Remote electronic voting in uncontrolled environments: A classifying survey
Remote electronic voting, often called online or Internet voting, has been subject to research
for the last four decades. It is regularly discussed in public debates, especially in the context …
for the last four decades. It is regularly discussed in public debates, especially in the context …
On the security properties of e-voting bulletin boards
In state-of-the-art e-voting systems, a bulletin board (BB) is a critical component for
preserving election integrity and availability. We introduce a framework for the formal …
preserving election integrity and availability. We introduce a framework for the formal …
D-DEMOS: A distributed, end-to-end verifiable, internet voting system
E-voting systems have emerged as a powerful technology for improving democracy by
reducing election cost, increasing voter participation, and even allowing voters to directly …
reducing election cost, increasing voter participation, and even allowing voters to directly …
Trust and security in the e-voting system
L Chiang - Electronic Government, an International Journal, 2009 - inderscienceonline.com
The purpose of this study is to explore the possible effects of trust and security on the e-
voting system in Taiwan. According to the technology acceptance model, a set of trust …
voting system in Taiwan. According to the technology acceptance model, a set of trust …
An electronic voting protocol with deniable authentication for mobile ad hoc networks
In this article, we propose a deniable electronic voting authentication protocol for mobile ad
hoc networks, which meets the essential requirements of a secure e-voting system. Due to …
hoc networks, which meets the essential requirements of a secure e-voting system. Due to …
EVIV: An end-to-end verifiable Internet voting system
Traditionally, a country's electoral system requires the voter to vote at a specific day and
place, which conflicts with the mobility usually seen in modern live styles. Thus, the …
place, which conflicts with the mobility usually seen in modern live styles. Thus, the …
The design of a secure anonymous internet voting system
In this paper, we propose a very practical and secure anonymous Internet voting protocol.
Our scheme does not require a special voting channel and communications can occur …
Our scheme does not require a special voting channel and communications can occur …
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within
computing infrastructures that is blended into a background and no longer be reminded …
computing infrastructures that is blended into a background and no longer be reminded …
Towards security modeling of e-voting systems
As voting systems evolve from paper ballots to electronic voting (E-voting) applications, we
have noticed significant efforts to develop real-world securer solutions. E-voting systems are …
have noticed significant efforts to develop real-world securer solutions. E-voting systems are …
LaT-Voting: Traceable anonymous E-voting on blockchain
P Li, J Lai - Network and System Security: 13th International …, 2019 - Springer
In order to achieve anonymous voting, various cryptographic techniques are usually
leveraged to avoid privacy leakage. However, traditional e-voting systems are excessively …
leveraged to avoid privacy leakage. However, traditional e-voting systems are excessively …