Results 241 to 250 of about 45,384 (296)
Some of the next articles are maybe not open access.
2023
Biometric fingerprint devices used in electronic voting machines (EVMs) for voter verification and authentication eliminates two main threats towards present-day voting systems, which include illegal voting as well as repetition of votes. This application has extensive use in real world scenarios and helps to conduct fair and free elections. The person
Siddharth Chatterjee +2 more
openaire +3 more sources
Biometric fingerprint devices used in electronic voting machines (EVMs) for voter verification and authentication eliminates two main threats towards present-day voting systems, which include illegal voting as well as repetition of votes. This application has extensive use in real world scenarios and helps to conduct fair and free elections. The person
Siddharth Chatterjee +2 more
openaire +3 more sources
it - Information Technology, 2014
Abstract Systems for electronic voting (e-voting systems), including systems for voting over the Internet and systems for voting in a voting booth, have been employed in many countries. However, most of the systems used in practice today do not provide a sufficient level of security. For example, programming errors and malicious behavior
Ralf Küsters, Tomasz Truderung
openaire +2 more sources
Abstract Systems for electronic voting (e-voting systems), including systems for voting over the Internet and systems for voting in a voting booth, have been employed in many countries. However, most of the systems used in practice today do not provide a sufficient level of security. For example, programming errors and malicious behavior
Ralf Küsters, Tomasz Truderung
openaire +2 more sources
Information foraging in E-voting
CHI '09 Extended Abstracts on Human Factors in Computing Systems, 2009In this paper, we present a case study of human-information interaction in the online realm of politics. The case study consists of a participant observed while searching and browsing the internet for campaign information in a mock-voting situation while taking notes that were to be shared with others.
Ravi K. Vatrapu, Scott P. Robertson
openaire +2 more sources
29th Annual International Computer Software and Applications Conference (COMPSAC'05), 2006
We discuss the prospects and perils of electronic voting technologies. We argue that poorly designed and deployed technology can be the source of major threats to the security of the voting process, although carefully designed systems have the potential to increase the trustworthiness.
openaire +1 more source
We discuss the prospects and perils of electronic voting technologies. We argue that poorly designed and deployed technology can be the source of major threats to the security of the voting process, although carefully designed systems have the potential to increase the trustworthiness.
openaire +1 more source
2016
The electoral system is an essential element for the survival of the democracy. Efforts are being made to develop voting systems that are convenient, reliable, transparent and secure. However, considering the security problems that can occur using the underlying technologies, it is difficult to construct an impenetrable system.
Ionut-Mihai Posea +4 more
openaire +1 more source
The electoral system is an essential element for the survival of the democracy. Efforts are being made to develop voting systems that are convenient, reliable, transparent and secure. However, considering the security problems that can occur using the underlying technologies, it is difficult to construct an impenetrable system.
Ionut-Mihai Posea +4 more
openaire +1 more source
ACM SIGCSE Bulletin, 2006
It is generally foolish to predict the future but in this case the odds are with me. This article was written in July 2006 but it will be early December 2006 before it is in print. In the USA a 'mid-term election' was completed in November (three months after this article was written) and I presume most of the recounts from that election should be over
openaire +1 more source
It is generally foolish to predict the future but in this case the odds are with me. This article was written in July 2006 but it will be early December 2006 before it is in print. In the USA a 'mid-term election' was completed in November (three months after this article was written) and I presume most of the recounts from that election should be over
openaire +1 more source
A Secure e-Voting Architecture
2011 Eighth International Conference on Information Technology: New Generations, 2011The constant development in computer technology now gives rise to an efficient way of using computer or electronic medium of voting. However, it is being faced with the problem of non-anonymity, coercion and bribery. In this paper, elliptic curve is combined with ElGamal cryptosystem to enhance the security of e-voting architecture. Several points from
Adesina S. Sodiya +2 more
openaire +1 more source
The Future of E-voting in Australia
IEEE Security & Privacy, 2012Australia has a long history of transparent, high-integrity secret ballot elections. As elections are increasingly dependent on electronic systems, the traditions of transparency and privacy must extend to new technologies and ways of scrutinizing them.
Richard Buckland, Roland Wen
openaire +1 more source
E-Voting Attacks and Countermeasures
2014 28th International Conference on Advanced Information Networking and Applications Workshops, 2014Electronic voting (e-voting) systems have been inuse since the 1960s. E-voting offers many advantages compared to other voting techniques. However, it also introduces many security challenges. As it may contain malicious back-doors that can affect system dependability.
M. Tarek Ibn Ziad +4 more
openaire +1 more source

