![]() |
![]() |
University of Birmingham > Talks@bham > Computer Security Seminars > Electronic Voting: Introduction, privacy and verifiability definitions, and Helios case study 2/2
Electronic Voting: Introduction, privacy and verifiability definitions, and Helios case study 2/2Add to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Matthijs Melissen. Electronic voting systems used for real-world, large-scale public elections place extensive trust in software and hardware. Unfortunately, instead of being trustworthy, many systems are vulnerable to attacks that could bring election outcomes into disrepute. In this talk, I will show how cryptography can be used to secure the electronic voting systems we use in real-life, eliminating the need for blind trust. The talk will be split into two parts:
The talk is based upon papers with David Bernhard, Michael Clarkson, Véronique Cortier, and Steven Frink (see http://bensmyth.com/publications.php for details). This talk is part of the Computer Security Seminars series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsMolecular and Medical Physics Seminar Series SERENE Group Seminar Series Optimisation and Numerical Analysis SeminarsOther talksHorizontal Mean Curvature Flow and stochastic optimal controls TBA TBC TBA TBA Control variates for computing transport coefficients |