نتایج جستجو برای: security of voting

تعداد نتایج: 21183753  

2015
Véronique Cortier Fabienne Eigner Steve Kremer Matteo Maffei Cyrille Wiedling

E-voting protocols aim at achieving a wide range of sophisticated security properties and, consequently, commonly employ advanced cryptographic primitives. This makes their design as well as rigorous analysis quite challenging. As a matter of fact, existing automated analysis techniques, which are mostly based on automated theorem provers, are inadequate to deal with commonly used cryptographic...

Journal: :IACR Cryptology ePrint Archive 2008
Lucie Langer Axel Schmidt Johannes A. Buchmann

Current remote e-voting schemes aim at a number of security objectives. However, this is not enough for providing secure online elections in practice. Beyond a secure e-voting protocol, there are many organizational and technical security requirements that have to be satisfied by the operational environment in which the scheme is implemented. We have investigated four state-of-the-art e-voting ...

Journal: :JoWUA 2013
Raja Khurram Shahzad Niklas Lavesson

Malicious software (malware) represents a threat to the security and the privacy of computer users. Traditional signature-based and heuristic-based methods are inadequate for detecting some forms of malware. This paper presents a malware detection method based on supervised learning. The main contributions of the paper are two ensemble learning algorithms, two pre-processing techniques, and an ...

2009
Dimitrios Lekkas Dimitrios Zissis

In recent years we have witnessed the amalgamation of government services and electronic systems. Citizens and state interactions have changed focus towards human centered electronic approaches, introducing citizens with electronic services that have simplified bureaucratic mechanisms and reduced response time. All efforts of implementing electronic governance have led to the next step in this ...

2013
Feng Hao Dylan Clarke Carlton Shepherd F. Hao

In this paper, we propose and have implemented the first verifiable classroom voting system. The subject of secure classroom voting has so far received almost no attention from the security community. Though several commercial classroom voting systems have been available, none of them is verifiable. State-of-the-art verifiable voting protocols all rely on finding a set of trustworthy tallying a...

Journal: :J. Inf. Sci. Eng. 2014
Gheith A. Abandah Khalid A. Darabkh Tawfiq Ammari Omar Qunsul

Electronic voting provides accuracy and efficiency to the electoral processes. World democracies would benefit from a secure e-voting system not only to improve voter participation and trust but also to prevent electoral fraud. However, current e-voting systems are complex and have security weaknesses. In this paper, we describe a secure e-voting system for national and local elections (S-Vote)...

2013
Daniel Franke

The Swiss democracy, which is a direct democracy, carries out up to five referenda a year. This causes that 95 % of the Geneva voters use postal voting instead of going to the polling station. In 2001 the Cantons of Geneva, Neuchâtel and Zurich decided to start pilot projects in electronic voting (e-voting). Although the Canton of Geneva published more and more information about their system, a...

2010
Jordi Pujol Ahulló Roger Jardí-Cedó Jordi Castellà-Roca

Voting is an important part of the democratic process. The electorate makes a decision or expresses an opinion that is accepted for everyone. Some parts could be interested in the election results deviation without anyone else noticing it. However, ensuring that the whole voting process is performed correctly and according to current rules and law is, then, even more important. We present in th...

2016
Mohammed Awad Ernst L. Leiss

Due to concerns related to the security and privacy of conventional and electronic voting systems as well as the shortcomings of some verification methods, such as Voter Verified Paper Audit Trails (VVPATs), an alternative approach known as End-to-End (E2E) voter verifiable system was proposed. E2E systems rely on cryptography to provide voters and the public with both secrecy and accuracy, two...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید