Remote electronic voting in uncontrolled environments: A classifying survey

MP Heinl, S Gölz, C Bösch - ACM Computing Surveys, 2022 - dl.acm.org
Remote electronic voting, often called online or Internet voting, has been subject to research
for the last four decades. It is regularly discussed in public debates, especially in the context …

On the security properties of e-voting bulletin boards

A Kiayias, A Kuldmaa, H Lipmaa, J Siim… - … Conference on Security …, 2018 - Springer
In state-of-the-art e-voting systems, a bulletin board (BB) is a critical component for
preserving election integrity and availability. We introduce a framework for the formal …

D-DEMOS: A distributed, end-to-end verifiable, internet voting system

N Chondros, B Zhang, T Zacharias… - 2016 IEEE 36th …, 2016 - ieeexplore.ieee.org
E-voting systems have emerged as a powerful technology for improving democracy by
reducing election cost, increasing voter participation, and even allowing voters to directly …

Trust and security in the e-voting system

L Chiang - Electronic Government, an International Journal, 2009 - inderscienceonline.com
The purpose of this study is to explore the possible effects of trust and security on the e-
voting system in Taiwan. According to the technology acceptance model, a set of trust …

An electronic voting protocol with deniable authentication for mobile ad hoc networks

CT Li, MS Hwang, CY Liu - Computer Communications, 2008 - Elsevier
In this article, we propose a deniable electronic voting authentication protocol for mobile ad
hoc networks, which meets the essential requirements of a secure e-voting system. Due to …

EVIV: An end-to-end verifiable Internet voting system

R Joaquim, P Ferreira, C Ribeiro - computers & security, 2013 - Elsevier
Traditionally, a country's electoral system requires the voter to vote at a specific day and
place, which conflicts with the mobility usually seen in modern live styles. Thus, the …

The design of a secure anonymous internet voting system

YY Chen, JK Jan, CL Chen - Computers & Security, 2004 - Elsevier
In this paper, we propose a very practical and secure anonymous Internet voting protocol.
Our scheme does not require a special voting channel and communications can occur …

Access control management for ubiquitous computing

H Wang, Y Zhang, J Cao - Future Generation Computer Systems, 2008 - Elsevier
The purpose of ubiquitous computing is anywhere and anytime access to information within
computing infrastructures that is blended into a background and no longer be reminded …

Towards security modeling of e-voting systems

C De Faveri, A Moreira, J Araújo… - 2016 ieee 24th …, 2016 - ieeexplore.ieee.org
As voting systems evolve from paper ballots to electronic voting (E-voting) applications, we
have noticed significant efforts to develop real-world securer solutions. E-voting systems are …

LaT-Voting: Traceable anonymous E-voting on blockchain

P Li, J Lai - Network and System Security: 13th International …, 2019 - Springer
In order to achieve anonymous voting, various cryptographic techniques are usually
leveraged to avoid privacy leakage. However, traditional e-voting systems are excessively …