|
|
|
|
LEADER |
06980cam a22012132 4500 |
001 |
0-1649779488 |
003 |
DE-627 |
005 |
20240122105314.0 |
007 |
cr uuu---uuuuu |
008 |
100702s2010 gw |||||o 00| ||eng c |
020 |
|
|
|a 9783642129803
|9 978-3-642-12980-3
|
024 |
7 |
|
|a 10.1007/978-3-642-12980-3
|2 doi
|
035 |
|
|
|a (DE-627)1649779488
|
035 |
|
|
|a (DE-576)325491828
|
035 |
|
|
|a (DE-599)BSZ325491828
|
035 |
|
|
|a (OCoLC)692304665
|
035 |
|
|
|a (ZBM)1189.68005
|
035 |
|
|
|a (DE-He213)978-3-642-12980-3
|
035 |
|
|
|a (EBP)040519694
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
044 |
|
|
|c XA-DE
|
050 |
|
0 |
|a QA76.9.A25
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
084 |
|
|
|a SS 4800
|2 rvk
|0 (DE-625)rvk/143528:
|
084 |
|
|
|a *68-06
|2 msc
|
084 |
|
|
|a 68P25
|2 msc
|
084 |
|
|
|a 94A60
|2 msc
|
084 |
|
|
|a 00B25
|2 msc
|
084 |
|
|
|a 89.57
|2 bkl
|
084 |
|
|
|a 54.38
|2 bkl
|
100 |
1 |
|
|a Chaum, David
|4 aut
|
245 |
1 |
0 |
|a Towards Trustworthy Elections
|b New Directions in Electronic Voting
|c edited by David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida
|
264 |
|
1 |
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2010
|
300 |
|
|
|a Online-Ressource (VIII, 403p. 60 illus, digital)
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Lecture Notes in Computer Science
|v 6000
|
490 |
0 |
|
|a SpringerLink
|a Bücher
|
520 |
|
|
|a The Witness-Voting System -- Coercion-Resistant Electronic Elections -- Receipt-Free K-out-of-L Voting Based on ElGamal Encryption -- A Secure Architecture for Voting Electronically (SAVE) -- A Modular Voting Architecture (“Frog Voting”) -- Unconditionally Secure Electronic Voting -- Electronic Elections: A Balancing Act -- An Implementation of a Mix-Net Based Network Voting Scheme and Its Use in a Private Organization -- The Vector-Ballot Approach for Online Voting Procedures -- On Optical Mark-Sense Scanning -- On Some Incompatible Properties of Voting Schemes -- A Threat Analysis of Prêt à Voter -- Anonymity in Voting Revisited -- Anonymous One-Time Broadcast Using Non-interactive Dining Cryptographer Nets with Applications to Voting -- An Introduction to PunchScan -- Component Based Electronic Voting Systems -- A Verifiable Voting Protocol Based on Farnel -- Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster -- Improving Remote Voting Security with CodeVoting -- A Practical and Secure Coercion-Resistant Scheme for Internet Voting -- Scratch, Click & Vote: E2E Voting over the Internet -- Securing Optical-Scan Voting -- Attacking Paper-Based E2E Voting Systems -- Aperio: High Integrity Elections for Developing Countries.
|
520 |
|
|
|a For many years now, cryptography has been keeping messages secure for senders, irrespective of the routing to the destination. This same technology can be used to keep votes secure for voters, from the casting of the vote all the way through to the inclusion of the vote in the final tally. This state-of-the-art survey addresses the challenges faced in establishing a trustworthy electronic voting system. The 24 contributions included in the volume were carefully reviewed and selected from the presentations given during a series of workshops on trustworthy elections held over the last decade. Topics addresses range from foundational and theoretical aspects to algorithms and systems issues, as well as applications in various fields.
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Computer Communication Networks
|
650 |
|
0 |
|a Computer software
|
650 |
|
0 |
|a Information systems
|
650 |
|
0 |
|a Information Systems
|
650 |
|
0 |
|a Computer Science
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Computer networks .
|
650 |
|
0 |
|a Electronic data processing
|
650 |
|
0 |
|a Algorithms.
|
650 |
|
0 |
|a Computers and civilization.
|
650 |
|
0 |
|a Application software.
