Results 151 to 160 of about 219,523 (193)
Some of the next articles are maybe not open access.

Analysis of an electronic voting system

IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 2004
With significant U.S. federal funds now available to replace outdated punch-card and mechanical voting systems, municipalities and states throughout the U.S. are adopting paperless electronic voting systems from a number of different vendors. We present a security analysis of the source code to one such machine used in a significant share of the market.
Tadayoshi Kohno   +3 more
openaire   +1 more source

Experiences with Electronic Vote

Proceedings of the 9th International Conference on Theory and Practice of Electronic Governance, 2016
This paper presents results of a research on electronic voting carried out by the Institute of Research in Computer Science LIDI of the School of Computer Science of the National University of La Plata, Argentina, as part of research in e-Government developed since 2003. In particular, the topic of electronic vote has generated various experiences that
Patricia Pesado   +8 more
openaire   +1 more source

Procedural security in electronic voting

37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the, 2004
In this paper, we explore the security related procedures that are required for the successful development and deployment of electronic voting in legally-binding government elections. Initiating our research on the theoretical basis, which justifies the necessity for security in deploying electronic elections, we further explore the question of who and
Alexandros Xenakis, Ann Macintosh
openaire   +1 more source

An anonymous electronic voting protocol for voting over the Internet

Proceedings Third International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems. WECWIS 2001, 2001
We propose a secure electronic voting protocol that is suitable for large scale voting over the Internet. The protocol allows a voter to cast his or her ballot anonymously, by exchanging untraceable yet authentic messages. The protocol ensures that: only eligible voters are able to cast votes; a voter is able to cast only one vote; a voter is able to ...
Indrajit Ray   +2 more
openaire   +1 more source

Enhancing Electronic Voting Machines on the Example of Bingo Voting

IEEE Transactions on Information Forensics and Security, 2009
The main purpose of cryptographic voting schemes is to provide transparency while protecting ballot secrecy and to enable a fast tally. In this paper, we address three major issues of cryptographic voting schemes. First we discuss the problem of secrecy and coercion resistance in the situation of a corrupted voting machine.
Bohli, J. M.   +4 more
openaire   +1 more source

Du-Vote: Remote Electronic Voting with Untrusted Computers

2015 IEEE 28th Computer Security Foundations Symposium, 2015
Du-Vote is a new remote electronic voting protocol that eliminates the often-required assumption that voters trust general-purpose computers. Trust is distributed in Du-Vote between a simple hardware token issued to the voter, the voter's computer, and a server run by election authorities.
Gurchetan S. Grewal   +3 more
openaire   +1 more source

Unconditionally Secure Electronic Voting

2010
In this chapter, we will show how to achieve unconditional or information-theoretic security in electronic voting with the following property: Even all voters and tallying authorities have unbounded computing power, the distorted integrity of the voting results can be detected and proved incorrect by every honest voter, If at least one tallying ...
Akira Otsuka, Hideki Imai
openaire   +1 more source

Electronic Voting

2022
Robert Krimmer, Jordi Barrat i Esteve
openaire   +2 more sources

Privacy and Verifiability in Electronic Voting

2010
Privacy and verifiability refer to fundamental principles of democratic elections and therefore belong to the set of established security requirements which each electronic voting scheme is expected to meet. However, very different ideas and opinions about privacy and verifiability exist in the scientific community, which shows that both properties are
openaire   +2 more sources

Efficient Vote Validity Check in Homomorphic Electronic Voting

2009
Homomorphic electronic voting is very popular but has an efficiency bottleneck: vote validity check, which limits application of e-voting, especially in large-scale elections. In this paper two efficient vote validity check mechanisms are designed for homomorphic e-voting, both of which are much more efficient than the existing vote validity check ...
Kun Peng, Feng Bao 0001
openaire   +1 more source

Home - About - Disclaimer - Privacy