Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats may be carried out depending on the operational environment in which the system is used, i.e. the procedures that define how to operate the systems. We are interested in reasoning about the security of e-Voting procedures, namely on the risks and attacks that can be carried out during an election. Our focus is more on people and organizations than on systems and technologies. In this paper we describe some ongoing work that we are carrying out within the ProVotE project (a project sponsored by the Autonomous Province of Trento to switch to e-Voting for local electi...
With the rapid growth of the Internet, online voting appears to be a reasonable alternative to conve...
This research focuses on the study of the effective practices of risk assessment for the Omani elect...
The ProVotE project aims at actuating art. 84 of law 2 - 5/3/2003 of the Autonomous Province of Tren...
Abstract. Performing a good security analysis on the design of a system is an essential step in orde...
Abstract: This paper presents a methodology for procedural security analysis in order to analyze and...
We are involved in a project related to the evaluation and possible introduction of \mbox{e-voting} ...
Deploying a system in a safe and secure manner requires ensuring the tech- nical and procedural leve...
In this chapter, first the authors discuss the current trends in the usage of formal techniques in t...
Electronic elections, also known as i-voting might help in removing the crisis in our democracy, whi...
This article introduces what we call procedural security analysis, an approach that allows for a sys...
Abstract. The ProVotE project aims at actuating art. 84 of law 2 – 5/3/2003, which promotes the intr...
We have seen that several currently deployed e-voting systems share critical failures in their desig...
The I-Voting system designed and implemented in Estonia is one of the first nationwide Internet voti...
Voting is at the heart of a country’s democracy. Assurance in the integrity of the electoral process...
For additional materials and contact information, visit estoniaevoting.org. Estonia was the first co...
With the rapid growth of the Internet, online voting appears to be a reasonable alternative to conve...
This research focuses on the study of the effective practices of risk assessment for the Omani elect...
The ProVotE project aims at actuating art. 84 of law 2 - 5/3/2003 of the Autonomous Province of Tren...
Abstract. Performing a good security analysis on the design of a system is an essential step in orde...
Abstract: This paper presents a methodology for procedural security analysis in order to analyze and...
We are involved in a project related to the evaluation and possible introduction of \mbox{e-voting} ...
Deploying a system in a safe and secure manner requires ensuring the tech- nical and procedural leve...
In this chapter, first the authors discuss the current trends in the usage of formal techniques in t...
Electronic elections, also known as i-voting might help in removing the crisis in our democracy, whi...
This article introduces what we call procedural security analysis, an approach that allows for a sys...
Abstract. The ProVotE project aims at actuating art. 84 of law 2 – 5/3/2003, which promotes the intr...
We have seen that several currently deployed e-voting systems share critical failures in their desig...
The I-Voting system designed and implemented in Estonia is one of the first nationwide Internet voti...
Voting is at the heart of a country’s democracy. Assurance in the integrity of the electoral process...
For additional materials and contact information, visit estoniaevoting.org. Estonia was the first co...
With the rapid growth of the Internet, online voting appears to be a reasonable alternative to conve...
This research focuses on the study of the effective practices of risk assessment for the Omani elect...
The ProVotE project aims at actuating art. 84 of law 2 - 5/3/2003 of the Autonomous Province of Tren...