited information. A model is presented in which utility-ma~ximizing consumers receive higher payoffs from voting the more conf...

2013
Janosch Maier

Microdata is the basis of statistical studies. If microdata is released, it can leak sensitive information about the participants, even if identifiers like name or social security number are removed. A proper anonymization for statistical microdata is essential. K-anonymity has been intensively discussed as a measure for anonymity in statistical data. Quasi identifiers are attributes that might...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید