Overview
Part of the book series: Lecture Notes in Computer Science (LNCS, volume 12455)
Part of the book sub series: Security and Cryptology (LNSC)
Included in the following conference series:
Conference proceedings info: E-Vote-ID 2020.
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
The conference collected the most relevant debates on the development of Electronic Voting, from aspects relating to security and usability through to practical experiences and applications of voting systems, also including legal, social or political aspects, amongst others; turning out to be an important global referent in relation to this issue.
Similar content being viewed by others
Keywords
- access control
- artificial intelligence
- authentication
- computer hardware
- computer networks
- computer science
- computer security
- computer systems
- cryptography
- data security
- engineering
- Human-Computer Interaction (HCI)
- internet
- mathematics
- network protocols
- network security
- signal processing
- software design
- software engineering
- software quality
Table of contents (15 papers)
Other volumes
-
Electronic Voting
Editors and Affiliations
Bibliographic Information
Book Title: Electronic Voting
Book Subtitle: 5th International Joint Conference, E-Vote-ID 2020, Bregenz, Austria, October 6–9, 2020, Proceedings
Editors: Robert Krimmer, Melanie Volkamer, Bernhard Beckert, Ralf Küsters, Oksana Kulyk, David Duenas-Cid, Mihkel Solvak
Series Title: Lecture Notes in Computer Science
DOI: https://doi.org/10.1007/978-3-030-60347-2
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer Nature Switzerland AG 2020
Softcover ISBN: 978-3-030-60346-5Published: 25 September 2020
eBook ISBN: 978-3-030-60347-2Published: 24 September 2020
Series ISSN: 0302-9743
Series E-ISSN: 1611-3349
Edition Number: 1
Number of Pages: X, 229
Number of Illustrations: 17 b/w illustrations
Topics: Cryptology, Computer Applications, Security Services, Mobile and Network Security, Computer Communication Networks, Computer System Implementation