The impact of trust and relative advantage on internet voting diffusion

L Carter, R Campbell - Journal of theoretical and applied electronic …, 2011 - SciELO Chile
Internet voting is an emerging e-government phenomenon. In the United States, several
state and local governments have experimented with Internet voting. This study presents a …

Internet voting and political participation: An empirical comparison of technological and political factors

L Carter, F Bélanger - ACM SIGMIS Database: The DATABASE for …, 2012 - dl.acm.org
One emerging facet of e-government is Internet voting, or i-voting. I-voting refers to the
secure transmission of a ballot via the Internet. This phenomenon has the potential to …

An electronic voting protocol with deniable authentication for mobile ad hoc networks

CT Li, MS Hwang, CY Liu - Computer Communications, 2008 - Elsevier
In this article, we propose a deniable electronic voting authentication protocol for mobile ad
hoc networks, which meets the essential requirements of a secure e-voting system. Due to …

[PDF][PDF] Design and Implementation of Secure Remote e-Voting System Using Homomorphic Encryption.

I Jabbar, SN Alsaad - Int. J. Netw. Secur., 2017 - researchgate.net
Internet polling also known as “e-voting” became popular in past few years, since it reduces
the tallying cost and time, increases the number of voter participation, also reduces the …

Towards security modeling of e-voting systems

C De Faveri, A Moreira, J Araújo… - 2016 ieee 24th …, 2016 - ieeexplore.ieee.org
As voting systems evolve from paper ballots to electronic voting (E-voting) applications, we
have noticed significant efforts to develop real-world securer solutions. E-voting systems are …

Efficient and secure e‐voting scheme using elliptic curve cryptography

U Chatterjee, S Ray, S Adhikari, MK Khan… - Security and …, 2023 - Wiley Online Library
Voting allows the people to elect their representative and express their preferences. In
modern day democracy, voting is one fundamental and most important tool for election. To …

An electronic voting mechanism for fighting bribery and coercion

ZY Wu, JC Wu, SC Lin, C Wang - Journal of network and computer …, 2014 - Elsevier
This paper proposes an electronic voting scheme that can be implemented on the current
Internet without any secure channel. Under the long-term private key assumption, this …

Dynamic and verifiable multi‐secret sharing scheme based on Hermite interpolation and bilinear maps

MH Tadayon, H Khanmohammadi… - IET Information …, 2015 - Wiley Online Library
(t, n) threshold secret sharing is a cryptographic mechanism to divide and disseminate
information among n participants in a way that at least t (t≤ n) of them should be present for …

A flexible e-voting scheme for debate tools

DAL García - computers & security, 2016 - Elsevier
In order to protect votes, e-voting schemes provide privacy, verifiability and eligibility among
other features. Most e-voting systems focus on the vote itself, considering it a fixed and …

An anonymous voting mechanism based on the key exchange protocol

CC Chang, JS Lee - Computers & Security, 2006 - Elsevier
In democratic society, elections and voting are always the most important hallmarks.
However, there are plenty of problems in the traditional election such as inconvenience …