Electronic Voting [[electronic resource] ] : 4th International Joint Conference, E-Vote-ID 2019, Bregenz, Austria, October 1–4, 2019, Proceedings / / edited by Robert Krimmer, Melanie Volkamer, Veronique Cortier, Bernhard Beckert, Ralf Küsters, Uwe Serdült, David Duenas-Cid |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (X, 233 p. 53 illus., 25 illus. in color.) |
Disciplina | 328.73077502854 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer organization Computers Cryptology Computer Systems Organization and Communication Networks Information Systems and Communication Service |
ISBN | 3-030-30625-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | E-Voting - An overview of the development in the past 15 years -- UnclearBallot: Automated Ballot Image Manipulation -- Election Manipulation with Partial Information -- Online Voting in a First Nation in Canada: Implications for Participation and Governance -- Online Voting in Ontario Municipal Elections: A Conict of Legal Principles and Technology? -- The Swiss Post/Scytl transparency exercise and its possible impact on internet voting regulation -- How Do the Swiss Perceive Electronic Voting? Social Insights from a Qualitative Field Survey -- Improvements in Everlasting Privacy: Efficient and Secure Zero Knowledge Proofs -- The Swiss Postal Voting Process and its System and Security Analysis -- Auditing Indian Elections -- Election Integrity and Electronic Voting Machines in 2018 Georgia -- Risk-Limiting Tallies -- The Danish Party Endorsement System -- On practical aspects of coercion-resistant voting systems. |
Record Nr. | UNISA-996466432003316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Electronic Voting : 4th International Joint Conference, E-Vote-ID 2019, Bregenz, Austria, October 1–4, 2019, Proceedings / / edited by Robert Krimmer, Melanie Volkamer, Veronique Cortier, Bernhard Beckert, Ralf Küsters, Uwe Serdült, David Duenas-Cid |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (X, 233 p. 53 illus., 25 illus. in color.) |
Disciplina |
328.73077502854
324.65 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer organization Computers Cryptology Computer Systems Organization and Communication Networks Information Systems and Communication Service 096 Informatica 314.1 Verkiezingen |
ISBN | 3-030-30625-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | E-Voting - An overview of the development in the past 15 years -- UnclearBallot: Automated Ballot Image Manipulation -- Election Manipulation with Partial Information -- Online Voting in a First Nation in Canada: Implications for Participation and Governance -- Online Voting in Ontario Municipal Elections: A Conict of Legal Principles and Technology? -- The Swiss Post/Scytl transparency exercise and its possible impact on internet voting regulation -- How Do the Swiss Perceive Electronic Voting? Social Insights from a Qualitative Field Survey -- Improvements in Everlasting Privacy: Efficient and Secure Zero Knowledge Proofs -- The Swiss Postal Voting Process and its System and Security Analysis -- Auditing Indian Elections -- Election Integrity and Electronic Voting Machines in 2018 Georgia -- Risk-Limiting Tallies -- The Danish Party Endorsement System -- On practical aspects of coercion-resistant voting systems. |
Record Nr. | UNINA-9910349280003321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
FMSE '05 : proceedings of the 2005 ACM Workshop on Formal Methods in Security Engineering : November 11, 2005, Fairfax, Virginia, USA, co-located with CCS 2005 |
Pubbl/distr/stampa | [Place of publication not identified], : ACM, 2005 |
Descrizione fisica | 1 online resource (84 pages) |
Collana | ACM Conferences |
Soggetto topico |
Engineering & Applied Sciences
Computer Science |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
Formal Methods in Security Engineering '05 : proceedings of the 2005 Association for Computing Machinery Workshop on Formal Methods in Security Engineering : November 11, 2005, Fairfax, Virginia, United States of America, co-located with Computer and Communications Security 2005
Proceedings of the 2005 ACM Workshop on Formal Methods in Security Engineering |
Record Nr. | UNINA-9910376477403321 |
[Place of publication not identified], : ACM, 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Principles of Security and Trust [[electronic resource] ] : 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings / / edited by Lujo Bauer, Ralf Küsters |
Autore | Ralf Küsters |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Springer Nature, 2018 |
Descrizione fisica | 1 online resource (XIV, 347 p. 85 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computers Data structures (Computer science) Computer system failures Systems and Data Security Theory of Computation Computing Milieux Data Structures and Information Theory System Performance and Evaluation |
Soggetto non controllato |
security analysis
cryptography privacy world wide web semantics programming languages formal specification program compilers specifications formal logic computer science separation logic formal methods data privacy security systems software engineering computer software selection and evaluation internet verification authentication |
ISBN | 3-319-89722-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Information Flow and Non-Intereference -- What's the Over/Under? Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels. |
Record Nr. | UNINA-9910293140103321 |
Ralf Küsters | ||
Springer Nature, 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Principles of Security and Trust [[electronic resource] ] : 7th International Conference, POST 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Thessaloniki, Greece, April 14-20, 2018, Proceedings / / edited by Lujo Bauer, Ralf Küsters |
Autore | Ralf Küsters |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Springer Nature, 2018 |
Descrizione fisica | 1 online resource (XIV, 347 p. 85 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computers Data structures (Computer science) Computer system failures Systems and Data Security Theory of Computation Computing Milieux Data Structures and Information Theory System Performance and Evaluation |
Soggetto non controllato |
security analysis
cryptography privacy world wide web semantics programming languages formal specification program compilers specifications formal logic computer science separation logic formal methods data privacy security systems software engineering computer software selection and evaluation internet verification authentication |
ISBN | 3-319-89722-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Information Flow and Non-Intereference -- What's the Over/Under? Probabilistic Bounds on Information Leakage -- Secure Information Release in Timed Automata -- Compositional Non-Interference for Concurrent Programs via Separation and Framing -- The Meaning of Memory Safety -- Leakage, Information Flow, and Protocols -- Formal Verification of Integrity Preserving Countermeasures Against Cache Storage -- Leakage and Protocol Composition in a Game-theoretic Perspective -- Equivalence Properties by Typing in Cryptographic Branching Protocols -- Design, Formal Specification and Analysis of Multi-Factor Authentication Solutions with a Single Sign-On Experience -- Smart Contracts and Privacy -- SoK: Unraveling Bitcoin Smart Contracts -- A Semantic Framework for the Security Analysis of Ethereum Smart Contracts -- Tool Demonstration: FSolidM for Designing Secure Ethereum Smart Contracts -- UniTraX: Protecting Data Privacy with Discoverable Biases -- Firewalls and Attack-Defense Trees -- Transcompiling Firewalls -- On Quantitative Analysis of Attack-Defense Trees with Repeated Labels. |
Record Nr. | UNISA-996465583103316 |
Ralf Küsters | ||
Springer Nature, 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|