International audienceElectronic voting should offer at least the same guarantees than traditional paper-based voting systems. In order to achieve this, electronic voting protocols make use of cryptographic primitives, as in the more traditional case of authentication or key exchange protocols. All these protocols are notoriously difficult to design and flaws may be found years after their first release. Formal models, such as process algebra, Horn clauses, or constraint systems, have been successfully applied to automatically analyze traditional protocols and discover flaws. Electronic voting protocols however significantly increase the difficulty of the analysis task. Indeed, they involve for example new and sophisticated cryptographic pr...
A vast number of e-voting schemes including mix-net-based e-voting, homomorphic e-voting, blind sign...
Abstract: Voting is an important part of the democratic process. The electorate makes a decision or ...
Electronic voting systems are a perfect example of security-critical computing. One of the critical...
International audienceElectronic voting should offer at least the same guarantees than traditional p...
Abstract. Electronic voting should offer at least the same guarantees than tra-ditional paper-based ...
In this chapter, first the authors discuss the current trends in the usage of formal techniques in t...
Abstract. E-voting protocols aim at achieving a wide range of sophisticated se-curity properties and...
Electronic voting refers to the use of computers or computerized voting equipment to cast ballots in...
The last decade, electronic voting has evolved from being a mean of counting votes to also offer the...
Abstract: Electronic democracy (e-democracy) is a necessity in this era of computers and information...
Abstract: Cryptography is an important tool in the design and implementation of electronic voting sc...
E-voting has been introduced prematurely to national elections in many countries worldwide. There ar...
A large amount of research has been conducted to improve public verifiability of e-voting systems. O...
Abstract-Electronic voting systems are a perfect example of security-critical computing. One of the ...
Deploying a system in a safe and secure manner requires ensuring the tech- nical and procedural leve...
A vast number of e-voting schemes including mix-net-based e-voting, homomorphic e-voting, blind sign...
Abstract: Voting is an important part of the democratic process. The electorate makes a decision or ...
Electronic voting systems are a perfect example of security-critical computing. One of the critical...
International audienceElectronic voting should offer at least the same guarantees than traditional p...
Abstract. Electronic voting should offer at least the same guarantees than tra-ditional paper-based ...
In this chapter, first the authors discuss the current trends in the usage of formal techniques in t...
Abstract. E-voting protocols aim at achieving a wide range of sophisticated se-curity properties and...
Electronic voting refers to the use of computers or computerized voting equipment to cast ballots in...
The last decade, electronic voting has evolved from being a mean of counting votes to also offer the...
Abstract: Electronic democracy (e-democracy) is a necessity in this era of computers and information...
Abstract: Cryptography is an important tool in the design and implementation of electronic voting sc...
E-voting has been introduced prematurely to national elections in many countries worldwide. There ar...
A large amount of research has been conducted to improve public verifiability of e-voting systems. O...
Abstract-Electronic voting systems are a perfect example of security-critical computing. One of the ...
Deploying a system in a safe and secure manner requires ensuring the tech- nical and procedural leve...
A vast number of e-voting schemes including mix-net-based e-voting, homomorphic e-voting, blind sign...
Abstract: Voting is an important part of the democratic process. The electorate makes a decision or ...
Electronic voting systems are a perfect example of security-critical computing. One of the critical...