نتایج جستجو برای: security of voting

تعداد نتایج: 21183753  

2013
Hongsheng Su

To aim at 3-vote-2 voting system which had already been widely applied in modern railway signal system, based on Markov model the paper analyzed its security and reliability indexes respectively under the three operating modes. During modeling some significant factors, such as common-cause failure, coverage rate of diagnostic systems, online maintainability, periodic inspection, and diverse fai...

2004
Sokratis K. Katsikas

This paper hopefully contributes to the discussion on what kind of electronic voting systems utilizing Internet technology we should be aiming at and what characteristics these systems should have. It provides an overview of the major constitutional and legal aspects of e-voting, together with their technical implications. It also discusses the security requirements and the system-wide properti...

2006
Rüdiger Grimm Robert Krimmer Nils Meißner Kai Reinhard Melanie Volkamer Marcel Weinand

This paper describes the development of security requirements for non-political Internet voting. The practical background is our experience with the Internet voting within the Gesellschaft für Informatik (GI – Informatics Society) 2004 and 2005. The theoretical background is the international state-of-the-art of requirements about electronic voting, especially in the US and in Europe. A focus o...

Journal: :JNW 2009
Bo Meng

Internet voting protocol is the base of the Internet voting systems. Firstly, an improved proof protocol that two ciphertexts are encryption of the same plaintext is introduced. Secondly, a receipt-free and coercion-resistant Internet voting protocol based on the non-interactive deniable authentication protocol and an improved proof protocol that two ciphertexts are encryption of the same plain...

Journal: :IACR Cryptology ePrint Archive 2016
Sunoo Park Ronald L. Rivest

We provide an overview of some of the security issues involved in securely implementing Lalley and Weyl’s “Quadratic Voting” [37], and suggest some possible implementation architectures. Our proposals blend “end-to-end verifiable” voting methods with anonymous payments. We also consider new refund rules for quadratic voting, such as a “lottery” method.

2005
Arthur M. Keller David Mertz Joseph Lorenzo Arnold Urken

The Open Voting Consortium has a developed a prototype voting system that includes an open source, PC-based voting machine that prints an accessible, voter-verified paper ballot along with an electronic audit trail. This system was designed for reliability, security, privacy, accessibility and auditability. This paper describes some of the privacy considerations for the system.

2015
Bratati Chakraborti

Today, biometric cloud security creates a new explosion in technology. With the advent of Cloud Computing biometric security and reliability plays important role in national and international e-governments. In e-voting system, if we incorporated cloud based computing through biometrics then it will create more authentication, transparency and security in voting system. To operate e-voting manag...

Journal: :Security and Communication Networks 2015
Mostafa Mohammadpourfard Mohammad-Ali Doostari M. B. Ghaznavi-Ghoushchi Nafiseh Shakiba

Recently, there has been a spate of interest in Internet voting systems because of advantages such as participation, efficiency, accuracy, and transparency. However, challenges for having a secure i-voting system are considerable. Unless these systems are designed and implemented carefully, citizens might lose their trust on the whole voting process. This paper introduces a novel online voting ...

2007
Naveen K. Sastry Pamela Samuelson

Verifying Security Properties in Electronic Voting Machines

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید