000 06582nam a22008535i 4500
001 978-3-032-05036-6
003 DE-He213
005 20260304124353.0
007 cr nn 008mamaa
008 250910s2026 sz | s |||| 0|eng d
020 _a9783032050366
_9978-3-032-05036-6
024 7 _a10.1007/978-3-032-05036-6
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aElectronic Voting
_h[electronic resource] :
_b10th International Joint Conference, E-Vote-ID 2025, Nancy, France, October 1–3, 2025, Proceedings /
_cedited by David Duenas-Cid, Peter Roenne, Melanie Volkamer, Michelle Blom, Pierrick Gaudry, Isabelle Borucki, Leontine Loeber, Alexandre Debant.
250 _a1st ed. 2026.
264 1 _aCham :
_bSpringer Nature Switzerland :
_bImprint: Springer,
_c2026.
300 _aX, 225 p. 22 illus., 14 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
341 0 _bPDF/UA-1
_2onix
341 0 _bTable of contents navigation
_2onix
341 0 _bSingle logical reading order
_2onix
341 0 _bShort alternative textual descriptions
_2onix
341 0 _bUse of color is not sole means of conveying information
_2onix
341 0 _bUse of high contrast between text and background color
_2onix
341 0 _bNext / Previous structural navigation
_2onix
341 0 _bAll non-decorative content supports reading without sight
_2onix
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v16028
505 0 _a -- MERGE: Matching Electronic Results with Genuine Evidence, for verifiable voting in person at remote locations. -- REACTIVE: Rethinking Effective Approaches Concerning Trustees in Verifiable Elections. -- Revisiting silent coercion. -- Threshold Receipt-Free Voting with Server-Side Vote Validation. -- End-to-End Verifiable Internet Voting with Partially Private Bulletin Boards. -- Attack Once, Compromise All? On the Scalability of Attacks. -- Development and Expert Evaluation of an Informative Video concerning Verifiable Internet Voting. -- How to Implement Anywhere Voting: A Case Study of Brazil. -- Credential Attacks in Ontario’s Online Elections. -- Voting Under Pressure: Perceptions of Counter-Strategies in Internet Voting. -- Dice, but don’t slice: Optimizing the efficiency of ONEAudit. -- Re-Voting Under Surveillance: National eID Transaction Logs as a Threat to Coercion Resistance in Estonian Internet Voting. -- Recommendations to OSCE/ODIHR (on how to give better recommendations for Internet voting).
506 0 _aOpen Access
520 _aThis open access book constitutes the proceedings of the 10th International Joint Conference on Electronic Voting, E-Vote-ID 2024, held in Nancy, France, during October 1-3, 2025. The 13 full papers included in this book were carefully reviewed and selected from 39 submissions. They focus on on the development of Electronic and Internet Voting and Electoral Technologies, from aspects relating to security and usability to practical experiences and applications of voting systems, also including legal, social, or political aspects, amongst others, turning out to be an important global reference point concerning these issues.
532 8 _aAccessibility summary: This PDF has been created in accordance with the PDF/UA-1 standard to enhance accessibility, including screen reader support, described non-text content (images, graphs), bookmarks for easy navigation, keyboard-friendly links and forms and searchable, selectable text. We recognize the importance of accessibility, and we welcome queries about accessibility for any of our products. If you have a question or an access need, please get in touch with us at accessibilitysupport@springernature.com. Please note that a more accessible version of this eBook is available as ePub.
532 8 _aNo reading system accessibility options actively disabled
532 8 _aPublisher contact for further accessibility information: accessibilitysupport@springernature.com
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aArtificial intelligence.
650 0 _aComputer networks
_xSecurity measures.
650 0 _aComputer networks .
650 1 4 _aCryptology.
650 2 4 _aArtificial Intelligence.
650 2 4 _aMobile and Network Security.
650 2 4 _aComputer Communication Networks.
700 1 _aDuenas-Cid, David.
_eeditor.
_0(orcid)0000-0002-0451-4514
_1https://orcid.org/0000-0002-0451-4514
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aRoenne, Peter.
_eeditor.
_0(orcid)0000-0002-2785-8301
_1https://orcid.org/0000-0002-2785-8301
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_917042
700 1 _aVolkamer, Melanie.
_eeditor.
_0(orcid)0000-0003-2674-4043
_1https://orcid.org/0000-0003-2674-4043
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aBlom, Michelle.
_eeditor.
_0(orcid)0000-0002-0459-9917
_1https://orcid.org/0000-0002-0459-9917
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_917043
700 1 _aGaudry, Pierrick.
_eeditor.
_0(orcid)0000-0001-8263-8101
_1https://orcid.org/0000-0001-8263-8101
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_923723
700 1 _aBorucki, Isabelle.
_eeditor.
_0(orcid)0000-0003-2076-4975
_1https://orcid.org/0000-0003-2076-4975
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_923724
700 1 _aLoeber, Leontine.
_eeditor.
_0(orcid)0000-0002-2272-6887
_1https://orcid.org/0000-0002-2272-6887
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_923725
700 1 _aDebant, Alexandre.
_eeditor.
_0(orcid)0000-0001-5610-1765
_1https://orcid.org/0000-0001-5610-1765
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_923726
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783032050359
776 0 8 _iPrinted edition:
_z9783032050373
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v16028
856 4 0 _uhttps://doi.org/10.1007/978-3-032-05036-6
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-SXPS
912 _aZDB-2-LNC
912 _aZDB-2-SOB
999 _c579847
_d579847