Cargando…

E-Voting and Identity First International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers /

Voting and identity have a very delicate relationship. Only a few processes - pendsomuchonanidentitymanagementrespectingthe?nelinebetweenreliable identi?cation and reliable non-identi?ability each at its part during the process. And only a few processes may change their outer appearance so much with...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Alkassar, Ammar (Editor ), Volkamer, Melanie (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007.
Edición:1st ed. 2007.
Colección:Security and Cryptology ; 4896
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Overview on Remote Electronic Voting
  • The Development of Remote E-Voting Around the World: A Review of Roads and Directions
  • Remote Voting Schemes: A Comparative Analysis
  • Internet-Voting: Opportunity or Threat for Democracy?
  • Evaluation of Electronic Voting Systems
  • Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach
  • Compliance of RIES to the Proposed e-Voting Protection Profile
  • Compliance of POLYAS with the BSI Protection Profile - Basic Requirements for Remote Electronic Voting Systems
  • Electronic Voting in Different Countries
  • Electronic Voting in Belgium: Past and Future
  • The Digital Voting Pen at the Hamburg Elections 2008: Electronic Voting Closest to Conventional Voting
  • The Security Analysis of e-Voting in Japan
  • E-Voting and Trust
  • Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generator
  • Enhancing the Trust and Perceived Security in e-Cognocracy
  • Improvements/Extensions of Existing Approaches
  • Simulation-Based Analysis of E2E Voting Systems
  • A Simple Technique for Safely Using Punchscan and Prêt à Voter in Mail-In Elections
  • Threat Analysis of a Practical Voting Scheme with Receipts
  • Code Voting
  • Secure Internet Voting with Code Sheets
  • CodeVoting Protection Against Automatic Vote Manipulation in an Uncontrolled Environment.