Abstract is missing.
- Election Security and Economics: It's All About EveDavid A. Basin, Hans Gersbach, Akaki Mamageishvili, Lara Schmid, Oriol Tejada. 1-20 [doi]
- Cryptographic Security Analysis of E-voting Systems: Achievements, Misconceptions, and LimitationsRalf Küsters, Johannes Müller 0001. 21-41 [doi]
- Voting in E-Participation: A Set of Requirements to Support Accountability and Trust by Electoral CommitteesPeter Parycek, Michael Sachs, Shefali Virkar, Robert Krimmer. 42-56 [doi]
- The Weakness of Cumulative VotingJosh Benaloh. 57-65 [doi]
- No More Excuses: Automated Synthesis of Practical and Verifiable Vote-Counting Programs for Complex Voting SchemesLyria Bennett Moses, Rajeev Goré, Ron Levy, Dirk Pattinson, Mukesh Tiwari. 66-83 [doi]
- Public Evidence from Secret BallotsMatthew Bernhard, Josh Benaloh, J. Alex Halderman, Ronald L. Rivest, Peter Y. A. Ryan, Philip B. Stark, Vanessa Teague, Poorvi L. Vora, Dan S. Wallach. 84-109 [doi]
- Towards a Mechanized Proof of Selene Receipt-Freeness and Vote-PrivacyAlessandro Bruni, Eva Drewsen, Carsten Schürmann. 110-126 [doi]
- Trust Implications of DDoS Protection in Online ElectionsChris Culnane, Mark Eldridge, Aleksander Essex, Vanessa Teague. 127-145 [doi]
- Updated European Standards for E-voting - The Council of Europe Recommendation Rec(2017)5 on Standards for E-votingArdita Driza-Maurer. 146-162 [doi]
- A Formally Verified Single Transferable Voting Scheme with Fractional ValuesMilad K. Ghale, Rajeev Goré, Dirk Pattinson. 163-182 [doi]
- Reverse Bayesian Poisoning: How to Use Spam Filters to Manipulate Online ElectionsHugo Jonker, Sjouke Mauw, Tom Schmitz. 183-197 [doi]
- Return Code Schemes for Electronic Voting SystemsShahram Khazaei, Douglas Wikström. 198-209 [doi]
- Eos a Universal Verifiable and Coercion Resistant Voting ProtocolStefan Patachi, Carsten Schürmann. 210-227 [doi]
- Clash Attacks and the STAR-Vote SystemOlivier Pereira, Dan S. Wallach. 228-247 [doi]
- Verifiability Experiences in Government Online Voting SystemsJordi Puiggali, Jordi Cucurull, Sandra Guasch, Robert Krimmer. 248-263 [doi]
- Cast-as-Intended Mechanism with Return Codes Based on PETsAchim Brelle, Tomasz Truderung. 264-279 [doi]
- How Could Snowden Attack an Election?Douglas Wikström, Jordi Barrat, Sven Heiberg, Robert Krimmer, Carsten Schürmann. 280-291 [doi]
- Bits or Paper: Which Should Get to Carry Your Vote?Jan Willemson. 292-305 [doi]
- Estonian Voting Verification Mechanism Revisited AgainIvo Kubjas, Tiit Pikma, Jan Willemson. 306-317 [doi]