LEADER 05808nam 22008775 450 001 9910484852003321 005 20200702111450.0 010 $a1-280-38645-2 010 $a9786613564375 010 $a3-642-12980-3 024 7 $a10.1007/978-3-642-12980-3 035 $a(CKB)2550000000011553 035 $a(SSID)ssj0000446836 035 $a(PQKBManifestationID)11318388 035 $a(PQKBTitleCode)TC0000446836 035 $a(PQKBWorkID)10498509 035 $a(PQKB)10858440 035 $a(DE-He213)978-3-642-12980-3 035 $a(MiAaPQ)EBC3065308 035 $a(PPN)149063245 035 $a(EXLCZ)992550000000011553 100 $a20100531d2010 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTowards Trustworthy Elections $eNew Directions in Electronic Voting /$fedited by David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (VIII, 403 p. 60 illus.) 225 1 $aSecurity and Cryptology ;$v6000 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-12979-X 320 $aIncludes bibliographical references and index. 327 $aThe Witness-Voting System -- Coercion-Resistant Electronic Elections -- Receipt-Free K-out-of-L Voting Based on ElGamal Encryption -- A Secure Architecture for Voting Electronically (SAVE) -- A Modular Voting Architecture (?Frog Voting?) -- Unconditionally Secure Electronic Voting -- Electronic Elections: A Balancing Act -- An Implementation of a Mix-Net Based Network Voting Scheme and Its Use in a Private Organization -- The Vector-Ballot Approach for Online Voting Procedures -- On Optical Mark-Sense Scanning -- On Some Incompatible Properties of Voting Schemes -- A Threat Analysis of Prêt à Voter -- Anonymity in Voting Revisited -- Anonymous One-Time Broadcast Using Non-interactive Dining Cryptographer Nets with Applications to Voting -- An Introduction to PunchScan -- Component Based Electronic Voting Systems -- A Verifiable Voting Protocol Based on Farnel -- Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster -- Improving Remote Voting Security with CodeVoting -- A Practical and Secure Coercion-Resistant Scheme for Internet Voting -- Scratch, Click & Vote: E2E Voting over the Internet -- Securing Optical-Scan Voting -- Attacking Paper-Based E2E Voting Systems -- Aperio: High Integrity Elections for Developing Countries. 330 $aFor many years now, cryptography has been keeping messages secure for senders, irrespective of the routing to the destination. This same technology can be used to keep votes secure for voters, from the casting of the vote all the way through to the inclusion of the vote in the final tally. This state-of-the-art survey addresses the challenges faced in establishing a trustworthy electronic voting system. The 24 contributions included in the volume were carefully reviewed and selected from the presentations given during a series of workshops on trustworthy elections held over the last decade. Topics addresses range from foundational and theoretical aspects to algorithms and systems issues, as well as applications in various fields. 410 0$aSecurity and Cryptology ;$v6000 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aManagement information systems 606 $aComputer science 606 $aAlgorithms 606 $aComputers and civilization 606 $aApplication software 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aAlgorithms. 615 0$aComputers and civilization. 615 0$aApplication software. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aManagement of Computing and Information Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aComputers and Society. 615 24$aInformation Systems Applications (incl. Internet). 676 $a005.82 702 $aChaum$b David$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aJakobsson$b Markus$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRivest$b Ronald L$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRyan$b Peter Y. A$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBenaloh$b Josh$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKutylowski$b Miroslaw$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aAdida$b Ben$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910484852003321 996 $aTowards Trustworthy Elections$92830404 997 $aUNINA