E-Voting System Evaluation Based on the Council of Europe Recommendations: nVotes
暂无分享,去创建一个
Héctor Alaiz-Moretón | David Duenas-Cid | David Yeregui Marcos del Blanco | David Duenas-Cid | H. Alaiz-Moretón
[1] Luis Panizo Alonso,et al. E-Voting System Evaluation Based on The Council of Europe Recommendations: Helios Voting , 2018, IEEE Transactions on Emerging Topics in Computing.
[2] Robert Krimmer,et al. New methodology for calculating cost-efficiency of different ways of voting: is internet voting cheaper? , 2020, Public Money & Management.
[3] Torben P. Pedersen. A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.
[4] Ardita Driza Maurer. Updated European Standards for E-voting , 2017 .
[5] Melanie Volkamer,et al. Towards a Practical Cryptographic Voting Scheme Based on Malleable Proofs , 2013, VoteID.
[6] Véronique Cortier,et al. Belenios: A Simple Private and Verifiable Electronic Voting System , 2019, Foundations of Security, Protocols, and Equational Reasoning.
[7] Kristjan Vassil,et al. Could Internet Voting Halt Declining Electoral Turnout? New Evidence That E-Voting Is Habit Forming , 2018 .
[8] Melanie Volkamer,et al. Extending Helios Towards Private Eligibility Verifiability , 2015, VoteID.
[9] Ben Adida,et al. Helios: Web-based Open-Audit Voting , 2008, USENIX Security Symposium.
[10] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[11] Katharina Bräunlich. Sichere Internetwahlen: Ein rechtswissenschaftlich-informatisches Modell , 2013 .
[12] Stephan Neumann,et al. Evaluation and improvement of internet voting schemes based on legally-founded security requirements , 2016 .
[13] Markus Jakobsson,et al. Coercion-resistant electronic elections , 2005, WPES '05.
[14] Philip T. Kortum,et al. From Error to Error: Why Voters Could not Cast a Ballot and Verify Their Vote With Helios, Prêt à Voter, and Scantegrity II , 2015 .
[15] Robert Krimmer,et al. How Much Does an e-Vote Cost? Cost Comparison per Vote in Multichannel Elections in Estonia , 2018, E-Vote-ID.
[16] W. Edwards Deming. Sample design in business research , 1960 .
[17] C. P. Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1989, EUROCRYPT.
[18] Véronique Cortier. Formal verification of e-voting: solutions and challenges , 2015, SIGL.
[19] Kristian Gjøsteen,et al. The Norwegian Internet Voting Protocol , 2011, VoteID.
[20] Kristian Gjøsteen,et al. Analysis of an internet voting protocol , 2010, IACR Cryptol. ePrint Arch..
[21] Dimitrios Zissis,et al. Design, Development, and Use of Secure Electronic Voting Systems , 2014 .
[22] Robert Krimmer,et al. The How and Why to Internet Voting an Attempt to Explain E-Stonia , 2016, E-VOTE-ID.
[23] Mila Gascó,et al. A Protocolized, Comparative Study of Helios Voting and Scytl/iVote , 2019, 2019 Sixth International Conference on eDemocracy & eGovernment (ICEDEG).
[24] Peter van den Besselaar,et al. Security as Belief User's Perceptions on the Security of E-Voting Systems , 2004, Electronic Voting in Europe.
[25] Volker Hammer,et al. Betriebliche Telefon- und ISDN-Anlagen rechtsgemäß gestaltet , 1993, Edition SEL-Stiftung.
[26] Kazue Sako,et al. Efficient Receipt-Free Voting Based on Homomorphic Encryption , 2000, EUROCRYPT.
[27] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[28] Melanie Volkamer,et al. Holistic and Law Compatible IT Security Evaluation: Integration of Common Criteria, ISO 27001/IT-Grundschutz and KORA , 2013, Int. J. Inf. Secur. Priv..
[29] Melanie Volkamer,et al. Electronic voting with fully distributed trust and maximized flexibility regarding ballot design , 2014, 2014 6th International Conference on Electronic Voting: Verifying the Vote (EVOTE).