E-Voting and Identity Second International Conference, VOTE-ID 2009, Luxembourg, September 7-8, 2009, Proceedings / [electronic resource] :
edited by Peter Y. A. Ryan, Berry Schoenmakers.
- 1st ed. 2009.
- IX, 191 p. online resource.
- Security and Cryptology, 5767 2946-1863 ; .
- Security and Cryptology, 5767 .
Not-So Hidden Information: -- Masked Ballot Voting for Receipt-Free Online Elections -- Improving and Simplifying a Variant of Prêt à Voter -- Implications of Graphics on Usability and Accessibility for the Voter -- Assessing Voters' Attitudes towards Electronic Voting in Latin America: Evidence from Colombia's 2007 E-Voting Pilot -- Developing a Legal Framework for Remote Electronic Voting -- VeryVote: A Voter Verifiable Code Voting System -- Minimum Disclosure Counting for the Alternative Vote -- A Design of Secure Preferential E-Voting -- RIES - Rijnland Internet Election System: A Cursory Study of Published Source Code -- Combatting Electoral Traces: The Dutch Tempest Discussion and Beyond.
9783642041358
10.1007/978-3-642-04135-8 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Computers and civilization.
Computer networks .
Computers, Special purpose.
Information technology--Management.
Cryptology.
Data and Information Security.
Computers and Society.
Computer Communication Networks.
Special Purpose and Application-Based Systems.
Computer Application in Administrative Data Processing.
QA268
005.824
Not-So Hidden Information: -- Masked Ballot Voting for Receipt-Free Online Elections -- Improving and Simplifying a Variant of Prêt à Voter -- Implications of Graphics on Usability and Accessibility for the Voter -- Assessing Voters' Attitudes towards Electronic Voting in Latin America: Evidence from Colombia's 2007 E-Voting Pilot -- Developing a Legal Framework for Remote Electronic Voting -- VeryVote: A Voter Verifiable Code Voting System -- Minimum Disclosure Counting for the Alternative Vote -- A Design of Secure Preferential E-Voting -- RIES - Rijnland Internet Election System: A Cursory Study of Published Source Code -- Combatting Electoral Traces: The Dutch Tempest Discussion and Beyond.
9783642041358
10.1007/978-3-642-04135-8 doi
Cryptography.
Data encryption (Computer science).
Data protection.
Computers and civilization.
Computer networks .
Computers, Special purpose.
Information technology--Management.
Cryptology.
Data and Information Security.
Computers and Society.
Computer Communication Networks.
Special Purpose and Application-Based Systems.
Computer Application in Administrative Data Processing.
QA268
005.824