Proceedings of the 15th ACM conference on Computer and communications security
An Open Framework for Remote Electronic Elections
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
Implicit Flows: Can't Live with `Em, Can't Live without `Em
ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
Secure Internet Voting Based on Paper Ballots
ICISS '08 Proceedings of the 4th International Conference on Information Systems Security
VoteBox: a tamper-evident, verifiable electronic voting system
SS'08 Proceedings of the 17th conference on Security symposium
The case for networked remote voting precincts
EVT'08 Proceedings of the conference on Electronic voting technology
Catch me if you can: permissive yet secure error handling
Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security
VOTE-ID '09 Proceedings of the 2nd International Conference on E-Voting and Identity
Developing a Legal Framework for Remote Electronic Voting
VOTE-ID '09 Proceedings of the 2nd International Conference on E-Voting and Identity
A Design of Secure Preferential E-Voting
VOTE-ID '09 Proceedings of the 2nd International Conference on E-Voting and Identity
Fabric: a platform for secure distributed computation and storage
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles
On voting machine design for verification and testability
Proceedings of the 16th ACM conference on Computer and communications security
Remote Electronic Voting with Revocable Anonymity
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
Prêt à voter: a voter-verifiable voting system
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Towards a Framework on the Security Requirements for Electronic Voting Protocols
RE-VOTE '09 Proceedings of the 2009 First International Workshop on Requirements Engineering for e-Voting Systems
A more precise security type system for dynamic security tests
PLAS '10 Proceedings of the 5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security
E-voting and forensics: prying open the black box
EVT/WOTE'09 Proceedings of the 2009 conference on Electronic voting technology/workshop on trustworthy elections
One-time encryption-key technique for the traditional DL-based encryption scheme with anonymity
Information Sciences: an International Journal
DIFC programs by automatic instrumentation
Proceedings of the 17th ACM conference on Computer and communications security
Election verifiability in electronic voting protocols
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Eperio: mitigating technical complexity in cryptographic election verification
EVT/WOTE'10 Proceedings of the 2010 international conference on Electronic voting technology/workshop on trustworthy elections
Towards automatic analysis of election verifiability properties
ARSPA-WITS'10 Proceedings of the 2010 joint conference on Automated reasoning for security protocol analysis and issues in the theory of security
Proving coercion-resistance of scantegrity II
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Usability analysis of Helios: an open source verifiable remote electronic voting system
EVT/WOTE'11 Proceedings of the 2011 conference on Electronic voting technology/workshop on trustworthy elections
Practical remote end-to-end voting scheme
EGOVIS'11 Proceedings of the Second international conference on Electronic government and the information systems perspective
True trustworthy elections: remote electronic voting using trusted computing
ATC'11 Proceedings of the 8th international conference on Autonomic and trusted computing
Adapting helios for provable ballot privacy
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Coercion-resistant electronic elections
Towards Trustworthy Elections
A semantic framework for declassification and endorsement
ESOP'10 Proceedings of the 19th European conference on Programming Languages and Systems
Automating security mediation placement
ESOP'10 Proceedings of the 19th European conference on Programming Languages and Systems
Selections: internet voting with over-the-shoulder coercion-resistance
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
A new approach towards coercion-resistant remote e-voting in linear time
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Union and intersection types for secure protocol implementations
TOSCA'11 Proceedings of the 2011 international conference on Theory of Security and Applications
A System-Aware Cyber Security architecture
Systems Engineering
NordSec'11 Proceedings of the 16th Nordic conference on Information Security Technology for Applications
Cobra: toward concurrent ballot authorization for internet voting
EVT/WOTE'12 Proceedings of the 2012 international conference on Electronic Voting Technology/Workshop on Trustworthy Elections
Precise enforcement of progress-sensitive security
Proceedings of the 2012 ACM conference on Computer and communications security
Measuring vote privacy, revisited
Proceedings of the 2012 ACM conference on Computer and communications security
Dissent in numbers: making strong anonymity scale
OSDI'12 Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation
Efficient vote authorization in coercion-resistant internet voting
VoteID'11 Proceedings of the Third international conference on E-Voting and Identity
An efficient and highly sound voter verification technique and its implementation
VoteID'11 Proceedings of the Third international conference on E-Voting and Identity
Trivitas: voters directly verifying votes
VoteID'11 Proceedings of the Third international conference on E-Voting and Identity
Practical Internet voting system
Journal of Network and Computer Applications
Randomized partial checking revisited
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
POST'13 Proceedings of the Second international conference on Principles of Security and Trust
POST'13 Proceedings of the Second international conference on Principles of Security and Trust
The secure platform problem taxonomy and analysis of existing proposals to address this problem
Proceedings of the 6th International Conference on Theory and Practice of Electronic Governance
Distributed ElGamal à la Pedersen: Application to Helios
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Using mobile device communication to strengthen e-Voting protocols
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Analysis of an electronic boardroom voting system
Vote-ID'13 Proceedings of the 4th international conference on E-Voting and Identity
A practical coercion resistant voting scheme revisited
Vote-ID'13 Proceedings of the 4th international conference on E-Voting and Identity
Mosaic: a secure and practical remote voting system
International Journal of Autonomic Computing
An efficient privacy-preserving solution for finding the nearest doctor
Personal and Ubiquitous Computing
A game-based definition of coercion resistance and its applications
Journal of Computer Security - CSF 2010
Journal of Computer Security - Foundational Aspects of Security
Attacking and fixing Helios: An analysis of ballot secrecy
Journal of Computer Security
Hi-index | 0.00 |
Civitas is the first electronic voting system that is coercion-resistant, universally and voter verifiable, and suitable for remote voting. This paper describes the design and implementation of Civitas. Assurance is established in the design through security proofs, and in the implementation through information-flow security analysis. Experimental results give a quantitative evaluation of the tradeoffs between time, cost, and security.