نتایج جستجو برای: security of voting
تعداد نتایج: 21183753 فیلتر نتایج به سال:
In recent years, several electronic voting (e-voting) schemes for communication networks have been proposed. In 2006, Chang and Lee presented an anonymous electronic voting scheme which can be applied in real-world elections. However, this paper shows that Chang-Lee’s e-voting scheme suffers from susceptibility to security attacks and, as a result, some essential security requirements of their ...
With the rapid growth of the Internet, online voting appears to be a reasonable alternative to conventional elections and other opinion expressing processes. Current research focuses on designing and building “voting protocols” that can support the voting process, while implementing the security mechanisms required for preventing fraud and protecting voter's privacy. However, not much attention...
In this paper, we introduce a knowledge-oriented approach for the Security Requirements Engineering phase for developing E-Voting System. The knowledge acquired through the process of eliciting and analyzing secure E-Voting System is represented in the form of UML models; which can be made available to future developers and the dependency towards security experts can be reduced. In this paper w...
The literature abounds with discussions on the relative security merits of various voting systems, and on whether a move towards electronic voting is, from a security perspective, something to be encouraged or discouraged. Little has been said, however, on whether there would be unintended side-effects of changing the voting technology, in terms of the votes cast. Security issues aside, should ...
In the literature, voting protocols are considered secure if they satisfy requirements such as privacy, accuracy, robustness, etc. It can be time consuming to evaluate a voting protocol with respect to all these requirements and it is not clear that the list of known requirements is complete. Perhaps because of this many papers on electronic voting do not offer any security proof at all. As a s...
Social aspects of security of information systems are often discussed in terms of “actual security” and “perceived security”. This may lead to the hypothesis that e-voting is controversial because in paper voting, actual and perceived security coincide, whereas they do not in electronic systems. In this paper, we argue that the distinction between actual and perceived security is problematic fr...
based on a meta-theoretical analysis of voting, the present paper is an attempt to present a theoretical model encompassing all the possible aspects of voting in an election action system, proposing four sub-systems of voting as follows: economic voting, political voting, cultural voting and moral voting. having distinguished among these sub-systems, the writer describes the constitutive elemen...
In this paper, we point out the security weaknesses of Chen et al.’s e-voting scheme. We give a modification which satisfies the security requirements of a e-voting scheme.
This study explored the attitudes of a broad sample of politically interested Swedish voters towards Internet voting. A total of 5683 participants completed a web-based survey concerning participation and security aspects of Internet voting. Attitudes towards Internet voting were positive on the whole and the acceptance of participation in democratic elections using Internet voting was spearhea...
In July 2003, computer scientists from Johns Hopkins and Rice Universities released a security analysis of software purportedly from a direct recording electronic (DRE) touchscreen voting machine of a major voting-system vendor. The study drew public attention to a long-simmering controversy about whether current DREs are vulnerable to tampering that could influence the outcome of an election. ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید