Academic literature on the topic 'E-voting protocols'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'E-voting protocols.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "E-voting protocols"
Müller-Török, Robert, Domenica Bagnato, and Alexander Prosser. "Council of Europe Recommendation CM/Rec(2017)5 and e-Voting Protocol Design." Masaryk University Journal of Law and Technology 14, no. 2 (September 23, 2020): 275–302. http://dx.doi.org/10.5817/mujlt2020-2-6.
Full textGeorge, Vinodu, and M. P. Sebastian. "A Secure and Efficient Scheme for Remote Poll Station Voting." International Journal of Electronic Government Research 9, no. 4 (October 2013): 75–91. http://dx.doi.org/10.4018/ijegr.2013100105.
Full textAbdulRahim, Abdulwasiu Kailani, Olusegun Folorunso, and Sushil Sharma. "An Improved Dynavote E-Voting Protocol Implementation." International Journal of E-Adoption 3, no. 3 (July 2011): 44–61. http://dx.doi.org/10.4018/ijea.2011070104.
Full textMateu, Víctor, Francesc Sebé, and Magda Valls. "Constructing credential-based E-voting systems from offline E-coin protocols." Journal of Network and Computer Applications 42 (June 2014): 39–44. http://dx.doi.org/10.1016/j.jnca.2014.03.009.
Full textArapinis, Myrto, Nikolaos Lamprou, Elham Kashefi, and Anna Pappa. "Definitions and Security of Quantum Electronic Voting." ACM Transactions on Quantum Computing 2, no. 1 (April 2021): 1–33. http://dx.doi.org/10.1145/3450144.
Full textBerrima, Mouhebeddine, Narjes Ben Rajeb, and Véronique Cortier. "Deciding knowledge in security protocols under some e-voting theories." RAIRO - Theoretical Informatics and Applications 45, no. 3 (July 2011): 269–99. http://dx.doi.org/10.1051/ita/2011119.
Full textChica, Ricardo. "Weaknesses in Centralized and Decentralized Internet Voting Protocols." INNOVA Research Journal 3, no. 1 (February 2, 2018): 55–70. http://dx.doi.org/10.33890/innova.v3.n1.2018.338.
Full textPotdukhe, Hitesh. "Exploratory Review: Decentralized Voting System Using Blockchain." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (November 30, 2021): 1082–86. http://dx.doi.org/10.22214/ijraset.2021.38948.
Full textMousavi, Hamed, Babak Ahmadi, and Saeed Rahimi. "A new approach to decrease the computational complexity of e-voting protocols." Transactions on Emerging Telecommunications Technologies 28, no. 7 (December 23, 2016): e3140. http://dx.doi.org/10.1002/ett.3140.
Full textAgustina, Esti Rahmawati, Magdalena Christine, and Irma Fitriani. "Analisis Protokol CryptO-0N2 dengan Menggunakan Scyther Tool." Jurnal Teknologi Informasi dan Ilmu Komputer 6, no. 1 (January 16, 2019): 107. http://dx.doi.org/10.25126/jtiik.2019611303.
Full textDissertations / Theses on the topic "E-voting protocols"
Arslan, Bekir. "Cryptographic protocols revocable anonymity and e-voting /." [Gainesville, Fla.] : University of Florida, 2009. http://purl.fcla.edu/fcla/etd/UFE0041188.
Full textWiedling, Cyrille. "Formal verification of advanced families of security protocols : E-voting and APIs." Thesis, Université de Lorraine, 2014. http://www.theses.fr/2014LORR0199/document.
Full textFormal methods have been used to analyze security protocols and several tools have even been developed to tackle automatically different proof techniques and ease the verification of such protocols. However, for electronic voting and APIs, current tools tend to reach their limits because they can’t handle some cryptographic primitives, or the security properties, involved in those protocols. We work on two cases studies of existing and deployed systems: a Norwegian e-voting protocol and a CNRS boardroom voting protocol. We analyze them using the applied pi-calculus model and we discuss in details about their security properties, in different corruption scenarios. Even including several reusable results, these proofs are complex and, therefore, expose a real need for automation. Thus, we focus on a possible lead in direction of this needed automation: type-systems. We build upon a recent work describing a new type-system designed to deal with equivalence properties, in order to apply this on the verification of equivalence-based properties in electronic voting like ballot-secrecy. We present an application of this method through Helios, a well-known e-voting system. Another family of advanced security protocols are APIs: secure interfaces devoted to allow access to some information stored into a secured trusted hardware without leaking it outside. Recet work seems to show that these interfaces are also vulnerable. In this thesis, we provide a new design for APIs, including revocation. In addition, we include a formal analysis of this API showing that a malicious combination of API’s commands does not leak any key, even when the adversary may brute-force some of them
Müller, Johannes [Verfasser], and Ralf [Akademischer Betreuer] Küsters. "Design and cryptographic security analysis of e-voting protocols / Johannes Müller ; Betreuer: Ralf Küsters." Stuttgart : Universitätsbibliothek der Universität Stuttgart, 2019. http://d-nb.info/1193086477/34.
Full textScapin, Enrico [Verfasser], and Ralf [Akademischer Betreuer] Küsters. "Implementation-level analysis of cryptographic protocols and their applications to e-voting systems / Enrico Scapin ; Betreuer: Ralf Küsters." Stuttgart : Universitätsbibliothek der Universität Stuttgart, 2018. http://d-nb.info/1162134607/34.
Full textХома, Любава Віталіївна. "Дослiдження криптографiчних протоколiв електронного голосування." Bachelor's thesis, КПІ ім. Ігоря Сікорського, 2021. https://ela.kpi.ua/handle/123456789/44250.
Full textThis work consists of 45 pages, includes 4 illustrations, 9 tables and 10 literature references. The aim of this qualification work is to review existing e-voting systems, to compare their capabilities and criteria, which meet in full, in part. Select the electronic voting system for which the modification will be proposed. The object of the work is electronic voting systems and cryptographic protocols of e-voting. The subject of the work is mathematical models and algorithms of evoting protocols. A review of various electronic voting systems has been performed. Based on the results of a comparative analysis of existing electronic voting schemes, modification that simplifies the system of electronic elections in terms of speed and amount of memory required. For the possibility of using low-power equipment.
Reis, Maria de Fátima Rodrigues. "Verificação de protocolos de e-voting." Master's thesis, FCT - UNL, 2009. http://hdl.handle.net/10362/2509.
Full textOs sistemas de votação electrónica, designados também por e-voting, são sistemas informáticos que permitem aos eleitores não só registarem-se para poder exercer o seu direito de voto, como também expressarem-no de forma electrónica e com o consequente apuramento por parte das autoridades competentes do resultado das eleições. Dada a sua relevância a todos os níveis da sociedade é crucial que todos os elementos envolvidos num sistema de votação electrónica tenham confiança no sistema utilizado. No final devem ter a certeza que o sistema proporcionou um bom escrutínio e que reflecte exactamente o que era esperado dele. Para tal, é necessário que se adoptem as medidas que permitem assegurar a segurança a diversos níveis, nomeadamente: privacidade, democracia, possibilidade de verificação e precisão, entre outras. Através da verificação formal de protocolos e utilizando ferramentas de verificação de modelos, pode-se caminhar para atingir a confiança necessária neste tipo de sistemas. Estas ferramentas permitem a modelação e validação de propriedades de um protocolo, avaliando a sua correcção e identificando problemas na sua especificação. Pretende-se contribuir para que o sistema de votação electrónica passe a ser uma realidade e assim facilitando o papel de todos os intervenientes nos processos eleitorais. Os sistemas de votação electrónica, poderão ajudar no combate à abstenção, proporcionar melhor acesso a deficientes motores e melhorar privacidade para invisuais. Neste trabalho foi analisado o protocolo REVS (Robust Electronic Voting System) vocacionado para operar em sistemas distribuídos como a Internet. Utilizaram-se duas ferramentas de verificação de modelos na verificação de propriedades relevantes. Como resultado, identificaram-se problemas já conhecidos nos protocolos de votação electrónica e levantaram-se outros tipos de questões em relação à sua implementação que podem ser alvo de futuros estudos
Hirt, Martin. "Multi-party computation : efficient protocols, general adversaries, and voting /." Zürich, 2001. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=14376.
Full textΓαλάνης, Βασίλειος. "e-αξιολόγηση : εφαρμογές της κρυπτογραφίας στην αξιολόγηση μέσω τεχνολογιών πληροφορικής και επικοινωνιών." Thesis, 2009. http://nemertes.lis.upatras.gr/jspui/handle/10889/2921.
Full textThe goal of this work is to research the application of cryptography in the security of the process of evaluation in on-line environments, creating a framework of protocols which is collectively called e-evaluation. More specifically, we begin by providing a description of an e-evaluation system in both the hardware and the software level and introducing suitable cryptographic techniques so as to satisfy the security requirements of the e-evaluation process, giving examples of applications where there is use of electronic evaluation procedures. In the first part of this work we research the way the concept of security is integrated within the process of evaluation, the reasons for which there is need for integrating security techniques in that process and the benefits we gain by them. Then we provide a short description of techniques being use in the electronic evaluation process as well as where and how cryptography is applied in them. In the second part, we provide a description of the cryptographic techniques and protocols that have applications in the e-evaluation framework and their mathematical background. In the third and final part, we make a presentation of the applications of e-evaluation in education.
Lin, Yih, and 林毅. "The Design of Protocol for e-Voting on the Internet." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/58970282098567229894.
Full text國立中興大學
應用數學系
89
This paper proposes a practical anonymous secure electronic voting protocol in which the communications are based on the Internet. This protocol employs the blind signature technique to ensure only eligible registered voters can participate in the election activity, and each eligible registered voter can securely vote at most once. At the same time, protecting the privacy of the voters. This protocol, with secret sharing methods, prevents any facility from falsifying the result of voting, while achieving the fairness of voting. Our e-voting system is easy to be implemented, since the integration of the user interface with a web browser and the e-mail software would make it easier. We believe that our system will be an efficient, fairly, and practical voting system.
Book chapters on the topic "E-voting protocols"
Kulyk, Oksana, and Melanie Volkamer. "Efficiency Comparison of Various Approaches in E-Voting Protocols." In Financial Cryptography and Data Security, 209–23. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-53357-4_14.
Full textKar, Nirmalya, Sharmistha Roy, Ashim Saha, Kunal Chakma, and Anupam Jamatia. "A Biometric Based Design Pattern for Implementation of a Security Conscious E-Voting System Using Cryptographic Protocols." In Mobile Communication and Power Engineering, 78–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35864-7_11.
Full textChafe, Shreya Shailendra, Divya Ashok Bangad, and Harsha Sonune. "Blockchain-Based E-Voting Protocol." In Advances in Intelligent Systems and Computing, 245–55. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8289-9_23.
Full textTho, Hoang Duc, and Nguyen Thi Hong Ha. "A Protocol for Securing E-Voting System." In Lecture Notes in Electrical Engineering, 38–48. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-69814-4_4.
Full textJiang, Shaoquan, Dengguo Feng, and Sihan Qing. "Analysis and Design of E-voting Protocol." In Information Security for Global Information Infrastructures, 281–90. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-0-387-35515-3_29.
Full textCortier, Véronique, and Cyrille Wiedling. "A Formal Analysis of the Norwegian E-voting Protocol." In Lecture Notes in Computer Science, 109–28. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28641-4_7.
