Cargando…

Towards Trustworthy Elections New Directions in Electronic Voting /

For many years now, cryptography has been keeping messages secure for senders, irrespective of the routing to the destination. This same technology can be used to keep votes secure for voters, from the casting of the vote all the way through to the inclusion of the vote in the final tally. This stat...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Chaum, David (Editor ), Jakobsson, Markus (Editor ), Rivest, Ronald L. (Editor ), Ryan, Peter Y. A. (Editor ), Benaloh, Josh (Editor ), Kutylowski, Miroslaw (Editor ), Adida, Ben (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edición:1st ed. 2010.
Colección:Security and Cryptology ; 6000
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-642-12980-3
003 DE-He213
005 20220115052031.0
007 cr nn 008mamaa
008 100531s2010 gw | s |||| 0|eng d
020 |a 9783642129803  |9 978-3-642-12980-3 
024 7 |a 10.1007/978-3-642-12980-3  |2 doi 
050 4 |a QA268 
072 7 |a GPJ  |2 bicssc 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 thema 
072 7 |a URY  |2 thema 
082 0 4 |a 005.824  |2 23 
245 1 0 |a Towards Trustworthy Elections  |h [electronic resource] :  |b New Directions in Electronic Voting /  |c edited by David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida. 
250 |a 1st ed. 2010. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2010. 
300 |a VIII, 403 p. 60 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Security and Cryptology ;  |v 6000 
505 0 |a The Witness-Voting System -- Coercion-Resistant Electronic Elections -- Receipt-Free K-out-of-L Voting Based on ElGamal Encryption -- A Secure Architecture for Voting Electronically (SAVE) -- A Modular Voting Architecture ("Frog Voting") -- Unconditionally Secure Electronic Voting -- Electronic Elections: A Balancing Act -- An Implementation of a Mix-Net Based Network Voting Scheme and Its Use in a Private Organization -- The Vector-Ballot Approach for Online Voting Procedures -- On Optical Mark-Sense Scanning -- On Some Incompatible Properties of Voting Schemes -- A Threat Analysis of Prêt à Voter -- Anonymity in Voting Revisited -- Anonymous One-Time Broadcast Using Non-interactive Dining Cryptographer Nets with Applications to Voting -- An Introduction to PunchScan -- Component Based Electronic Voting Systems -- A Verifiable Voting Protocol Based on Farnel -- Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster -- Improving Remote Voting Security with CodeVoting -- A Practical and Secure Coercion-Resistant Scheme for Internet Voting -- Scratch, Click & Vote: E2E Voting over the Internet -- Securing Optical-Scan Voting -- Attacking Paper-Based E2E Voting Systems -- Aperio: High Integrity Elections for Developing Countries. 
520 |a For many years now, cryptography has been keeping messages secure for senders, irrespective of the routing to the destination. This same technology can be used to keep votes secure for voters, from the casting of the vote all the way through to the inclusion of the vote in the final tally. This state-of-the-art survey addresses the challenges faced in establishing a trustworthy electronic voting system. The 24 contributions included in the volume were carefully reviewed and selected from the presentations given during a series of workshops on trustworthy elections held over the last decade. Topics addresses range from foundational and theoretical aspects to algorithms and systems issues, as well as applications in various fields. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Computer networks . 
650 0 |a Electronic data processing-Management. 
650 0 |a Algorithms. 
650 0 |a Computers and civilization. 
650 0 |a Application software. 
650 1 4 |a Cryptology. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a IT Operations. 
650 2 4 |a Algorithms. 
650 2 4 |a Computers and Society. 
650 2 4 |a Computer and Information Systems Applications. 
700 1 |a Chaum, David.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Jakobsson, Markus.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Rivest, Ronald L.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Ryan, Peter Y. A.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Benaloh, Josh.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Kutylowski, Miroslaw.  |e editor.  |0 (orcid)0000-0003-3192-2430  |1 https://orcid.org/0000-0003-3192-2430  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Adida, Ben.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783642129797 
776 0 8 |i Printed edition:  |z 9783642129810 
830 0 |a Security and Cryptology ;  |v 6000 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-642-12980-3  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)