نتایج جستجو برای: security of voting

تعداد نتایج: 21183753  

Journal: :IJEA 2009
Thomas Rössler

E-voting increasingly gains interest in e-Democracy and eGovernment movements. Not only the technical security issues of electronic voting systems are of paramount importance, but also the necessity of following an all-embracing approach is challenging and needs to be addressed. This paper discusses e-voting as being a supreme discipline of e-Government. It introduces an innovative e-voting con...

2004
Andreu Riera Gerard Cervelló

A major step forward along the path towards the implementation of secure Internet voting in Spain was taken in November 2003. For the first time in this country, a non-binding remote electronic voting pilot was run in parallel to a public election, in particular the 2003 election to the Parliament of Catalonia. The e-voting pilot was also the first of this kind to gain the requisite approval by...

2004
Donald P. Moynihan

The increased use of information technology promises to revolutionize both the provision of government services and the vibrancy of democracy. In the aftermath of the Florida voting controversy during the 2000 presidential election, governments have placed their faith in technology, adopting e-voting machines that offer enhanced voter convenience and eliminate the need for subjective recounts. ...

2016

E-voting increasingly gains interest in e-Democracy and e-Government movements. Not only the technical security issues of electronic voting systems are of paramount importance, but also the necessity of following an all-embracing approach is challenging and needs to be addressed. This paper discusses e-voting as being a supreme discipline of e-Government. It introduces an innovative e-voting co...

Journal: :IACR Cryptology ePrint Archive 2012
David Bernhard Olivier Pereira Bogdan Warinschi

We exhibit the precise security guarantees that a public key encryption scheme needs to satisfy to guarantee ballot privacy when used in a large class of voting systems. We also identify new security notions for public key encryption that characterize the number of times that a public key can be used in different elections, and show that the most common ballot preparation approach that consists...

2017

State-of-the-art e-voting systems rely on voters to perform certain actions to ensure that the election authorities are not manipulating the election result. This so-called “end-to-end (E2E) verifiability” is the hallmark of current e-voting protocols; nevertheless, thorough analysis of current systems is still far from being complete. In this work, we initiate the study of e-voting protocols a...

2017

State-of-the-art e-voting systems rely on voters to perform certain actions to ensure that the election authorities are not manipulating the election result. This so-called “end-to-end (E2E) verifiability” is the hallmark of current e-voting protocols; nevertheless, thorough analysis of current systems is still far from being complete. In this work, we initiate the study of e-voting protocols a...

2017

State-of-the-art e-voting systems rely on voters to perform certain actions to ensure that the election authorities are not manipulating the election result. This so-called “end-to-end (E2E) verifiability” is the hallmark of current e-voting protocols; nevertheless, thorough analysis of current systems is still far from being complete. In this work, we initiate the study of e-voting protocols a...

Journal: :Computer Standards & Interfaces 2007
Francisco Rodríguez-Henríquez Daniel Ortiz Arroyo Claudia García-Zamora

In this paper we present a fully functional RSA/DSA-based e-voting protocol for online elections that corrects and improves a scheme previously proposed by LinHwang-Chang [I. Lin, M. Hwang, C. Chang, Security enhancement for anonymous secure e-voting over a network, Comput. Stand. Interfaces 25 (2) (2003) 131–139.]. We found that Lin-Hwang-Chang's scheme and a recent modification of it by Hwang...

2017

State-of-the-art e-voting systems rely on voters to perform certain actions to ensure that the election authorities are not manipulating the election result. This so-called “end-to-end (E2E) verifiability” is the hallmark of current e-voting protocols; nevertheless, thorough analysis of current systems is still far from being complete. In this work, we initiate the study of e-voting protocols a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید