![]() |
![]() |
University of Birmingham > Talks@bham > Computer Security Seminars > Electronic Voting: Introduction, privacy and verifiability definitions, and Helios case study 2/2
Electronic Voting: Introduction, privacy and verifiability definitions, and Helios case study 2/2Add to your list(s) Download to your calendar using vCal
If you have a question about this talk, please contact Matthijs Melissen. Electronic voting systems used for real-world, large-scale public elections place extensive trust in software and hardware. Unfortunately, instead of being trustworthy, many systems are vulnerable to attacks that could bring election outcomes into disrepute. In this talk, I will show how cryptography can be used to secure the electronic voting systems we use in real-life, eliminating the need for blind trust. The talk will be split into two parts:
The talk is based upon papers with David Bernhard, Michael Clarkson, Véronique Cortier, and Steven Frink (see http://bensmyth.com/publications.php for details). This talk is part of the Computer Security Seminars series. This talk is included in these lists:
Note that ex-directory lists are not shown. |
Other listsApplied Mathematics Seminar Series Birmingham Popular Maths Lectures Metamaterials Research Group SeminarsOther talksQuantum simulations using ultra cold ytterbium Ultrafast, all-optical, and highly efficient imaging of molecular chirality Modelling uncertainty in image analysis. Test talk Sylow branching coefficients for symmetric groups Geometry of alternating projections in metric spaces with bounded curvature |