Electronic voting : second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, proceedings /: second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, proceedings. (2017)
- Record Type:
- Book
- Title:
- Electronic voting : second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, proceedings /: second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, proceedings. (2017)
- Main Title:
- Electronic voting : second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, proceedings
- Other Titles:
- E-Vote-ID 2017
- Further Information:
- Note: Robert Krimmer, Melanie Volkamer, Nadja Braun Binder, Norbert Kersting, Olivier Pereira, Carsten Schürmann (eds.).
- Editors:
- Krimmer, Robert
Volkamer, Melanie
Binder, Nadja Braun
Kersting, Norbert
Péreira, Olivier
Schürmann, C (Carsten) - Other Names:
- E-Vote-ID (Conference), 2nd
- Contents:
- Election Security and Economics: It's all about Eve -- Cryptographic Security Analysis of E-Voting Systems: Achievements, Misconceptions, and Limitations -- Voting in E-participation: A Set of Requirements to Support Accountability and Trust by Electoral Committees -- The Weakness of Cumulative Voting -- No More Excuses: Automated Synthesis of Practical and Verifiable Vote-counting Programs for Complex Voting Schemes -- Public Evidence from Secret Ballots -- A Mechanized Proof of Selene Receipt Freeness and Privacy -- Trust Implications of DDoS Protection in Online Elections -- Updated European Standards for e-voting -- A Formally Verified Single Transferable Vote Scheme with Fractional Values -- Reverse Bayesian poisoning: How to use spam filters to manipulate online elections -- Return Code Schemes for Electronic Voting Systems -- Eos A Universal Verifiable and Coercion Resistant Voting Protocol -- Clash attacks and the STAR-Vote system -- Verifiability experiences in government online voting systems -- Cast-as-Intended Mechanism with Return Codes Based on PETs -- How Could Snowden Attack an Election -- Bits or Paper: which should get to carry your vote -- Estonian Voting Verification Mechanism Revisited Again.
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2017
- Extent:
- 1 online resource, illustrations
- Subjects:
- 324.6/5
Computer science
Electronic voting -- Congresses
Electronic voting
Computer Science
Data Encryption
Systems and Data Security
Software Engineering
Coding and Information Theory
Computer Communication Networks
Computer Appl. in Administrative Data Processing
Computers -- Security -- General
Computers -- Software Development & Engineering -- General
Computers -- Information Theory
Computers -- Hardware -- Network Hardware
Computers -- Data Processing
Computer security
Software Engineering
Coding theory & cryptology
Network hardware
Public administration
Data encryption (Computer science)
Computer security
Software engineering
Coding theory
Computer Communication Networks
Information systems
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783319686875
3319686879 - Related ISBNs:
- 9783319686868
3319686860 - Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed October 19, 2017).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.366571
- Ingest File:
- 01_343.xml