J. I. Toledo, Jordi Cucurull-Juan, J. Puiggalí, A. Fornés, J. Lladós
{"title":"Document Analysis Techniques for Automatic Electoral Document Processing: A Survey","authors":"J. I. Toledo, Jordi Cucurull-Juan, J. Puiggalí, A. Fornés, J. Lladós","doi":"10.1007/978-3-319-22270-7_8","DOIUrl":"https://doi.org/10.1007/978-3-319-22270-7_8","url":null,"abstract":"","PeriodicalId":171364,"journal":{"name":"International Conference on E-Voting and Identity","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131049938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extending Helios Towards Private Eligibility Verifiability","authors":"O. Kulyk, Vanessa Teague, M. Volkamer","doi":"10.1007/978-3-319-22270-7_4","DOIUrl":"https://doi.org/10.1007/978-3-319-22270-7_4","url":null,"abstract":"","PeriodicalId":171364,"journal":{"name":"International Conference on E-Voting and Identity","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132518233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vote Validatability in Mix-Net-Based eVoting","authors":"P. Bibiloni, Alex Escala, Paz Morillo","doi":"10.1007/978-3-319-22270-7_6","DOIUrl":"https://doi.org/10.1007/978-3-319-22270-7_6","url":null,"abstract":"","PeriodicalId":171364,"journal":{"name":"International Conference on E-Voting and Identity","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127904784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenging an E-voting System in Court - An Experience Report","authors":"Richard Hill","doi":"10.1007/978-3-319-22270-7_10","DOIUrl":"https://doi.org/10.1007/978-3-319-22270-7_10","url":null,"abstract":"","PeriodicalId":171364,"journal":{"name":"International Conference on E-Voting and Identity","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131715550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Verifiable Internet Elections with Everlasting Privacy and Minimal Trust","authors":"Philipp Locher, R. Haenni","doi":"10.1007/978-3-319-22270-7_5","DOIUrl":"https://doi.org/10.1007/978-3-319-22270-7_5","url":null,"abstract":"","PeriodicalId":171364,"journal":{"name":"International Conference on E-Voting and Identity","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129349519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine-Checked Reasoning About Complex Voting Schemes Using Higher-Order Logic","authors":"J. Dawson, R. Goré, Thomas Meumann","doi":"10.1007/978-3-319-22270-7_9","DOIUrl":"https://doi.org/10.1007/978-3-319-22270-7_9","url":null,"abstract":"","PeriodicalId":171364,"journal":{"name":"International Conference on E-Voting and Identity","volume":"85 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115056212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Making Code Voting Secure Against Insider Threats Using Unconditionally Secure MIX Schemes and Human PSMT Protocols","authors":"Y. Desmedt, S. Erotokritou","doi":"10.1007/978-3-319-22270-7_7","DOIUrl":"https://doi.org/10.1007/978-3-319-22270-7_7","url":null,"abstract":"","PeriodicalId":171364,"journal":{"name":"International Conference on E-Voting and Identity","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122782696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The New South Wales iVote System: Security Failures and Verification Flaws in a Live Online Election","authors":"J. A. Halderman, Vanessa Teague","doi":"10.1007/978-3-319-22270-7_3","DOIUrl":"https://doi.org/10.1007/978-3-319-22270-7_3","url":null,"abstract":"","PeriodicalId":171364,"journal":{"name":"International Conference on E-Voting and Identity","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117295903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal Model-Based Validation for Tally Systems","authors":"Dermot Cochran, J. Kiniry","doi":"10.1007/978-3-642-39185-9_3","DOIUrl":"https://doi.org/10.1007/978-3-642-39185-9_3","url":null,"abstract":"","PeriodicalId":171364,"journal":{"name":"International Conference on E-Voting and Identity","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125397974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}