Real-World Electronic Voting Real-World Electronic Voting
Series in Security, Privacy and Trust

Real-World Electronic Voting

Design, Analysis and Deployment

    • $89.99
    • $89.99

Publisher Description

Real-World Electronic Voting: Design, Analysis and Deployment captures all major developments in electronic voting since 2003 in a real-world setting. It covers three broad categories: e-voting protocols, attacks reported on e-voting and new developments on the use of e-voting.

This book explores recent innovations in both poll-site and remote voting systems and their application throughout the world. The requirements of elections are analysed, the available tools and technologies are described, and a variety of modern systems are presented in detail together with discussions of deployments. This is an invaluable resource for election professionals, researchers and policy makers alike.

Key Features: Reviews both technical and social aspects of e-voting Covers e-voting protocols, attacks reported on e-voting and new developments on the use of e-voting Designed for government election practitioners and policy makers who want to understand the threats and opportunities in e-voting and assess its suitability for future elections

GENRE
Business & Personal Finance
RELEASED
2016
30 November
LANGUAGE
EN
English
LENGTH
477
Pages
PUBLISHER
CRC Press
SELLER
Taylor & Francis Group
SIZE
4.5
MB
Security and Control in Information Systems Security and Control in Information Systems
2005
Agents Unleashed Agents Unleashed
2014
Information Security Management Handbook, Volume 6 Information Security Management Handbook, Volume 6
2016
Blockchain Explained Blockchain Explained
2020
Computer and Cyber Security Computer and Cyber Security
2018
Blockchain Blockchain
2019
Botnets Botnets
2019
Intrusion Detection and Prevention for Mobile Ecosystems Intrusion Detection and Prevention for Mobile Ecosystems
2017
Location Privacy in Wireless Sensor Networks Location Privacy in Wireless Sensor Networks
2016
Empirical Research for Software Security Empirical Research for Software Security
2017
Protecting Mobile Networks and Devices Protecting Mobile Networks and Devices
2016