E-voting and identify : 4th international conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013, proceedings / James Heather, Steve Schneider, Vanessa Teague (eds.).Material type: TextSeries: Serienbezeichnung | Lecture notes in computer science ; 7985. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Berlin ; New York : Springer, ©2013. Description: 1 online resource (209 pages) : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783642391859; 3642391850Other title: Vote-ID 2013Subject(s): Electronic voting -- Congresses | Data encryption (Computer science) -- Congresses | Computer software -- Verification -- Congresses | Politics | Software | Civil Rights | Computer software -- Verification | Data encryption (Computer science) | Electronic voting | Computer science | Computer Communication Networks | Software engineering | Data protection | Data encryption (Computer science) | Information systems | Systems and Data Security | Special Purpose and Application-Based Systems | Computer Appl. in Administrative Data ProcessingGenre/Form: Congress. | Electronic books. | Ebook. | Conference papers and proceedings. Additional physical formats: Print version:: E-voting and identify.DDC classification: 324.6/50285 LOC classification: JF1032 | .V68 2013ebNLM classification: JF 1032Online resources: Click here to access online
|Item type||Current library||Collection||Call number||Status||Date due||Barcode||Item holds|
International conference proceedings.
Includes author index.
Online resource; title from PDF title page (SpringerLink, viewed July 17, 2013).
This book constitutes the thoroughly refereed conference proceedings of the 4th International Conference on E-Voting and Identity, VoteID 2013, held in Guildford, UK, during July 17-19, 2013. The 12 revised full papers presented were carefully selected from 26 submissions. The papers include a range of works on end-to-end verifiable election systems, verifiably correct complex tallying algorithms, human perceptions of verifiability, formal models of verifiability and, of course, attacks on systems formerly advertised as verifiable.
Print version record.
Scaling Privacy Guarantees in Code-Verification Elections -- On the Specification and Verification of Voting Schemes -- Formal Model-based Validation for Tally Systems -- Vote Casting In Any Preferred Constituency: A New Voting Channel -- Attacking the Verification Code Mechanism in the Norwegian Internet Voting System.-A Formal Model for the Requirement of Verifiability in Electronic Voting by means of a Bulletin Board -- Analysis of an Electronic Boardroom Voting System -- Dispute Resolution in Accessible Voting Systems: The Design and Use of Audiotegrity -- Mental Models of Verifiability in Voting -- Towards a Practical Internet Voting Scheme Based on Malleable Proofs -- A Practical Coercion Resistant Voting Scheme Revisited.