نتایج جستجو برای: security of voting

تعداد نتایج: 21183753  

Journal: :Annales Universitatis Mariae Curie-Skłodowska, sectio K – Politologia 2016

2007
Stephen Wilson

Most electronic voting solutions have so far been complex and correspondingly difficult for regulators to validate. The full scale of the problem was revealed by independent testing in California and the subsequent high profile de-certification of several voting machines in that state in August 2007. We propose a robust new security model based on public key technology and smartcards. Highly ta...

2013
David Bernhard Bogdan Warinschi

These lecture notes survey some of the main ideas and techniques used in cryptographic voting systems. The write-up is geared towards readers with little knowledge of cryptography and it focuses on the broad principles that guide the design and analysis of cryptographic systems, especially the need for properly designed security models. We use a system proposed by Fujioka, Okamoto and Ohta as s...

Journal: :CoRR 2001
Aviel D. Rubin

This paper discusses the security considerations for remote electronic voting in public elections. In particular, we examine the feasibility of running national federal elections over the Internet. The focus of this paper is on the limitations of the current deployed infrastructure in terms of the security of the hosts and the Internet itself. We conclude that at present, our infrastructure is ...

2007
Michael E. Clarkson Stephen Chong Andrew C. Myers

Civitas is the first implementation of a coercion-resistant, universally verifiable, remote voting scheme. This paper describes the design of Civitas, details the cryptographic protocols used in its construction, and illustrates how language-enforced information-flow security policies yield assurance in the implementation. The performance of Civitas scales well in the number of voters and offer...

2008
Lucie Langer Axel Schmidt Johannes Buchmann

Our paper deals with the question how remote e-voting can be put into practice in a secure and at the same time feasible way. We show that outsourcing the technical implementation of electronic elections to a Voting Service Provider (VSP) is one solution to this problem. Our concept can help election hosts to easily conduct electronic elections without having to take care of the necessary secur...

Journal: :journal of communication engineering 0
mohammad ehdaie parsa sharif research center nikolaos alexiou kth panos papadimitratos kth

sybil attacks pose a serious threat for wireless sensor networks (wsn) security. they can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. in a sybil attack,the attacker masquerades as multiple sensor identities, that are actually controlled by one or a few existing attacker nodes. sybil identities are fabricated out of stolen keys, obt...

Journal: :IACR Cryptology ePrint Archive 2011
David Bernhard Véronique Cortier Olivier Pereira Ben Smyth Bogdan Warinschi

Recent results show that the current implementation of Helios, a practical e-voting protocol, does not ensure independence of the cast votes, and demonstrate the impact of this lack of independence on vote privacy. Some simple fixes seem to be available and security of the revised scheme has been studied with respect to symbolic models. In this paper we study the security of Helios using comput...

Journal: :Network Protocols & Algorithms 2014
José L. Tornos José Luis Salazar Joan Josep Piles Jose Saldana Luis Casadesus José Ruíz Julián Fernández-Navajas

The increase of Internet penetration in the last years is boosting the popularity of eVoting systems. However, in order to have a security level similar to that of an in-person voting, a series of security requisites have to be accomplished. This article describes a secure eVoting protocol based on ring signatures. The implementation details and the different modules of a voting platform includ...

2016
Jonathan Ganz Matt Bishop Sean Peisert

Electronic voting machines are becoming an increasingly popular alternative to paper ballots. With this increase in use we must analyze how well these machines adhere to voting requirements, including those relating to security, privacy, and anonymity. This paper includes analysis of the security and auditing mechanisms of the open-source electronic voting system Scantegrity. We focus on Scante...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید