000 05440nam a22006615i 4500
001 978-3-540-77493-8
003 DE-He213
005 20240730200145.0
007 cr nn 008mamaa
008 100301s2007 gw | s |||| 0|eng d
020 _a9783540774938
_9978-3-540-77493-8
024 7 _a10.1007/978-3-540-77493-8
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aE-Voting and Identity
_h[electronic resource] :
_bFirst International Conference, VOTE-ID 2007, Bochum, Germany, October 4-5, 2007, Revised Selected Papers /
_cedited by Ammar Alkassar, Melanie Volkamer.
250 _a1st ed. 2007.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2007.
300 _aXII, 189 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v4896
505 0 _aOverview on Remote Electronic Voting -- The Development of Remote E-Voting Around the World: A Review of Roads and Directions -- Remote Voting Schemes: A Comparative Analysis -- Internet-Voting: Opportunity or Threat for Democracy? -- Evaluation of Electronic Voting Systems -- Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach -- Compliance of RIES to the Proposed e-Voting Protection Profile -- Compliance of POLYAS with the BSI Protection Profile - Basic Requirements for Remote Electronic Voting Systems -- Electronic Voting in Different Countries -- Electronic Voting in Belgium: Past and Future -- The Digital Voting Pen at the Hamburg Elections 2008: Electronic Voting Closest to Conventional Voting -- The Security Analysis of e-Voting in Japan -- E-Voting and Trust -- Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generator -- Enhancing the Trust and Perceived Security in e-Cognocracy -- Improvements/Extensions of Existing Approaches -- Simulation-Based Analysis of E2E Voting Systems -- A Simple Technique for Safely Using Punchscan and Prêt à Voter in Mail-In Elections -- Threat Analysis of a Practical Voting Scheme with Receipts -- Code Voting -- Secure Internet Voting with Code Sheets -- CodeVoting Protection Against Automatic Vote Manipulation in an Uncontrolled Environment.
520 _aVoting and identity have a very delicate relationship. Only a few processes - pendsomuchonanidentitymanagementrespectingthe?nelinebetweenreliable identi?cation and reliable non-identi?ability each at its part during the process. And only a few processes may change their outer appearance so much with the advent of new IT as voting and identity management do. So it was no surprise in FIDIS, the interdisciplinary Network of Excellence working on the Future of Identity in the Information Society, when Ammar Alkassarproposedanalyzethetechnical,socio-ethicalandlegalrelationsbetween Identity and E-Voting as part of Sirrix's activity in FIDIS. There are many reasons for doing this, e. g. , the open question of the imp- cations of identity and identi?cation to the emerging ?eld of E-Government and E-Democracy, especially E-Voting. Issues to be discussed are from several - mains, e. g. , is identity fraud a crucial matter in E-Voting? What is the trade-o? between anonymity and free speech vs. content-related o?ences? Is it approp- ate to use ID cards or health-insurance cards with digital identities for citizen tasks or voting? What about using SIM cards? Can we employ biometrics for identi?cation purposes with respect to E-Democracy? Last but not least nearly all areas of E-Government rely on a reliable link between the citizens and their governments and administrations. However, in contrast to business processes, the e?ects are much more crucial: Identity fraud may cause more problems than in the business domain; the consequences of misuse cannot be measured just by ?nancial means.
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aData protection.
_97245
650 0 _aComputer networks .
_931572
650 0 _aDatabase management.
_93157
650 0 _aElectronic data processing
_xManagement.
_9162309
650 0 _aComputers and civilization.
_921733
650 1 4 _aCryptology.
_931769
650 2 4 _aData and Information Security.
_931990
650 2 4 _aComputer Communication Networks.
_9162310
650 2 4 _aDatabase Management.
_93157
650 2 4 _aIT Operations.
_931703
650 2 4 _aComputers and Society.
_931668
700 1 _aAlkassar, Ammar.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9162311
700 1 _aVolkamer, Melanie.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9162312
710 2 _aSpringerLink (Online service)
_9162313
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540774921
776 0 8 _iPrinted edition:
_z9783540846994
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v4896
_9162314
856 4 0 _uhttps://doi.org/10.1007/978-3-540-77493-8
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c95915
_d95915