نتایج جستجو برای: security of voting

تعداد نتایج: 21183753  

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...

2009
Wolter Pieters

In information security research, perceived security usually has a negative meaning, when it is used in contrast to actual security. From a phenomenological perspective, however, perceived security is all we have. In this paper, we develop a phenomenological account of information security, where we distinguish between revealed and reveiled security instead. Linking these notions with the conce...

2005
Chris Karlof Naveen Sastry David A. Wagner

Cryptographic voting protocols offer the promise of verifiable voting without needing to trust the integrity of any software in the system. However, these cryptographic protocols are only one part of a larger system composed of voting machines, software implementations, and election procedures, and we must analyze their security by considering the system in its entirety. In this paper, we analy...

Journal: :International Journal of Computer Applications 2015

2007
Ahto Buldas Triinu Mägi

We adapt game theoretic methods for studying the security of two evoting systems: the Estonian E-Voting System (EstEVS) and Secure Electronic Registration and Voting Experiment (SERVE) performed in the United States of America. While these two systems are quite similar from technical side, security experts have made totally different decisions about their security—EstEVS was indeed used in prac...

2006
Yong-Sork Her Kenji Imamoto Kouichi Sakurai

Manuscript received January, 2006. * A preliminary version of this paper was published as follows: Her, Y.S, Imamoto, K. and Sakurai, K. (2005) `E-voting System with Ballot-Cancellation Based on Double-Encryption', Pre-proceeding of the international Workshop on Information Security Applications 2005, pp.525--532. 1-out-of-L Electronic Voting with Ballot-Cancellation Property Using Double Encry...

2011
Daniel Pasailă Stephanie Delaune Steve Kremer

Security protocols are used nowadays for securing transactions through public channels, like the Internet. Typical examples of applications include electronic commerce, electronic voting or mobile ad hoc networking. In order to obtain as much confidence as possible, several formal methods have been proposed for analyzing properties of security protocols. Depending on the goals which a security ...

2015
M. Àngels Cerveró Víctor Mateu Santi Martínez Josep M. Miret Francesc Sebé

Remote voting systems implementing the homomorphic tallying paradigm have proven to be the best option for elections with a small range of candidates. In this paper, we propose a new homomorphic tallying remote voting system that makes use of elliptic curve cryptography. The proposed system is suitable for multiple choice elections. Detailed security and performance analysis are provided.

1998
Andreu Riera Joan Borrell Josep Rif

The use of smartcards allows for interesting properties of security protocols and services. In this paper we present an example of application of smartcards within the eld of electronic voting schemes. To be concrete, the use of smartcards has helped us to develop the rst electronic voting protocol which simultaneously satisses three properties apparently contradictory: uncoercibility, veriiabi...

2007
Matt Bishop

Electronic voting systems are widely used in elections. This paper describes using an e-voting system as the basis for a project in an undergraduate computer security class. The goal of the project was to teach the students how to use the Flaw Hypothesis Methodology to perform a penetration study.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید