Coercion-resistant i-voting with short PIN and OAuth 2.0
dc.contributor.author | Bitussi, M. | |
dc.contributor.author | Longo, R. | |
dc.contributor.author | Marino, F. Antonio | |
dc.contributor.author | Morelli, U. | |
dc.contributor.author | Sharif, A. | |
dc.contributor.author | Spadafora, C. | |
dc.contributor.author | Tomasi, A. | |
dc.contributor.editor | Volkamer, Melanie | |
dc.contributor.editor | Duenas-Cid, David | |
dc.contributor.editor | Rønne, Peter B. | |
dc.contributor.editor | Ryan, Peter Y A | |
dc.contributor.editor | Budurushi, Jurlind | |
dc.contributor.editor | Kulyk, Oksana | |
dc.contributor.editor | Rodriguez Pérez, Adrià | |
dc.contributor.editor | Spycher-Krivonosova, Iuliia | |
dc.contributor.editor | Kirsten, Michael | |
dc.contributor.editor | Debant, Alexandre | |
dc.contributor.editor | Goodman, Nicole | |
dc.date.accessioned | 2024-12-13T09:05:08Z | |
dc.date.available | 2024-12-13T09:05:08Z | |
dc.date.issued | 2023 | |
dc.description.abstract | This paper presents an architecture for an OAuth 2.0-based i-voting solution using a mobile native client in a variant of the Araújo-Traoré protocol. We follow a systematic approach by identifying relevant OAuth 2.0 specifications and best practices. Having defined our framework, we identify threats applicable to our proposed methodology and detail how our design mitigates them to provide a safer i-voting process. | en |
dc.identifier.doi | 10.18420/e-vote-id2023_04 | |
dc.identifier.isbn | 978-3-88579-741-8 | |
dc.identifier.issn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/45441 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik, Bonn | |
dc.relation.ispartof | E-Vote-ID 2023 | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-347 | |
dc.subject | i-voting | |
dc.subject | Coercion-Resistance | |
dc.subject | OAuth 2.0 | |
dc.title | Coercion-resistant i-voting with short PIN and OAuth 2.0 | en |
mci.conference.date | 3.-6. October 2023 | |
mci.conference.location | Luxembourg | |
mci.conference.sessiontitle | Track 1: Security, Usability and Technical Issues | |
mci.reference.pages | 71-90 |
Dateien
Originalbündel
1 - 1 von 1