Vulnerability analysis of three remote voting methods

نویسندگان

  • Chantal Enguehard
  • Rémi Lehn
چکیده

Resume This article analyses three methods of remote voting in an uncontrolled environment: postal voting, internet voting and hybrid voting. It breaks down the voting process into different stages and compares their vulnerabilities considering criteria that must be respected in any democratic vote: confidentiality, anonymity, transparency, vote unicity and authenticity. Whether for safety or reliability, each vulnerability is quantified by three parameters: size, visibility and difficulty to achieve. The study concludes that the automatisation of treatments combined with the dematerialisation of the objects used during an election tends to substitute visible vulnerabilities of a lesser magnitude by invisible and widespread vulnerabilities.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Tsunami Vulnerability Mapping Using Remote Sensing and GIS Techniques: A Case Study of Kollam District, Kerala, India

Tsunamis are caused by the displacement of a large volume of water, generally in an ocean or a sea. Earthquakes, volcanic eruptions and other underwater explosions, landslides, glacier calvings, meteorite impacts and other disturbances above or below water have the potential to generate a tsunami. The coastal areas of Kollam district, the present study area was seriously affected by the catastr...

متن کامل

Change Detection in Urban Area Using Decision Level Fusion of Change Maps Extracted from Optic and SAR Images

The last few decades witnessed high urban growth rates in many countries. Urban growth can be mapped and measured by using remote sensing data and techniques along with several statistical measures. The purpose of this research is to detect the urban change that is used for urban planning. Change detection using remote sensing images can be classified into three methods: algebra-based, transfor...

متن کامل

Inland wetlands mapping and vulnerability assessment using an integrated geographic information system and remote sensing techniques

The understanding of inland wetlands’ distribution and their level of vulnerability is important to enhance management and conservation efforts. The aim of the study was to map inland wetlands and assess their distribution pattern and vulnerability to natural and human disturbances such as climate change (temperature increase) and human activities by the year 2080. Inland wetland types i.e. for...

متن کامل

The likelihood of monotonicity paradoxes in run-off elections

A monotonicity paradox occurs when a voting system reacts in a perverse way to a change in individual opinions. The vulnerability of a voting system to monotonicity paradoxes is defined as the proportion of voting situations that can give rise to such paradoxes. In this paper we provide analytical representations of this vulnerability in the three-alternative case for two voting systems, i.e. p...

متن کامل

Apollo - End-to-End Verifiable Internet Voting with Recovery from Vote Manipulation

We present security vulnerabilities in the remote voting system Helios. We propose Apollo, a modified version of Helios, which addresses these vulnerabilities and could improve the feasibility of internet voting. In particular, we note that Apollo does not possess Helios’ major known vulnerability, where a dishonest voting terminal can change the vote after it obtains the voter’s credential. Wi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/0908.1059  شماره 

صفحات  -

تاریخ انتشار 2009