Eintrag weiter verarbeiten

Towards Trustworthy Elections: New Directions in Electronic Voting

Gespeichert in:

Personen und Körperschaften: Chaum, David (VerfasserIn), Adida, Ben (Sonstige), Benaloh, Josh (Sonstige), Jakobsson, Markus (Sonstige), Kutyłowski, Mirosław (Sonstige), Rivest, Ronald Linn (Sonstige), Ryan, Peter Y. A. (Sonstige)
Titel: Towards Trustworthy Elections: New Directions in Electronic Voting/ edited by David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida
Format: E-Book
Sprache: Englisch
veröffentlicht:
Berlin, Heidelberg Springer Berlin Heidelberg 2010
Gesamtaufnahme: SpringerLink
Lecture notes in computer science ; 6000
Schlagwörter:
Buchausg. u.d.T.: Towards trustworthy elections, Berlin : Springer, 2010, VIII, 401 S.
Quelle: Verbunddaten SWB
Zugangsinformationen: Elektronischer Volltext - Campuslizenz
LEADER 06980cam a22012132 4500
001 0-1649779488
003 DE-627
005 20240122105314.0
007 cr uuu---uuuuu
008 100702s2010 gw |||||o 00| ||eng c
020 |a 9783642129803  |9 978-3-642-12980-3 
024 7 |a 10.1007/978-3-642-12980-3  |2 doi 
035 |a (DE-627)1649779488 
035 |a (DE-576)325491828 
035 |a (DE-599)BSZ325491828 
035 |a (OCoLC)692304665 
035 |a (ZBM)1189.68005 
035 |a (DE-He213)978-3-642-12980-3 
035 |a (EBP)040519694 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
044 |c XA-DE 
050 0 |a QA76.9.A25 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 bicssc 
084 |a SS 4800  |2 rvk  |0 (DE-625)rvk/143528: 
084 |a *68-06  |2 msc 
084 |a 68P25  |2 msc 
084 |a 94A60  |2 msc 
084 |a 00B25  |2 msc 
084 |a 89.57  |2 bkl 
084 |a 54.38  |2 bkl 
100 1 |a Chaum, David  |4 aut 
245 1 0 |a Towards Trustworthy Elections  |b New Directions in Electronic Voting  |c edited by David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida 
264 1 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2010 
300 |a Online-Ressource (VIII, 403p. 60 illus, digital) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science  |v 6000 
490 0 |a SpringerLink  |a Bücher 
520 |a The Witness-Voting System -- Coercion-Resistant Electronic Elections -- Receipt-Free K-out-of-L Voting Based on ElGamal Encryption -- A Secure Architecture for Voting Electronically (SAVE) -- A Modular Voting Architecture (“Frog Voting”) -- Unconditionally Secure Electronic Voting -- Electronic Elections: A Balancing Act -- An Implementation of a Mix-Net Based Network Voting Scheme and Its Use in a Private Organization -- The Vector-Ballot Approach for Online Voting Procedures -- On Optical Mark-Sense Scanning -- On Some Incompatible Properties of Voting Schemes -- A Threat Analysis of Prêt à Voter -- Anonymity in Voting Revisited -- Anonymous One-Time Broadcast Using Non-interactive Dining Cryptographer Nets with Applications to Voting -- An Introduction to PunchScan -- Component Based Electronic Voting Systems -- A Verifiable Voting Protocol Based on Farnel -- Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster -- Improving Remote Voting Security with CodeVoting -- A Practical and Secure Coercion-Resistant Scheme for Internet Voting -- Scratch, Click & Vote: E2E Voting over the Internet -- Securing Optical-Scan Voting -- Attacking Paper-Based E2E Voting Systems -- Aperio: High Integrity Elections for Developing Countries. 
520 |a For many years now, cryptography has been keeping messages secure for senders, irrespective of the routing to the destination. This same technology can be used to keep votes secure for voters, from the casting of the vote all the way through to the inclusion of the vote in the final tally. This state-of-the-art survey addresses the challenges faced in establishing a trustworthy electronic voting system. The 24 contributions included in the volume were carefully reviewed and selected from the presentations given during a series of workshops on trustworthy elections held over the last decade. Topics addresses range from foundational and theoretical aspects to algorithms and systems issues, as well as applications in various fields. 
650 0 |a Computer science 
650 0 |a Computer Communication Networks 
650 0 |a Computer software 
650 0 |a Information systems 
650 0 |a Information Systems 
650 0 |a Computer Science 
650 0 |a Data encryption (Computer science) 
650 0 |a Cryptography. 
650 0 |a Computer networks . 
650 0 |a Electronic data processing 
650 0 |a Algorithms. 
650 0 |a Computers and civilization. 
650 0 |a Application software. 
655 7 |a Aufsatzsammlung  |0 (DE-588)4143413-4  |0 (DE-627)105605727  |0 (DE-576)209726091  |2 gnd-content 
689 0 0 |D s  |0 (DE-588)4432990-8  |0 (DE-627)222407808  |0 (DE-576)212393006  |a Elektronische Wahl  |2 gnd 
689 0 1 |D s  |0 (DE-588)4213997-1  |0 (DE-627)10506856X  |0 (DE-576)210218037  |a Requirements engineering  |2 gnd 
689 0 |5 DE-101 
700 1 |a Adida, Ben  |4 oth 
700 1 |a Benaloh, Josh  |4 oth 
700 1 |a Jakobsson, Markus  |d 1968-  |0 (DE-588)111664701X  |0 (DE-627)870611755  |0 (DE-576)18790846X  |4 oth 
700 1 |a Kutyłowski, Mirosław  |4 oth 
700 1 |a Rivest, Ronald Linn  |d 1947-  |0 (DE-588)140222960  |0 (DE-627)616950101  |0 (DE-576)315236019  |4 oth 
700 1 |a Ryan, Peter Y. A.  |4 oth 
776 1 |z 9783642129797 
776 0 8 |i Buchausg. u.d.T.  |t Towards trustworthy elections  |d Berlin : Springer, 2010  |h VIII, 401 S.  |w (DE-627)623788993  |w (DE-576)324820119  |z 364212979X  |z 9783642129797 
830 0 |a Lecture notes in computer science  |v 6000  |9 6000  |w (DE-627)316228877  |w (DE-576)093890923  |w (DE-600)2018930-8  |x 1611-3349  |7 ns 
856 4 0 |u https://doi.org/10.1007/978-3-642-12980-3  |m X:SPRINGER  |x Verlag  |z lizenzpflichtig  |3 Volltext 
856 4 2 |u https://zbmath.org/?q=an:1189.68005  |m B:ZBM  |v 2021-04-12  |x Verlag  |y Zentralblatt MATH  |3 Inhaltstext 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC  |b 2010 
912 |a ZDB-2-SEB 
912 |a ZDB-2-SCS  |b 2010 
912 |a ZDB-2-SXCS  |b 2010 
912 |a ZDB-2-SEB  |b 2010 
936 r v |a SS 4800  |b Lecture notes in computer science  |k Informatik  |k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen  |k Schriftenreihen (indiv. Sign.)  |k Lecture notes in computer science  |0 (DE-627)1271461242  |0 (DE-625)rvk/143528:  |0 (DE-576)201461242 
936 b k |a 89.57  |j Politische Beteiligung  |q SEPA  |0 (DE-627)106418270 
936 b k |a 54.38  |j Computersicherheit  |q SEPA  |0 (DE-627)106418866 
951 |a BO 
900 |a Rivest, Ronald L. 
900 |a Rivest, Ronald 
900 |a Rivest, R. L. 
900 |a Rivest, R. 
950 |a Information requirement analysis 
950 |a Informationsbedarfsanalyse 
950 |a Anforderungstechnik 
950 |a Anforderungsdefinition 
950 |a Rückverfolgbarkeit 
950 |a E-Voting 
950 |a Wahl 
950 |a E-Government 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-12980-3  |9 DE-14 
852 |a DE-14  |z 2011-07-20T14:58:39Z  |x epn:3334537358 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-12980-3  |9 DE-15 
852 |a DE-15  |z 2011-05-16T16:35:34Z  |x epn:3334537420 
976 |h Elektronischer Volltext - Campuslizenz 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-12980-3  |z Zum Online-Dokument  |9 DE-Zi4 
852 |a DE-Zi4  |z 2011-01-26T14:32:14Z  |x epn:3334537536 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-12980-3  |9 DE-520 
852 |a DE-520  |z 2012-11-21T16:09:39Z  |x epn:3334537587 
980 |a 1649779488  |b 0  |k 1649779488  |o 325491828 
openURL url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fvufind.svn.sourceforge.net%3Agenerator&rft.title=Towards+Trustworthy+Elections%3A+New+Directions+in+Electronic+Voting&rft.date=2010&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Towards+Trustworthy+Elections%3A+New+Directions+in+Electronic+Voting&rft.series=Lecture+notes+in+computer+science%2C+6000&rft.au=Chaum%2C+David&rft.pub=Springer+Berlin+Heidelberg&rft.edition=&rft.isbn=3642129803
SOLR
_version_ 1789364957173776384
access_facet Electronic Resources
author Chaum, David
author2 Adida, Ben, Benaloh, Josh, Jakobsson, Markus, Kutyłowski, Mirosław, Rivest, Ronald Linn, Ryan, Peter Y. A.
author2_role oth, oth, oth, oth, oth, oth
author2_variant b a ba, j b jb, m j mj, m k mk, r l r rl rlr, p y a r pya pyar
author_facet Chaum, David, Adida, Ben, Benaloh, Josh, Jakobsson, Markus, Kutyłowski, Mirosław, Rivest, Ronald Linn, Ryan, Peter Y. A.
author_role aut
author_sort Chaum, David
author_variant d c dc
callnumber-first Q - Science
callnumber-label QA76
callnumber-raw QA76.9.A25
callnumber-search QA76.9.A25
callnumber-sort QA 276.9 A25
callnumber-subject QA - Mathematics
collection ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS
contents The Witness-Voting System -- Coercion-Resistant Electronic Elections -- Receipt-Free K-out-of-L Voting Based on ElGamal Encryption -- A Secure Architecture for Voting Electronically (SAVE) -- A Modular Voting Architecture (“Frog Voting”) -- Unconditionally Secure Electronic Voting -- Electronic Elections: A Balancing Act -- An Implementation of a Mix-Net Based Network Voting Scheme and Its Use in a Private Organization -- The Vector-Ballot Approach for Online Voting Procedures -- On Optical Mark-Sense Scanning -- On Some Incompatible Properties of Voting Schemes -- A Threat Analysis of Prêt à Voter -- Anonymity in Voting Revisited -- Anonymous One-Time Broadcast Using Non-interactive Dining Cryptographer Nets with Applications to Voting -- An Introduction to PunchScan -- Component Based Electronic Voting Systems -- A Verifiable Voting Protocol Based on Farnel -- Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster -- Improving Remote Voting Security with CodeVoting -- A Practical and Secure Coercion-Resistant Scheme for Internet Voting -- Scratch, Click & Vote: E2E Voting over the Internet -- Securing Optical-Scan Voting -- Attacking Paper-Based E2E Voting Systems -- Aperio: High Integrity Elections for Developing Countries., For many years now, cryptography has been keeping messages secure for senders, irrespective of the routing to the destination. This same technology can be used to keep votes secure for voters, from the casting of the vote all the way through to the inclusion of the vote in the final tally. This state-of-the-art survey addresses the challenges faced in establishing a trustworthy electronic voting system. The 24 contributions included in the volume were carefully reviewed and selected from the presentations given during a series of workshops on trustworthy elections held over the last decade. Topics addresses range from foundational and theoretical aspects to algorithms and systems issues, as well as applications in various fields.
ctrlnum (DE-627)1649779488, (DE-576)325491828, (DE-599)BSZ325491828, (OCoLC)692304665, (ZBM)1189.68005, (DE-He213)978-3-642-12980-3, (EBP)040519694
de15_date 2011-05-16T16:35:34Z
doi_str_mv 10.1007/978-3-642-12980-3
facet_912a ZDB-2-SCS, ZDB-2-LNC, ZDB-2-SEB, ZDB-2-SXCS
facet_avail Online
facet_local_del330 Elektronische Wahl, Requirements engineering
finc_class_facet Informatik, Allgemeines, Mathematik
finc_id_str 0000886047
fincclass_txtF_mv science-computerscience, politicalscience-administration-military
format eBook
format_access_txtF_mv Book, E-Book
format_de105 Ebook
format_de14 Book, E-Book
format_de15 Book, E-Book
format_del152 Buch
format_detail_txtF_mv text-online-monograph-independent
format_dezi4 e-Book
format_finc Book, E-Book
format_legacy ElectronicBook
format_legacy_nrw Book, E-Book
format_nrw Book, E-Book
format_strict_txtF_mv E-Book
genre Aufsatzsammlung (DE-588)4143413-4 (DE-627)105605727 (DE-576)209726091 gnd-content
genre_facet Aufsatzsammlung
geogr_code not assigned
geogr_code_person not assigned
hierarchy_parent_id 0-316228877
hierarchy_parent_title Lecture notes in computer science
hierarchy_sequence 6000
hierarchy_top_id 0-316228877
hierarchy_top_title Lecture notes in computer science
id 0-1649779488
illustrated Not Illustrated
imprint Berlin, Heidelberg, Springer Berlin Heidelberg, 2010
imprint_str_mv Berlin, Heidelberg: Springer Berlin Heidelberg, 2010
institution DE-14, DE-Zi4, DE-520, DE-15
is_hierarchy_id 0-1649779488
is_hierarchy_title Towards Trustworthy Elections: New Directions in Electronic Voting
isbn 9783642129803
isbn_isn_mv 9783642129797, 364212979X
issn_isn_mv 1611-3349
kxp_id_str 1649779488
language English
last_indexed 2024-01-28T19:50:01.659Z
local_heading_facet_dezwi2 Computer science, Computer Communication Networks, Computer software, Information systems, Information Systems, Computer Science, Data encryption (Computer science), Cryptography., Computer networks ., Electronic data processing, Algorithms., Computers and civilization., Application software., Elektronische Wahl, Requirements engineering
marc024a_ct_mv 10.1007/978-3-642-12980-3
match_str chaum2010towardstrustworthyelectionsnewdirectionsinelectronicvoting
mega_collection Verbunddaten SWB
multipart_link 093890923
multipart_part (093890923)6000
names_id_str_mv (DE-588)111664701X, (DE-627)870611755, (DE-576)18790846X, (DE-588)140222960, (DE-627)616950101, (DE-576)315236019
oclc_num 692304665
physical Online-Ressource (VIII, 403p. 60 illus, digital)
publishDate 2010
publishDateSort 2010
publishPlace Berlin, Heidelberg
publisher Springer Berlin Heidelberg
record_format marcfinc
record_id 325491828
recordtype marcfinc
rsn_id_str_mv (DE-15)2461805
rvk_facet SS 4800
rvk_label Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science
rvk_path SS, SQ - SU, SS 4000 - SS 5999, SS 4800
rvk_path_str_mv SS, SQ - SU, SS 4000 - SS 5999, SS 4800
series Lecture notes in computer science, 6000
series2 Lecture Notes in Computer Science ; 6000, SpringerLink ; Bücher
source_id 0
spelling Chaum, David aut, Towards Trustworthy Elections New Directions in Electronic Voting edited by David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida, Berlin, Heidelberg Springer Berlin Heidelberg 2010, Online-Ressource (VIII, 403p. 60 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 6000, SpringerLink Bücher, The Witness-Voting System -- Coercion-Resistant Electronic Elections -- Receipt-Free K-out-of-L Voting Based on ElGamal Encryption -- A Secure Architecture for Voting Electronically (SAVE) -- A Modular Voting Architecture (“Frog Voting”) -- Unconditionally Secure Electronic Voting -- Electronic Elections: A Balancing Act -- An Implementation of a Mix-Net Based Network Voting Scheme and Its Use in a