|
655 |
|
7 |
|a Aufsatzsammlung
|0 (DE-588)4143413-4
|0 (DE-627)105605727
|0 (DE-576)209726091
|2 gnd-content
|
689 |
0 |
0 |
|D s
|0 (DE-588)4432990-8
|0 (DE-627)222407808
|0 (DE-576)212393006
|a Elektronische Wahl
|2 gnd
|
689 |
0 |
1 |
|D s
|0 (DE-588)4213997-1
|0 (DE-627)10506856X
|0 (DE-576)210218037
|a Requirements engineering
|2 gnd
|
689 |
0 |
|
|5 DE-101
|
700 |
1 |
|
|a Adida, Ben
|4 oth
|
700 |
1 |
|
|a Benaloh, Josh
|4 oth
|
700 |
1 |
|
|a Jakobsson, Markus
|d 1968-
|0 (DE-588)111664701X
|0 (DE-627)870611755
|0 (DE-576)18790846X
|4 oth
|
700 |
1 |
|
|a Kutyłowski, Mirosław
|4 oth
|
700 |
1 |
|
|a Rivest, Ronald Linn
|d 1947-
|0 (DE-588)140222960
|0 (DE-627)616950101
|0 (DE-576)315236019
|4 oth
|
700 |
1 |
|
|a Ryan, Peter Y. A.
|4 oth
|
776 |
1 |
|
|z 9783642129797
|
776 |
0 |
8 |
|i Buchausg. u.d.T.
|t Towards trustworthy elections
|d Berlin : Springer, 2010
|h VIII, 401 S.
|w (DE-627)623788993
|w (DE-576)324820119
|z 364212979X
|z 9783642129797
|
830 |
|
0 |
|a Lecture notes in computer science
|v 6000
|9 6000
|w (DE-627)316228877
|w (DE-576)093890923
|w (DE-600)2018930-8
|x 1611-3349
|7 ns
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-12980-3
|m X:SPRINGER
|x Verlag
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
2 |
|u https://zbmath.org/?q=an:1189.68005
|m B:ZBM
|v 2021-04-12
|x Verlag
|y Zentralblatt MATH
|3 Inhaltstext
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|b 2010
|
912 |
|
|
|a ZDB-2-SEB
|
912 |
|
|
|a ZDB-2-SCS
|b 2010
|
912 |
|
|
|a ZDB-2-SXCS
|b 2010
|
912 |
|
|
|a ZDB-2-SEB
|b 2010
|
936 |
r |
v |
|a SS 4800
|b Lecture notes in computer science
|k Informatik
|k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen
|k Schriftenreihen (indiv. Sign.)
|k Lecture notes in computer science
|0 (DE-627)1271461242
|0 (DE-625)rvk/143528:
|0 (DE-576)201461242
|
936 |
b |
k |
|a 89.57
|j Politische Beteiligung
|q SEPA
|0 (DE-627)106418270
|
936 |
b |
k |
|a 54.38
|j Computersicherheit
|q SEPA
|0 (DE-627)106418866
|
951 |
|
|
|a BO
|
900 |
|
|
|a Rivest, Ronald L.
|
900 |
|
|
|a Rivest, Ronald
|
900 |
|
|
|a Rivest, R. L.
|
900 |
|
|
|a Rivest, R.
|
950 |
|
|
|a Information requirement analysis
|
950 |
|
|
|a Informationsbedarfsanalyse
|
950 |
|
|
|a Anforderungstechnik
|
950 |
|
|
|a Anforderungsdefinition
|
950 |
|
|
|a Rückverfolgbarkeit
|
950 |
|
|
|a E-Voting
|
950 |
|
|
|a Wahl
|
950 |
|
|
|a E-Government
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-12980-3
|9 DE-14
|
852 |
|
|
|a DE-14
|z 2011-07-20T14:58:39Z
|x epn:3334537358
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-12980-3
|9 DE-15
|
852 |
|
|
|a DE-15
|z 2011-05-16T16:35:34Z
|x epn:3334537420
|
976 |
|
|
|h Elektronischer Volltext - Campuslizenz
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-12980-3
|z Zum Online-Dokument
|9 DE-Zi4
|
852 |
|
|
|a DE-Zi4
|z 2011-01-26T14:32:14Z
|x epn:3334537536
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-12980-3
|9 DE-520
|
852 |
|
|
|a DE-520
|z 2012-11-21T16:09:39Z
|x epn:3334537587
|
980 |
|
|
|a 1649779488
|b 0
|k 1649779488
|o 325491828
|
SOLR
_version_ |
1789364957173776384 |
access_facet |
Electronic Resources |
author |
Chaum, David |
author2 |
Adida, Ben, Benaloh, Josh, Jakobsson, Markus, Kutyłowski, Mirosław, Rivest, Ronald Linn, Ryan, Peter Y. A. |
author2_role |
oth, oth, oth, oth, oth, oth |
author2_variant |
b a ba, j b jb, m j mj, m k mk, r l r rl rlr, p y a r pya pyar |
author_facet |
Chaum, David, Adida, Ben, Benaloh, Josh, Jakobsson, Markus, Kutyłowski, Mirosław, Rivest, Ronald Linn, Ryan, Peter Y. A. |
author_role |
aut |
author_sort |
Chaum, David |
author_variant |
d c dc |
callnumber-first |
Q - Science |
callnumber-label |
QA76 |
callnumber-raw |
QA76.9.A25 |
callnumber-search |
QA76.9.A25 |
callnumber-sort |
QA 276.9 A25 |
callnumber-subject |
QA - Mathematics |
collection |
ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS |
contents |
The Witness-Voting System -- Coercion-Resistant Electronic Elections -- Receipt-Free K-out-of-L Voting Based on ElGamal Encryption -- A Secure Architecture for Voting Electronically (SAVE) -- A Modular Voting Architecture (“Frog Voting”) -- Unconditionally Secure Electronic Voting -- Electronic Elections: A Balancing Act -- An Implementation of a Mix-Net Based Network Voting Scheme and Its Use in a Private Organization -- The Vector-Ballot Approach for Online Voting Procedures -- On Optical Mark-Sense Scanning -- On Some Incompatible Properties of Voting Schemes -- A Threat Analysis of Prêt à Voter -- Anonymity in Voting Revisited -- Anonymous One-Time Broadcast Using Non-interactive Dining Cryptographer Nets with Applications to Voting -- An Introduction to PunchScan -- Component Based Electronic Voting Systems -- A Verifiable Voting Protocol Based on Farnel -- Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster -- Improving Remote Voting Security with CodeVoting -- A Practical and Secure Coercion-Resistant Scheme for Internet Voting -- Scratch, Click & Vote: E2E Voting over the Internet -- Securing Optical-Scan Voting -- Attacking Paper-Based E2E Voting Systems -- Aperio: High Integrity Elections for Developing Countries., For many years now, cryptography has been keeping messages secure for senders, irrespective of the routing to the destination. This same technology can be used to keep votes secure for voters, from the casting of the vote all the way through to the inclusion of the vote in the final tally. This state-of-the-art survey addresses the challenges faced in establishing a trustworthy electronic voting system. The 24 contributions included in the volume were carefully reviewed and selected from the presentations given during a series of workshops on trustworthy elections held over the last decade. Topics addresses range from foundational and theoretical aspects to algorithms and systems issues, as well as applications in various fields. |
ctrlnum |
(DE-627)1649779488, (DE-576)325491828, (DE-599)BSZ325491828, (OCoLC)692304665, (ZBM)1189.68005, (DE-He213)978-3-642-12980-3, (EBP)040519694 |
de15_date |
2011-05-16T16:35:34Z |
doi_str_mv |
10.1007/978-3-642-12980-3 |
facet_912a |
ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS |
facet_avail |
Online |
facet_local_del330 |
Elektronische Wahl, Requirements engineering |
finc_class_facet |
Informatik, Allgemeines, Mathematik |
finc_id_str |
0000886047 |
fincclass_txtF_mv |
science-computerscience, politicalscience-administration-military |
format |
eBook |
format_access_txtF_mv |
Book, E-Book |
format_de105 |
Ebook |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-online-monograph-independent |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
ElectronicBook |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
E-Book |
genre |
Aufsatzsammlung (DE-588)4143413-4 (DE-627)105605727 (DE-576)209726091 gnd-content |
genre_facet |
Aufsatzsammlung |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
hierarchy_parent_id |
0-316228877 |
hierarchy_parent_title |
Lecture notes in computer science |
hierarchy_sequence |
6000 |
hierarchy_top_id |
0-316228877 |
hierarchy_top_title |
Lecture notes in computer science |
id |
0-1649779488 |
illustrated |
Not Illustrated |
imprint |
Berlin, Heidelberg, Springer Berlin Heidelberg, 2010 |
imprint_str_mv |
Berlin, Heidelberg: Springer Berlin Heidelberg, 2010 |
institution |
DE-14, DE-Zi4, DE-520, DE-15 |
is_hierarchy_id |
0-1649779488 |
is_hierarchy_title |
Towards Trustworthy Elections: New Directions in Electronic Voting |
isbn |
9783642129803 |
isbn_isn_mv |
9783642129797, 364212979X |
issn_isn_mv |
1611-3349 |
kxp_id_str |
1649779488 |
language |
English |
last_indexed |
2024-01-28T19:50:01.659Z |
local_heading_facet_dezwi2 |
Computer science, Computer Communication Networks, Computer software, Information systems, Information Systems, Computer Science, Data encryption (Computer science), Cryptography., Computer networks ., Electronic data processing, Algorithms., Computers and civilization., Application software., Elektronische Wahl, Requirements engineering |
marc024a_ct_mv |
10.1007/978-3-642-12980-3 |
match_str |
chaum2010towardstrustworthyelectionsnewdirectionsinelectronicvoting |
mega_collection |
Verbunddaten SWB |
multipart_link |
093890923 |
multipart_part |
(093890923)6000 |
names_id_str_mv |
(DE-588)111664701X, (DE-627)870611755, (DE-576)18790846X, (DE-588)140222960, (DE-627)616950101, (DE-576)315236019 |
oclc_num |
692304665 |
physical |
Online-Ressource (VIII, 403p. 60 illus, digital) |
publishDate |
2010 |
publishDateSort |
2010 |
publishPlace |
Berlin, Heidelberg |
publisher |
Springer Berlin Heidelberg |
record_format |
marcfinc |
record_id |
325491828 |
recordtype |
marcfinc |
rsn_id_str_mv |
