Independent computations for safe remote electronic voting

A Yasinsac - Cambridge International Workshop on Security …, 2013 - Springer
In a world where a high percentage of citizens carry a smart phone or iPod and most
households have one or more computers, it is difficult to understand why we have not been …

Using mobile device communication to strengthen e-voting protocols

M Backes, M Gagné, M Skoruppa - … of the 12th ACM workshop on …, 2013 - dl.acm.org
Remote e-voting protocols strive to achieve sophisticated security properties. However, the
inherent complexity of this level of sophistication typically comes at a cost: Protocols must …

[PDF][PDF] Secure end-to-end communication in remote internet voting

M Schläpfer - 2016 - research-collection.ethz.ch
Electronic communication becomes more and more important in our everyday life. We use
various kinds of computer systems and services to write e-mails, to search the Internet for …

Bridging the gap between vulnerabilities and threats in electronic voting (transcript of discussion)

M Blaze - International Workshop on Security Protocols, 2008 - Springer
First of all, I apologise for having a talk on the theme (remodelling the attacker), which I
never do, but I'm making up for that by not actually having any answers, only some …

Why Is Online Voting Still Largely a Black Box?

M Kirsten, M Volkamer, B Beckert - European Symposium on Research in …, 2022 - Springer
Online elections and polls are increasingly gaining ground. Since the beginning of the
pandemic, many associations, companies and agencies opted for online elections at some …

True trustworthy elections: remote electronic voting using trusted computing

M Smart, E Ritter - International Conference on Autonomic and Trusted …, 2011 - Springer
We present a new remote, coercion-resistant electronic voting protocol which satisfies a
number of properties previously considered contradictory. We introduce trusted computing …

[PDF][PDF] A framework for secure electronic voting

S Popoveniuc, PL Vora - Proceedings of the 2008 IAVoSS Workshop …, 2008 - seas.gwu.edu
A framework for secure electronic voting Page 1 A framework for secure electronic voting
Stefan Popoveniuc and Poorvi L. Vora The George Washington University Department of …

Usability: low tech, high security

E Blanchard - 2019 - theses.hal.science
This dissertation deals with the field of usable security, particularly in the contexts of online
authentication and verifiable voting systems. The ever-expanding role of online accounts in …

Votor: conceptually simple remote voting against tiny tyrants

T Haines, X Boyen - Proceedings of the Australasian Computer Science …, 2016 - dl.acm.org
This paper seeks to address the need for fair elections in an adversarial online setting in ad
hoc elections. A major issue with existing online solutions is reliance on authorities, which in …

Self-enforcing electronic voting (transcript of discussion)

F Hao - International Workshop on Security Protocols, 2012 - Springer
Good morning everyone. In the past six months I have been doing some preliminary
investigation on what the future e-voting will look like. We have made some progress and I …