Full textNovotný, Marián. "Design and Analysis of a Practical E-Voting Protocol." In The Future of Identity in the Information Society, 170–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03315-5_13.
Full textChaieb, Marwa, Mirko Koscina, Souheib Yousfi, Pascal Lafourcade, and Riadh Robbana. "DABSTERS: A Privacy Preserving e-Voting Protocol for Permissioned Blockchain." In Theoretical Aspects of Computing – ICTAC 2019, 292–312. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-32505-3_17.
Full textChaieb, Marwa, and Souheib Yousfi. "LOKI Vote: A Blockchain-Based Coercion Resistant E-Voting Protocol." In Information Systems, 151–68. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-63396-7_11.
Full textJamroga, Wojciech, Michal Knapik, and Damian Kurpiewski. "Model Checking the SELENE E-Voting Protocol in Multi-agent Logics." In Electronic Voting, 100–116. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00419-4_7.
Full textConference papers on the topic "E-voting protocols"
Cortier, Veronique, David Galindo, Ralf Kusters, Johannes Muller, and Tomasz Truderung. "SoK: Verifiability Notions for E-Voting Protocols." In 2016 IEEE Symposium on Security and Privacy (SP). IEEE, 2016. http://dx.doi.org/10.1109/sp.2016.52.
Full textHaghighat, Alireza Toroghi, Mohammad Ali Kargar, Mohammad Sadeq Dousti, and Rasool Jalili. "Minimal assumptions to achieve privacy in e-voting protocols." In 2013 10th International ISC Conference on Information Security and Cryptology (ISCISC). IEEE, 2013. http://dx.doi.org/10.1109/iscisc.2013.6767345.
Full textCetinkaya, Orhan, and Ali Doganaksoy. "Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols." In Second International Conference on Availability, Reliability and Security (ARES'07). IEEE, 2007. http://dx.doi.org/10.1109/ares.2007.119.
Full textBackes, Michael, Martin Gagné, and Malte Skoruppa. "Using mobile device communication to strengthen e-Voting protocols." In CCS'13: 2013 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2013. http://dx.doi.org/10.1145/2517840.2517863.
Full textLanger, Lucie, Axel Schmidt, Johannes Buchmann, Melanie Volkamer, and Alexander Stolfik. "Towards a Framework on the Security Requirements for Electronic Voting Protocols." In 2009 First International Workshop on Requirements Engineering for e-Voting Systems (RE-VOTE). IEEE, 2009. http://dx.doi.org/10.1109/re-vote.2009.9.
Full textRibarski, Pance, and Ljupcho Antovski. "Comparison of ID-based blind signatures from pairings for e-voting protocols." In 2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). IEEE, 2014. http://dx.doi.org/10.1109/mipro.2014.6859785.
Full textHirschi, Lucca, and Cas Cremers. "Improving Automated Symbolic Analysis of Ballot Secrecy for E-Voting Protocols: A Method Based on Sufficient Conditions." In 2019 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE, 2019. http://dx.doi.org/10.1109/eurosp.2019.00052.
Full textBabenko, Liudmila, and Ilya Pisarev. "Modeling replay and integrity violations attacks for cryptographic protocols source codes verification of e-voting system based on blind intermediaries." In SIN 2020: 13th International Conference on Security of Information and Networks. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3433174.3433597.
Full textSheer Hardwick, Freya, Apostolos Gioulis, Raja Naeem Akram, and Konstantinos Markantonakis. "E-Voting With Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy." In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE, 2018. http://dx.doi.org/10.1109/cybermatics_2018.2018.00262.
Full textZhou, You, Yian Zhou, Shigang Chen, and Samuel S. Wu. "MVP: An Efficient Anonymous E-Voting Protocol." In GLOBECOM 2016 - 2016 IEEE Global Communications Conference. IEEE, 2016. http://dx.doi.org/10.1109/glocom.2016.7842019.
Full text