Electronic Voting Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings / [electronic resource] :
edited by Robert Krimmer, Melanie Volkamer, Nadja Braun Binder, Norbert Kersting, Olivier Pereira, Carsten Schürmann.
- 1st ed. 2017.
- X, 319 p. 35 illus. online resource.
- Security and Cryptology, 10615 2946-1863 ; .
- Security and Cryptology, 10615 .
Election Security and Economics: It's all about Eve -- Cryptographic Security Analysis of E-Voting Systems: Achievements, Misconceptions, and Limitations -- Voting in E-participation: A Set of Requirements to Support Accountability and Trust by Electoral Committees -- The Weakness of Cumulative Voting -- No More Excuses: Automated Synthesis of Practical and Verifiable Vote-counting Programs for Complex Voting Schemes -- Public Evidence from Secret Ballots -- A Mechanized Proof of Selene Receipt Freeness and Privacy -- Trust Implications of DDoS Protection in Online Elections -- Updated European Standards for e-voting -- A Formally Verified Single Transferable Vote Scheme with Fractional Values -- Reverse Bayesian poisoning: How to use spam filters to manipulate online elections -- Return Code Schemes for Electronic Voting Systems -- Eos A Universal Verifiable and Coercion Resistant Voting Protocol -- Clash attacks and the STAR-Vote system -- Verifiability experiences in government online voting systems -- Cast-as-Intended Mechanism with Return Codes Based on PETs -- How Could Snowden Attack an Election -- Bits or Paper: which should get to carry your vote -- Estonian Voting Verification Mechanism Revisited Again. .
This book constitutes the refereed proceedings of the Second International Joint Conference on Electronic Voting, E-Vote-ID 2017, held in Bregenz, Austria, in October 2017. The 16 full papers presented in this volume were carefully reviewed and selected from 48 submissions. In addition the book contains 3 keynote talks. The papers deal with security, usability and technical issues; administrative, legal, political and social issued; and election and practical experiences. .
9783319686875
10.1007/978-3-319-68687-5 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Software engineering.
Coding theory.
Information theory.
Computer networks .
Information technology--Management.
Cryptology.
Data and Information Security.
Software Engineering.
Coding and Information Theory.
Computer Communication Networks.
Computer Application in Administrative Data Processing.
QA268
005.824
Election Security and Economics: It's all about Eve -- Cryptographic Security Analysis of E-Voting Systems: Achievements, Misconceptions, and Limitations -- Voting in E-participation: A Set of Requirements to Support Accountability and Trust by Electoral Committees -- The Weakness of Cumulative Voting -- No More Excuses: Automated Synthesis of Practical and Verifiable Vote-counting Programs for Complex Voting Schemes -- Public Evidence from Secret Ballots -- A Mechanized Proof of Selene Receipt Freeness and Privacy -- Trust Implications of DDoS Protection in Online Elections -- Updated European Standards for e-voting -- A Formally Verified Single Transferable Vote Scheme with Fractional Values -- Reverse Bayesian poisoning: How to use spam filters to manipulate online elections -- Return Code Schemes for Electronic Voting Systems -- Eos A Universal Verifiable and Coercion Resistant Voting Protocol -- Clash attacks and the STAR-Vote system -- Verifiability experiences in government online voting systems -- Cast-as-Intended Mechanism with Return Codes Based on PETs -- How Could Snowden Attack an Election -- Bits or Paper: which should get to carry your vote -- Estonian Voting Verification Mechanism Revisited Again. .
This book constitutes the refereed proceedings of the Second International Joint Conference on Electronic Voting, E-Vote-ID 2017, held in Bregenz, Austria, in October 2017. The 16 full papers presented in this volume were carefully reviewed and selected from 48 submissions. In addition the book contains 3 keynote talks. The papers deal with security, usability and technical issues; administrative, legal, political and social issued; and election and practical experiences. .
9783319686875
10.1007/978-3-319-68687-5 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Software engineering.
Coding theory.
Information theory.
Computer networks .
Information technology--Management.
Cryptology.
Data and Information Security.
Software Engineering.
Coding and Information Theory.
Computer Communication Networks.
Computer Application in Administrative Data Processing.
QA268
005.824