Private Organization -- The Vector-Ballot Approach for Online Voting Procedures -- On Optical Mark-Sense Scanning -- On Some Incompatible Properties of Voting Schemes -- A Threat Analysis of Prêt à Voter -- Anonymity in Voting Revisited -- Anonymous One-Time Broadcast Using Non-interactive Dining Cryptographer Nets with Applications to Voting -- An Introduction to PunchScan -- Component Based Electronic Voting Systems -- A Verifiable Voting Protocol Based on Farnel -- Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster -- Improving Remote Voting Security with CodeVoting -- A Practical and Secure Coercion-Resistant Scheme for Internet Voting -- Scratch, Click & Vote: E2E Voting over the Internet -- Securing Optical-Scan Voting -- Attacking Paper-Based E2E Voting Systems -- Aperio: High Integrity Elections for Developing Countries., For many years now, cryptography has been keeping messages secure for senders, irrespective of the routing to the destination. This same technology can be used to keep votes secure for voters, from the casting of the vote all the way through to the inclusion of the vote in the final tally. This state-of-the-art survey addresses the challenges faced in establishing a trustworthy electronic voting system. The 24 contributions included in the volume were carefully reviewed and selected from the presentations given during a series of workshops on trustworthy elections held over the last decade. Topics addresses range from foundational and theoretical aspects to algorithms and systems issues, as well as applications in various fields., Computer science, Computer Communication Networks, Computer software, Information systems, Information Systems, Computer Science, Data encryption (Computer science), Cryptography., Computer networks ., Electronic data processing, Algorithms., Computers and civilization., Application software., Aufsatzsammlung (DE-588)4143413-4 (DE-627)105605727 (DE-576)209726091 gnd-content, s (DE-588)4432990-8 (DE-627)222407808 (DE-576)212393006 Elektronische Wahl gnd, s (DE-588)4213997-1 (DE-627)10506856X (DE-576)210218037 Requirements engineering gnd, DE-101, Adida, Ben oth, Benaloh, Josh oth, Jakobsson, Markus 1968- (DE-588)111664701X (DE-627)870611755 (DE-576)18790846X oth, Kutyłowski, Mirosław oth, Rivest, Ronald Linn 1947- (DE-588)140222960 (DE-627)616950101 (DE-576)315236019 oth, Ryan, Peter Y. A. oth, 9783642129797, Buchausg. u.d.T. Towards trustworthy elections Berlin : Springer, 2010 VIII, 401 S. (DE-627)623788993 (DE-576)324820119 364212979X 9783642129797, Lecture notes in computer science 6000 6000 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-12980-3 X:SPRINGER Verlag lizenzpflichtig Volltext, https://zbmath.org/?q=an:1189.68005 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext, http://dx.doi.org/10.1007/978-3-642-12980-3 DE-14, DE-14 2011-07-20T14:58:39Z epn:3334537358, http://dx.doi.org/10.1007/978-3-642-12980-3 DE-15, DE-15 2011-05-16T16:35:34Z epn:3334537420, http://dx.doi.org/10.1007/978-3-642-12980-3 Zum Online-Dokument DE-Zi4, DE-Zi4 2011-01-26T14:32:14Z epn:3334537536, http://dx.doi.org/10.1007/978-3-642-12980-3 DE-520, DE-520 2012-11-21T16:09:39Z epn:3334537587
spellingShingle Chaum, David, Towards Trustworthy Elections: New Directions in Electronic Voting, Lecture notes in computer science, 6000, The Witness-Voting System -- Coercion-Resistant Electronic Elections -- Receipt-Free K-out-of-L Voting Based on ElGamal Encryption -- A Secure Architecture for Voting Electronically (SAVE) -- A Modular Voting Architecture (“Frog Voting”) -- Unconditionally Secure Electronic Voting -- Electronic Elections: A Balancing Act -- An Implementation of a Mix-Net Based Network Voting Scheme and Its Use in a Private Organization -- The Vector-Ballot Approach for Online Voting Procedures -- On Optical Mark-Sense Scanning -- On Some Incompatible Properties of Voting Schemes -- A Threat Analysis of Prêt à Voter -- Anonymity in Voting Revisited -- Anonymous One-Time Broadcast Using Non-interactive Dining Cryptographer Nets with Applications to Voting -- An Introduction to PunchScan -- Component Based Electronic Voting Systems -- A Verifiable Voting Protocol Based on Farnel -- Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster -- Improving Remote Voting Security with CodeVoting -- A Practical and Secure Coercion-Resistant Scheme for Internet Voting -- Scratch, Click & Vote: E2E Voting over the Internet -- Securing Optical-Scan Voting -- Attacking Paper-Based E2E Voting Systems -- Aperio: High Integrity Elections for Developing Countries., For many years now, cryptography has been keeping messages secure for senders, irrespective of the routing to the destination. This same technology can be used to keep votes secure for voters, from the casting of the vote all the way through to the inclusion of the vote in the final tally. This state-of-the-art survey addresses the challenges faced in establishing a trustworthy electronic voting system. The 24 contributions included in the volume were carefully reviewed and selected from the presentations given during a series of workshops on trustworthy elections held over the last decade. Topics addresses range from foundational and theoretical aspects to algorithms and systems issues, as well as applications in various fields., Computer science, Computer Communication Networks, Computer software, Information systems, Information Systems, Computer Science, Data encryption (Computer science), Cryptography., Computer networks ., Electronic data processing, Algorithms., Computers and civilization., Application software., Aufsatzsammlung, Elektronische Wahl, Requirements engineering
swb_id_str 325491828
title Towards Trustworthy Elections: New Directions in Electronic Voting
title_auth Towards Trustworthy Elections New Directions in Electronic Voting
title_full Towards Trustworthy Elections New Directions in Electronic Voting edited by David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida
title_fullStr Towards Trustworthy Elections New Directions in Electronic Voting edited by David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida
title_full_unstemmed Towards Trustworthy Elections New Directions in Electronic Voting edited by David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida
title_in_hierarchy 6000. Towards Trustworthy Elections: New Directions in Electronic Voting (2010)
title_short Towards Trustworthy Elections
title_sort towards trustworthy elections new directions in electronic voting
title_sub New Directions in Electronic Voting
title_unstemmed Towards Trustworthy Elections: New Directions in Electronic Voting
topic Computer science, Computer Communication Networks, Computer software, Information systems, Information Systems, Computer Science, Data encryption (Computer science), Cryptography., Computer networks ., Electronic data processing, Algorithms., Computers and civilization., Application software., Aufsatzsammlung, Elektronische Wahl, Requirements engineering
topic_facet Computer science, Computer Communication Networks, Computer software, Information systems, Information Systems, Computer Science, Data encryption (Computer science), Cryptography., Computer networks ., Electronic data processing, Algorithms., Computers and civilization., Application software., Aufsatzsammlung, Elektronische Wahl, Requirements engineering
url https://doi.org/10.1007/978-3-642-12980-3, https://zbmath.org/?q=an:1189.68005, http://dx.doi.org/10.1007/978-3-642-12980-3