Secure Electronic Voting

  • Dimitris A. Gritzalis

Part of the Advances in Information Security book series (ADIS, volume 7)

Table of contents

  1. Front Matter
    Pages i-xiv
  2. Setting the Scene

    1. Front Matter
      Pages 1-1
    2. Douglas W. Jones
      Pages 3-16
    3. Rebecca T. Mercuri, Peter G. Neumann
      Pages 31-42
    4. Lilian Mitrou, Dimitris Gritzalis, Sokratis Katsikas, Gerald Quirchmayr
      Pages 43-60
  3. Trends and Perspectives

    1. Front Matter
      Pages 61-61
    2. Mike Burmester, Emmanouil Magkos
      Pages 63-76
    3. Ivan Damgård, Jens Groth, Gorm Salomonsen
      Pages 77-99
    4. Costas Lambrinoudakis, Dimitris Gritzalis, Vassilis Tsoumas, Maria Karyda, Spyros Ikonomopoulos
      Pages 101-122
  4. Capabilities and Limitations

    1. Front Matter
      Pages 123-123
    2. Roy G. Saltman, M. S. M.P.A.
      Pages 125-137
    3. Aggelos Kiayias, Moti Yung
      Pages 139-151
    4. Alexander Trechsel, Fernando Mendez, Raphaël Kies
      Pages 181-194
    5. Danilo Bruschi, Giusi Poletti, Emilia Rosti
      Pages 195-209
  5. Back Matter
    Pages 221-223

About this book


Secure Electronic Voting is an edited volume, which includes chapters authored by leading experts in the field of security and voting systems. The chapters identify and describe the given capabilities and the strong limitations, as well as the current trends and future perspectives of electronic voting technologies, with emphasis in security and privacy. Secure Electronic Voting includes state-of-the-art material on existing and emerging electronic and Internet voting technologies, which may eventually lead to the development of adequately secure e-voting systems. This book also includes an overview of the legal framework with respect to voting, a description of the user requirements for the development of a secure e-voting system, and a discussion on the relevant technical and social concerns. Secure Electronic Voting includes, also, three case studies on the use and evaluation of e-voting systems in three different real world environments.


Internet computer computer science evaluation network privacy security technology verification

Editors and affiliations

  • Dimitris A. Gritzalis
    • 1
  1. 1.Athens University of Economics and BusinessGreece

Bibliographic information

  • DOI
  • Copyright Information Kluwer Academic Publishers 2003
  • Publisher Name Springer, Boston, MA
  • eBook Packages Springer Book Archive
  • Print ISBN 978-1-4613-4981-5
  • Online ISBN 978-1-4615-0239-5
  • Series Print ISSN 1568-2633
  • Buy this book on publisher's site
Industry Sectors
IT & Software