نتایج جستجو برای: security of voting
تعداد نتایج: 21183753 فیلتر نتایج به سال:
Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...
In information security research, perceived security usually has a negative meaning, when it is used in contrast to actual security. From a phenomenological perspective, however, perceived security is all we have. In this paper, we develop a phenomenological account of information security, where we distinguish between revealed and reveiled security instead. Linking these notions with the conce...
Cryptographic voting protocols offer the promise of verifiable voting without needing to trust the integrity of any software in the system. However, these cryptographic protocols are only one part of a larger system composed of voting machines, software implementations, and election procedures, and we must analyze their security by considering the system in its entirety. In this paper, we analy...
We adapt game theoretic methods for studying the security of two evoting systems: the Estonian E-Voting System (EstEVS) and Secure Electronic Registration and Voting Experiment (SERVE) performed in the United States of America. While these two systems are quite similar from technical side, security experts have made totally different decisions about their security—EstEVS was indeed used in prac...
Manuscript received January, 2006. * A preliminary version of this paper was published as follows: Her, Y.S, Imamoto, K. and Sakurai, K. (2005) `E-voting System with Ballot-Cancellation Based on Double-Encryption', Pre-proceeding of the international Workshop on Information Security Applications 2005, pp.525--532. 1-out-of-L Electronic Voting with Ballot-Cancellation Property Using Double Encry...
Security protocols are used nowadays for securing transactions through public channels, like the Internet. Typical examples of applications include electronic commerce, electronic voting or mobile ad hoc networking. In order to obtain as much confidence as possible, several formal methods have been proposed for analyzing properties of security protocols. Depending on the goals which a security ...
Remote voting systems implementing the homomorphic tallying paradigm have proven to be the best option for elections with a small range of candidates. In this paper, we propose a new homomorphic tallying remote voting system that makes use of elliptic curve cryptography. The proposed system is suitable for multiple choice elections. Detailed security and performance analysis are provided.
The use of smartcards allows for interesting properties of security protocols and services. In this paper we present an example of application of smartcards within the eld of electronic voting schemes. To be concrete, the use of smartcards has helped us to develop the rst electronic voting protocol which simultaneously satisses three properties apparently contradictory: uncoercibility, veriiabi...
Electronic voting systems are widely used in elections. This paper describes using an e-voting system as the basis for a project in an undergraduate computer security class. The goal of the project was to teach the students how to use the Flaw Hypothesis Methodology to perform a penetration study.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید