![]() |
![]() |
University of Birmingham > Talks@bham > Computer Security Seminars > Electronic Voting: Introduction, privacy and verifiability definitions, and Helios case study 1/2
Electronic Voting: Introduction, privacy and verifiability definitions, and Helios case study 1/2Add to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Matthijs Melissen. Electronic voting systems used for real-world, large-scale public elections place extensive trust in software and hardware. Unfortunately, instead of being trustworthy, many systems are vulnerable to attacks that could bring election outcomes into disrepute. In this talk, I will show how cryptography can be used to secure the electronic voting systems we use in real-life, eliminating the need for blind trust. The talk will be split into two parts:
The talk is based upon papers with David Bernhard, Michael Clarkson, Véronique Cortier, and Steven Frink (see http://bensmyth.com/publications.php for details). This talk is part of the Computer Security Seminars series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsComputer Science Distinguished Seminar Theoretical computer science seminar IMA West Midlands BranchOther talksProvably Convergent Plug-and-Play Quasi-Newton Methods for Imaging Inverse Problems Extending the Lax type operator for finite W-algebras TBC Sylow branching coefficients for symmetric groups CANCELLED: An overview of Non-Reductive Geometric Invariant Theory and its applications Metamaterials for light-matter interaction studies |