(DE-15)2461805 |
rvk_facet |
SS 4800 |
rvk_label |
Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science |
rvk_path |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
rvk_path_str_mv |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
series |
Lecture notes in computer science, 6000 |
series2 |
Lecture Notes in Computer Science ; 6000, SpringerLink ; Bücher |
source_id |
0 |
spelling |
Chaum, David aut, Towards Trustworthy Elections New Directions in Electronic Voting edited by David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida, Berlin, Heidelberg Springer Berlin Heidelberg 2010, Online-Ressource (VIII, 403p. 60 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 6000, SpringerLink Bücher, The Witness-Voting System -- Coercion-Resistant Electronic Elections -- Receipt-Free K-out-of-L Voting Based on ElGamal Encryption -- A Secure Architecture for Voting Electronically (SAVE) -- A Modular Voting Architecture (“Frog Voting”) -- Unconditionally Secure Electronic Voting -- Electronic Elections: A Balancing Act -- An Implementation of a Mix-Net Based Network Voting Scheme and Its Use in a Private Organization -- The Vector-Ballot Approach for Online Voting Procedures -- On Optical Mark-Sense Scanning -- On Some Incompatible Properties of Voting Schemes -- A Threat Analysis of Prêt à Voter -- Anonymity in Voting Revisited -- Anonymous One-Time Broadcast Using Non-interactive Dining Cryptographer Nets with Applications to Voting -- An Introduction to PunchScan -- Component Based Electronic Voting Systems -- A Verifiable Voting Protocol Based on Farnel -- Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster -- Improving Remote Voting Security with CodeVoting -- A Practical and Secure Coercion-Resistant Scheme for Internet Voting -- Scratch, Click & Vote: E2E Voting over the Internet -- Securing Optical-Scan Voting -- Attacking Paper-Based E2E Voting Systems -- Aperio: High Integrity Elections for Developing Countries., For many years now, cryptography has been keeping messages secure for senders, irrespective of the routing to the destination. This same technology can be used to keep votes secure for voters, from the casting of the vote all the way through to the inclusion of the vote in the final tally. This state-of-the-art survey addresses the challenges faced in establishing a trustworthy electronic voting system. The 24 contributions included in the volume were carefully reviewed and selected from the presentations given during a series of workshops on trustworthy elections held over the last decade. Topics addresses range from foundational and theoretical aspects to algorithms and systems issues, as well as applications in various fields., Computer science, Computer Communication Networks, Computer software, Information systems, Information Systems, Computer Science, Data encryption (Computer science), Cryptography., Computer networks ., Electronic data processing, Algorithms., Computers and civilization., Application software., Aufsatzsammlung (DE-588)4143413-4 (DE-627)105605727 (DE-576)209726091 gnd-content, s (DE-588)4432990-8 (DE-627)222407808 (DE-576)212393006 Elektronische Wahl gnd, s (DE-588)4213997-1 (DE-627)10506856X (DE-576)210218037 Requirements engineering gnd, DE-101, Adida, Ben oth, Benaloh, Josh oth, Jakobsson, Markus 1968- (DE-588)111664701X (DE-627)870611755 (DE-576)18790846X oth, Kutyłowski, Mirosław oth, Rivest, Ronald Linn 1947- (DE-588)140222960 (DE-627)616950101 (DE-576)315236019 oth, Ryan, Peter Y. A. oth, 9783642129797, Buchausg. u.d.T. Towards trustworthy elections Berlin : Springer, 2010 VIII, 401 S. (DE-627)623788993 (DE-576)324820119 364212979X 9783642129797, Lecture notes in computer science 6000 6000 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-12980-3 X:SPRINGER Verlag lizenzpflichtig Volltext, https://zbmath.org/?q=an:1189.68005 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext, http://dx.doi.org/10.1007/978-3-642-12980-3 DE-14, DE-14 2011-07-20T14:58:39Z epn:3334537358, http://dx.doi.org/10.1007/978-3-642-12980-3 DE-15, DE-15 2011-05-16T16:35:34Z epn:3334537420, http://dx.doi.org/10.1007/978-3-642-12980-3 Zum Online-Dokument DE-Zi4, DE-Zi4 2011-01-26T14:32:14Z epn:3334537536, http://dx.doi.org/10.1007/978-3-642-12980-3 DE-520, DE-520 2012-11-21T16:09:39Z epn:3334537587 |
spellingShingle |
