نتایج جستجو برای: security of voting

تعداد نتایج: 21183753  

2016
Frank Reichert

This study presents evidence for the mediation effect of political knowledge through political self-efficacy (i.e. internal political efficacy) in the prediction of political participation. It employs an action theoretic approach-by and large grounded on the Theory of Planned Behaviour-and uses data from the German Longitudinal Election Study to examine whether political knowledge has distinct ...

2014
Riivo Talviste

This report analyzes two independent works published in 2014 that model security threats of Estonian i-voting scheme using attack trees. The first one, the master’s thesis of Tanel Torn [11] constructs several realistic attack trees for various types of attacks on Estonian i-voting system and evaluates them using three different state-of-the-art methodologies proposed in attack-tree literature....

2013
Magdi Amer Hazem El-Gendy

Election falsification is one of the biggest problems facing third world countries as well as developed countries with respect to cost and time. In this paper, the guidelines for building a legally binding fraud-proof Electronic-Voting are presented. Also, the limitations are discussed. Keywords—e-voting, security

Journal: :IACR Cryptology ePrint Archive 2008
Miroslaw Kutylowski Filip Zagórski

We present Scratch, Click & Vote remote voting scheme. The scheme is end-to-end verifiable and allows for voting over the Internet. It guarantees security against malicious hardware and software used by a voter; a voter’s computer does not get any knowledge about the voter’s choice. Moreover, it can blindly change the voter’s ballot with a small probability only.

2015
Y. C. Yeh

The popularity of Internet has altered the traditional way of life and behavioral patterns. Indeed, while the Internet has brought great convenience, it has also highlighted numerous issues for network security. Many countries are committed to the development of e-voting, which would help societies reduce the amount of resources allocated for traditional elections. However, most literatures exp...

Journal: :IACR Cryptology ePrint Archive 2016
Arnis Parsovs

In this paper we study the feasibility of using homomorphic tallying in the Estonian Internet voting system. The paper analyzes the security benefits provided by homomorphic tallying, the costs introduced and the required changes to the voting system. We find that homomorphic tallying has several security benefits, such as improved ballot secrecy, public verifiability of the vote tallying serve...

2011
Bo Meng Wei Wang

Resistance of denial of service attacks is a key security requirement in voting protocols. Acquisti protocol plays an important role in development of internet voting protocols and claims its security without strong physical assumptions. In this study firstly Acquisti protocol is modeled in extended applied pi calculus, and then resistance of denial of service attacks is proved with ProVerif. T...

2011
David G. Robinson J. Alex Halderman

Research about weaknesses in deployed electronic voting systems raises a variety of pressing ethical concerns. In addition to ethical issues common to vulnerability research, such as the potential harms and beneifts of vulnerability disclosure, electronic voting researchers face questions that flow from the unique and important role voting plays in modern democratic societies. Should researcher...

2010
Niels Menke Kai Reinhard

In 2008, the German Federal Office for Information Security issued the common criteria protection profile for Online Voting Products (PP-0037). Accordingly, we evaluated the Polyas electronic voting system, which is used for legally binding elections in several international organizations (German Gesellschaft for Informatik, GI, among others), for compliance with the common criteria protection ...

Journal: :CoRR 2010
Niels Menke Kai Reinhard

In 2008, the German Federal Office for Information Security issued the common criteria protection profile for Online Voting Products (PP-0037). Accordingly, we evaluated the Polyas electronic voting system, which is used for legally binding elections in several international organizations (German Gesellschaft for Informatik, GI, among others), for compliance with the common criteria protection ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید