Logo des Repositoriums
 

Security assets in E-voting

dc.contributor.authorProsser, Alexander
dc.contributor.authorKofler, Robert
dc.contributor.authorKrimmer, Robert
dc.contributor.authorUnger, Martin Karl
dc.contributor.editorProsser, Alexander
dc.contributor.editorKrimmer, Robert
dc.date.accessioned2019-10-16T08:13:07Z
dc.date.available2019-10-16T08:13:07Z
dc.date.issued2004
dc.description.abstractAs discussed in the literature [PrMü01; Rub04; Phi02] e-voting faces a lot of threats. The purpose of this paper is to give a systematically ordered overview of attacks against e-voting and to show one solution to the issues. The challenge is to provide identification and anonymity at the same time and to exclude the possibility of fraudulent manipulations by the server administration, the voter, and any third party.en
dc.identifier.isbn3-88579-376-8
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/29123
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofElectronic voting in Europe - Technology, law, politics and society, workshop of the ESF TED programme together with GI and OCG
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-47
dc.titleSecurity assets in E-votingen
dc.typeText/Conference Paper
gi.citation.endPage180
gi.citation.publisherPlaceBonn
gi.citation.startPage171
gi.conference.dateJuly, 7th-9th, 2004
gi.conference.locationBregenz, Austria
gi.conference.sessiontitleRegular Research Papers

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
Proceeding.GI.47-18.pdf
Größe:
233.84 KB
Format:
Adobe Portable Document Format