Chaum, David, Towards Trustworthy Elections: New Directions in Electronic Voting, Lecture notes in computer science, 6000, The Witness-Voting System -- Coercion-Resistant Electronic Elections -- Receipt-Free K-out-of-L Voting Based on ElGamal Encryption -- A Secure Architecture for Voting Electronically (SAVE) -- A Modular Voting Architecture (“Frog Voting”) -- Unconditionally Secure Electronic Voting -- Electronic Elections: A Balancing Act -- An Implementation of a Mix-Net Based Network Voting Scheme and Its Use in a Private Organization -- The Vector-Ballot Approach for Online Voting Procedures -- On Optical Mark-Sense Scanning -- On Some Incompatible Properties of Voting Schemes -- A Threat Analysis of Prêt à Voter -- Anonymity in Voting Revisited -- Anonymous One-Time Broadcast Using Non-interactive Dining Cryptographer Nets with Applications to Voting -- An Introduction to PunchScan -- Component Based Electronic Voting Systems -- A Verifiable Voting Protocol Based on Farnel -- Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster -- Improving Remote Voting Security with CodeVoting -- A Practical and Secure Coercion-Resistant Scheme for Internet Voting -- Scratch, Click & Vote: E2E Voting over the Internet -- Securing Optical-Scan Voting -- Attacking Paper-Based E2E Voting Systems -- Aperio: High Integrity Elections for Developing Countries., For many years now, cryptography has been keeping messages secure for senders, irrespective of the routing to the destination. This same technology can be used to keep votes secure for voters, from the casting of the vote all the way through to the inclusion of the vote in the final tally. This state-of-the-art survey addresses the challenges faced in establishing a trustworthy electronic voting system. The 24 contributions included in the volume were carefully reviewed and selected from the presentations given during a series of workshops on trustworthy elections held over the last decade. Topics addresses range from foundational and theoretical aspects to algorithms and systems issues, as well as applications in various fields., Computer science, Computer Communication Networks, Computer software, Information systems, Information Systems, Computer Science, Data encryption (Computer science), Cryptography., Computer networks ., Electronic data processing, Algorithms., Computers and civilization., Application software., Aufsatzsammlung, Elektronische Wahl, Requirements engineering |
swb_id_str |
325491828 |
title |
Towards Trustworthy Elections: New Directions in Electronic Voting |
title_auth |
Towards Trustworthy Elections New Directions in Electronic Voting |
title_full |
Towards Trustworthy Elections New Directions in Electronic Voting edited by David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida |
title_fullStr |
Towards Trustworthy Elections New Directions in Electronic Voting edited by David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida |
title_full_unstemmed |
Towards Trustworthy Elections New Directions in Electronic Voting edited by David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida |
title_in_hierarchy |
6000. Towards Trustworthy Elections: New Directions in Electronic Voting (2010) |
title_short |
Towards Trustworthy Elections |
title_sort |
towards trustworthy elections new directions in electronic voting |
title_sub |
New Directions in Electronic Voting |
title_unstemmed |
Towards Trustworthy Elections: New Directions in Electronic Voting |
topic |
Computer science, Computer Communication Networks, Computer software, Information systems, Information Systems, Computer Science, Data encryption (Computer science), Cryptography., Computer networks ., Electronic data processing, Algorithms., Computers and civilization., Application software., Aufsatzsammlung, Elektronische Wahl, Requirements engineering |
topic_facet |
Computer science, Computer Communication Networks, Computer software, Information systems, Information Systems, Computer Science, Data encryption (Computer science), Cryptography., Computer networks ., Electronic data processing, Algorithms., Computers and civilization., Application software., Aufsatzsammlung, Elektronische Wahl, Requirements engineering |
url |
https://doi.org/10.1007/978-3-642-12980-3, https://zbmath.org/?q=an:1189.68005, http://dx.doi.org/10.1007/978-3-642-12980-3 |