Security assets in E-voting
dc.contributor.author | Prosser, Alexander | |
dc.contributor.author | Kofler, Robert | |
dc.contributor.author | Krimmer, Robert | |
dc.contributor.author | Unger, Martin Karl | |
dc.contributor.editor | Prosser, Alexander | |
dc.contributor.editor | Krimmer, Robert | |
dc.date.accessioned | 2019-10-16T08:13:07Z | |
dc.date.available | 2019-10-16T08:13:07Z | |
dc.date.issued | 2004 | |
dc.description.abstract | As discussed in the literature [PrMü01; Rub04; Phi02] e-voting faces a lot of threats. The purpose of this paper is to give a systematically ordered overview of attacks against e-voting and to show one solution to the issues. The challenge is to provide identification and anonymity at the same time and to exclude the possibility of fraudulent manipulations by the server administration, the voter, and any third party. | en |
dc.identifier.isbn | 3-88579-376-8 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/29123 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | Electronic voting in Europe - Technology, law, politics and society, workshop of the ESF TED programme together with GI and OCG | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-47 | |
dc.title | Security assets in E-voting | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 180 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 171 | |
gi.conference.date | July, 7th-9th, 2004 | |
gi.conference.location | Bregenz, Austria | |
gi.conference.sessiontitle | Regular Research Papers |
Dateien
Originalbündel
1 - 1 von 1
Lade...
- Name:
- Proceeding.GI.47-18.pdf
- Größe:
- 233.84 KB
- Format:
- Adobe Portable Document Format