Cargando…

E-Voting and Identity First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers /

Voting and identity have a very delicate relationship. Only a few processes - pendsomuchonanidentitymanagementrespectingthe?nelinebetweenreliable identi?cation and reliable non-identi?ability each at its part during the process. And only a few processes may change their outer appearance so much with...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Alkassar, Ammar (Editor ), Volkamer, Melanie (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007.
Edición:1st ed. 2007.
Colección:Security and Cryptology ; 4896
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-540-77493-8
003 DE-He213
005 20220115073333.0
007 cr nn 008mamaa
008 100301s2007 gw | s |||| 0|eng d
020 |a 9783540774938  |9 978-3-540-77493-8 
024 7 |a 10.1007/978-3-540-77493-8  |2 doi 
050 4 |a QA268 
072 7 |a GPJ  |2 bicssc 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 thema 
072 7 |a URY  |2 thema 
082 0 4 |a 005.824  |2 23 
245 1 0 |a E-Voting and Identity  |h [electronic resource] :  |b First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers /  |c edited by Ammar Alkassar, Melanie Volkamer. 
250 |a 1st ed. 2007. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2007. 
300 |a XII, 189 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Security and Cryptology ;  |v 4896 
505 0 |a Overview on Remote Electronic Voting -- The Development of Remote E-Voting Around the World: A Review of Roads and Directions -- Remote Voting Schemes: A Comparative Analysis -- Internet-Voting: Opportunity or Threat for Democracy? -- Evaluation of Electronic Voting Systems -- Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach -- Compliance of RIES to the Proposed e-Voting Protection Profile -- Compliance of POLYAS with the BSI Protection Profile - Basic Requirements for Remote Electronic Voting Systems -- Electronic Voting in Different Countries -- Electronic Voting in Belgium: Past and Future -- The Digital Voting Pen at the Hamburg Elections 2008: Electronic Voting Closest to Conventional Voting -- The Security Analysis of e-Voting in Japan -- E-Voting and Trust -- Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generator -- Enhancing the Trust and Perceived Security in e-Cognocracy -- Improvements/Extensions of Existing Approaches -- Simulation-Based Analysis of E2E Voting Systems -- A Simple Technique for Safely Using Punchscan and Prêt à Voter in Mail-In Elections -- Threat Analysis of a Practical Voting Scheme with Receipts -- Code Voting -- Secure Internet Voting with Code Sheets -- CodeVoting Protection Against Automatic Vote Manipulation in an Uncontrolled Environment. 
520 |a Voting and identity have a very delicate relationship. Only a few processes - pendsomuchonanidentitymanagementrespectingthe?nelinebetweenreliable identi?cation and reliable non-identi?ability each at its part during the process. And only a few processes may change their outer appearance so much with the advent of new IT as voting and identity management do. So it was no surprise in FIDIS, the interdisciplinary Network of Excellence working on the Future of Identity in the Information Society, when Ammar Alkassarproposedanalyzethetechnical,socio-ethicalandlegalrelationsbetween Identity and E-Voting as part of Sirrix's activity in FIDIS. There are many reasons for doing this, e. g. , the open question of the imp- cations of identity and identi?cation to the emerging ?eld of E-Government and E-Democracy, especially E-Voting. Issues to be discussed are from several - mains, e. g. , is identity fraud a crucial matter in E-Voting? What is the trade-o? between anonymity and free speech vs. content-related o?ences? Is it approp- ate to use ID cards or health-insurance cards with digital identities for citizen tasks or voting? What about using SIM cards? Can we employ biometrics for identi?cation purposes with respect to E-Democracy? Last but not least nearly all areas of E-Government rely on a reliable link between the citizens and their governments and administrations. However, in contrast to business processes, the e?ects are much more crucial: Identity fraud may cause more problems than in the business domain; the consequences of misuse cannot be measured just by ?nancial means. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Data protection. 
650 0 |a Computer networks . 
650 0 |a Database management. 
650 0 |a Electronic data processing-Management. 
650 0 |a Computers and civilization. 
650 1 4 |a Cryptology. 
650 2 4 |a Data and Information Security. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Database Management. 
650 2 4 |a IT Operations. 
650 2 4 |a Computers and Society. 
700 1 |a Alkassar, Ammar.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Volkamer, Melanie.  |e editor.  |0 (orcid)0000-0003-2674-4043  |1 https://orcid.org/0000-0003-2674-4043  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783540846994 
776 0 8 |i Printed edition:  |z 9783540774921 
830 0 |a Security and Cryptology ;  |v 4896 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-540-77493-8  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)