For many years now, cryptography has been keeping messages secure for senders, irrespective of the routing to the destination. This same technology can be used to keep votes secure for voters, from the casting of the vote all the way through to the inclusion of the vote in the final tally. This stat
[Lecture Notes in Computer Science] Towards Trustworthy Elections Volume 6000 || Coercion-Resistant Electronic Elections
โ Scribed by Chaum, David; Jakobsson, Markus; Rivest, Ronald L.; Ryan, Peter Y. A.; Benaloh, Josh; Kutylowski, Miroslaw; Adida, Ben
- Book ID
- 120015265
- Publisher
- Springer Berlin Heidelberg
- Year
- 2010
- Weight
- 375 KB
- Category
- Article
- ISBN
- 3642129803
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
For many years now, cryptography has been keeping messages secure for senders, irrespective of the routing to the destination. This same technology can be used to keep votes secure for voters, from the casting of the vote all the way through to the inclusion of the vote in the final tally. This stat
The EuropeanSymposium on Researchin Computer Security (ESORICS) has a tradition that goes back two decades. It tries to bring together the international research community in a top-quality event that covers all the areas of computer security, ranging from theory to applications. ESORICS 2010 was the
Etaps 2004 Was The Seventh Instance Of The European Joint Conferences On Theory And Practice Of Software. Etaps Is An Annual Federated Conference That Was Established In 1998 By Combining A Number Of Existing And New Conferences. This Year It Comprised ?ve Conferences (fossacs, Fase, Esop, Cc, Tacas