E-Voting and Identify : 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013. Proceedings
This book constitutes the thoroughly refereed conference proceedings of the 4th International Conference on E-Voting and Identity, VoteID 2013, held in Guildford, UK, during July 17-19, 2013. The 12 revised full papers presented were carefully selected from 26 submissions. The papers include a range...
Enregistré dans:
Auteurs principaux : | , , |
---|---|
Format : | Livre |
Langue : | anglais |
Titre complet : | E-Voting and Identify : 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013. Proceedings / edited by James Heather, Steve Schneider, Vanessa Teague. |
Publié : |
Berlin, Heidelberg :
Springer Berlin Heidelberg
, 2013 Cham : Springer Nature |
Collection : | Security and Cryptology ; 7985 |
Accès en ligne : |
Accès Nantes Université
Accès direct soit depuis les campus via le réseau ou le wifi eduroam soit à distance avec un compte @etu.univ-nantes.fr ou @univ-nantes.fr |
Note sur l'URL : | Accès sur la plateforme de l'éditeur Accès sur la plateforme Istex |
Condition d'utilisation et de reproduction : | Conditions particulières de réutilisation pour les bénéficiaires des licences nationales : chttps://www.licencesnationales.fr/springer-nature-ebooks-contrat-licence-ln-2017 |
Sujets : | |
Documents associés : | Autre format:
E-Voting and Identify Autre format: E-Voting and Identity |
LEADER | 04400clm a2200733 4500 | ||
---|---|---|---|
001 | PPN172427754 | ||
003 | http://www.sudoc.fr/172427754 | ||
005 | 20241001155400.0 | ||
010 | |a 978-3-642-39185-9 | ||
017 | 7 | 0 | |a 10.1007/978-3-642-39185-9 |2 DOI |
035 | |a (OCoLC)862332028 | ||
035 | |a Springer978-3-642-39185-9 | ||
035 | |a SPRINGER_EBOOKS_LN_PLURI_10.1007/978-3-642-39185-9 | ||
035 | |a Springer-11645-978-3-642-39185-9 | ||
100 | |a 20131018d2013 u u0frey0103 ba | ||
101 | 0 | |a eng |2 639-2 | |
102 | |a DE | ||
105 | |a y z 100yy | ||
106 | |a s | ||
135 | |a dr||||||||||| | ||
181 | |6 z01 |c txt |2 rdacontent | ||
181 | 1 | |6 z01 |a i# |b xxxe## | |
182 | |6 z01 |c c |2 rdamedia | ||
182 | 1 | |6 z01 |a b | |
183 | |6 z01 |a ceb |2 RDAfrCarrier | ||
200 | 1 | |a E-Voting and Identify |e 4th International Conference, Vote-ID 2013, Guildford, UK, July 17-19, 2013. Proceedings |f edited by James Heather, Steve Schneider, Vanessa Teague. | |
214 | 0 | |a Berlin, Heidelberg |c Springer Berlin Heidelberg | |
214 | 2 | |a Cham |c Springer Nature |d 2013 | |
225 | 0 | |a Security and Cryptology |x 2946-1863 |v 7985 | |
330 | |a This book constitutes the thoroughly refereed conference proceedings of the 4th International Conference on E-Voting and Identity, VoteID 2013, held in Guildford, UK, during July 17-19, 2013. The 12 revised full papers presented were carefully selected from 26 submissions. The papers include a range of works on end-to-end verifiable election systems, verifiably correct complex tallying algorithms, human perceptions of verifiability, formal models of verifiability and, of course, attacks on systems formerly advertised as verifiable. | ||
359 | 1 | |a Scaling Privacy Guarantees in Code-Verification Elections -- On the Specification and Verification of Voting Schemes -- Formal Model-based Validation for Tally Systems -- Vote Casting In Any Preferred Constituency: A New Voting Channel -- Attacking the Verification Code Mechanism in the Norwegian Internet Voting System.- A Formal Model for the Requirement of Verifiability in Electronic Voting by means of a Bulletin Board -- Analysis of an Electronic Boardroom Voting System -- Dispute Resolution in Accessible Voting Systems: The Design and Use of Audiotegrity -- Mental Models of Verifiability in Voting -- Towards a Practical Internet Voting Scheme Based on Malleable Proofs -- A Practical Coercion Resistant Voting Scheme Revisited. | |
371 | 0 | |a Accès en ligne pour les établissements français bénéficiaires des licences nationales | |
371 | 0 | |a Accès soumis à abonnement pour tout autre établissement | |
371 | 1 | |a Conditions particulières de réutilisation pour les bénéficiaires des licences nationales |c chttps://www.licencesnationales.fr/springer-nature-ebooks-contrat-licence-ln-2017 | |
410 | | | |t Security and Cryptology |x 2946-1863 |v 7985 | |
452 | | | |t E-Voting and Identify |y 9783642391842 | |
452 | | | |t E-Voting and Identity |b Texte imprimé |y 9783642391866 | |
608 | |3 PPN02886431X |a Actes de congrès |2 rameau | ||
610 | 1 | |a Computer Science | |
610 | 2 | |a Data Encryption | |
610 | 2 | |a Systems and Data Security | |
610 | 2 | |a Computer Appl. in Administrative Data Processing | |
610 | 2 | |a Computer Communication Networks | |
610 | 2 | |a Special Purpose and Application-Based Systems | |
610 | 2 | |a Computers and Society | |
610 | 1 | |a Cryptology. | |
610 | 2 | |a Computer Application in Administrative Data Processing | |
610 | 2 | |a Data and Information Security | |
615 | |a @Computer Science |n 11645 |2 Springer | ||
676 | |a 005.82 |v 23 | ||
680 | |a QA76.9.A25 | ||
700 | 1 | |a Heather |b James |4 651 | |
701 | 1 | |3 PPN06929660X |a Schneider |b Steve |f 19..-.... |4 651 | |
701 | 1 | |a Teague |b Vanessa |4 651 | |
801 | 3 | |a FR |b Abes |c 20240814 |g AFNOR | |
801 | 1 | |a DE |b Springer |c 20240603 |g AACR2 | |
856 | 4 | |q PDF |u https://doi.org/10.1007/978-3-642-39185-9 |z Accès sur la plateforme de l'éditeur | |
856 | 4 | |u https://revue-sommaire.istex.fr/ark:/67375/8Q1-R7J1BVT4-B |z Accès sur la plateforme Istex | |
856 | 4 | |5 441099901:830859837 |u https://budistant.univ-nantes.fr/login?url=https://doi.org/10.1007/978-3-642-39185-9 | |
915 | |5 441099901:830859837 |b SPRING13-00981 | ||
930 | |5 441099901:830859837 |b 441099901 |j g | ||
991 | |5 441099901:830859837 |a Exemplaire créé en masse par ITEM le 30-09-2024 16:15 | ||
997 | |a NUM |b SPRING13-00981 |d NUMpivo |e EM |s d | ||
998 | |a 978847 |