Electronic Voting Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings /

Electronic Voting Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings / [electronic resource] : edited by Robert Krimmer, Melanie Volkamer, Nadja Braun Binder, Norbert Kersting, Olivier Pereira, Carsten Schürmann. - 1st ed. 2017. - X, 319 p. 35 illus. online resource. - Security and Cryptology, 10615 2946-1863 ; . - Security and Cryptology, 10615 .

Election Security and Economics: It's all about Eve -- Cryptographic Security Analysis of E-Voting Systems: Achievements, Misconceptions, and Limitations -- Voting in E-participation: A Set of Requirements to Support Accountability and Trust by Electoral Committees -- The Weakness of Cumulative Voting -- No More Excuses: Automated Synthesis of Practical and Verifiable Vote-counting Programs for Complex Voting Schemes -- Public Evidence from Secret Ballots -- A Mechanized Proof of Selene Receipt Freeness and Privacy -- Trust Implications of DDoS Protection in Online Elections -- Updated European Standards for e-voting -- A Formally Verified Single Transferable Vote Scheme with Fractional Values -- Reverse Bayesian poisoning: How to use spam filters to manipulate online elections -- Return Code Schemes for Electronic Voting Systems -- Eos A Universal Verifiable and Coercion Resistant Voting Protocol -- Clash attacks and the STAR-Vote system -- Verifiability experiences in government online voting systems -- Cast-as-Intended Mechanism with Return Codes Based on PETs -- How Could Snowden Attack an Election -- Bits or Paper: which should get to carry your vote -- Estonian Voting Verification Mechanism Revisited Again.  .

This book constitutes the refereed proceedings of the Second International Joint Conference on Electronic Voting, E-Vote-ID 2017, held in Bregenz, Austria, in October 2017. The 16 full papers presented in this volume were carefully reviewed and selected from 48 submissions. In addition the book contains 3 keynote talks. The papers deal with security, usability and technical issues; administrative, legal, political and social issued; and election and practical experiences. .

9783319686875

10.1007/978-3-319-68687-5 doi


Cryptography.
Data encryption (Computer science).
Data protection.
Software engineering.
Coding theory.
Information theory.
Computer networks .
Information technology--Management.
Cryptology.
Data and Information Security.
Software Engineering.
Coding and Information Theory.
Computer Communication Networks.
Computer Application in Administrative Data Processing.

QA268

005.824
© 2024 IIIT-Delhi, library@iiitd.ac.in