Electronic Voting 7th International Joint Conference, E-Vote-ID 2022, Bregenz, Austria, October 4–7, 2022, Proceedings / [electronic resource] : edited by Robert Krimmer, Melanie Volkamer, David Duenas-Cid, Peter Rønne, Micha Germann. - 1st ed. 2022. - XII, 185 p. 22 illus., 19 illus. in color. online resource. - Lecture Notes in Computer Science, 13553 1611-3349 ; . - Lecture Notes in Computer Science, 13553 .

An analysis of the security and privacy issues of the Neovote online voting system -- Time, Privacy, Robustness, Accuracy: Trade-Offs for the Open Vote Network Protocol -- Review Your Choices: When Confirmation Pages Break Ballot Secrecy in Online Elections -- Running the Race: a Swiss Voting Story -- The Effect of Exogenous Shocks on the Administration of Online Voting: Evidence from Ontario, Canada -- The Council of Europe's CM/Rec(2017)5 on e-voting and secret suffrage: time for yet another update? -- Sweeter than SUITE: Supermartingale Stratified Union-Intersection Tests of Elections -- They may look and look, yet not see: BMDs cannot be tested adequately -- Individual Verifiability with Return Codes: Manipulation Detection Efficacy -- and Accuracy Testing: A Fifty-State Review.

Open Access

This open access book LNCS 13353 constitutes the proceedings of the 7th International Conference on Electronic Voting, E-Vote-ID 2022, held in Bregenz, Austria, in October 2022. The 10 full papers presented were carefully reviewed and selected from 39 submissions. The conference collected the most relevant debates on the development of Electronic Voting, from aspects relating to security and usability through to practical experiences and applications of voting systems, also including legal, social, or political aspects, amongst others.

9783031159114

10.1007/978-3-031-15911-4 doi


Cryptography.
Data encryption (Computer science).
Application software.
Artificial intelligence.
Computer networks--Security measures.
Data protection.
Computer networks .
Cryptology.
Computer and Information Systems Applications.
Artificial Intelligence.
Mobile and Network Security.
Data and Information Security.
Computer Communication Networks.

QA268

005.824