On the notion of 'software independence'in voting systems

RL Rivest - … Transactions of the Royal Society A …, 2008‏ - royalsocietypublishing.org
This paper defines and explores the notion of 'software independence'in voting systems:'A
voting system is software independent if an (undetected) change or error in its software …

Coercion-resistant electronic elections

A Juels, D Catalano, M Jakobsson - … of the 2005 ACM Workshop on …, 2005‏ - dl.acm.org
We introduce a model for electronic election schemes that involves a more powerful
adversary than previous work. In particular, we allow the adversary to demand of coerced …

Spam detection on twitter using traditional classifiers

M Mccord, M Chuah - Autonomic and Trusted Computing: 8th International …, 2011‏ - Springer
Social networking sites have become very popular in recent years. Users use them to find
new friends, updates their existing friends with their latest thoughts and activities. Among …

Civitas: Toward a secure voting system

MR Clarkson, S Chong… - 2008 IEEE Symposium on …, 2008‏ - ieeexplore.ieee.org
Civitas is the first electronic voting system that is coercion-resistant, universally and voter
verifiable, and suitable for remote voting. This paper describes the design and …

Accountability: definition and relationship to verifiability

R Küsters, T Truderung, A Vogt - … of the 17th ACM conference on …, 2010‏ - dl.acm.org
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting,
auction, identity-based encryption, and certain forms of secure multi-party computation …

Selene: Voting with transparent verifiability and coercion-mitigation

PYA Ryan, PB Rønne, V Iovino - … and Data Security: FC 2016 International …, 2016‏ - Springer
End-to-end verifiable voting schemes typically involve voters handling an encrypted ballot in
order to confirm that their vote is accurately included in the tally. While this may be …

PrÊt À Voter: a Voter-Verifiable Voting System

PYA Ryan, D Bismark, J Heather… - IEEE transactions on …, 2009‏ - ieeexplore.ieee.org
¿¿¿¿¿¿ Pre¿ ta¿ Voter provides a practical approach to end-to-end verifiable elections with
a simple, familiar voter-experience. It assures a high degree of transparency while …

Remote electronic voting in uncontrolled environments: A classifying survey

MP Heinl, S Gölz, C Bösch - ACM Computing Surveys, 2022‏ - dl.acm.org
Remote electronic voting, often called online or Internet voting, has been subject to research
for the last four decades. It is regularly discussed in public debates, especially in the context …

[ספר][B] Real-world electronic voting: Design, analysis and deployment

F Hao, PYA Ryan - 2016‏ - books.google.com
Real-World Electronic Voting: Design, Analysis and Deployment captures all major
developments in electronic voting since 2003 in a real-world setting. It covers three broad …

DEEPSEC: deciding equivalence properties in security protocols theory and practice

V Cheval, S Kremer… - 2018 IEEE symposium on …, 2018‏ - ieeexplore.ieee.org
Automated verification has become an essential part in the security evaluation of
cryptographic protocols. Recently, there has been a considerable effort to lift the theory and …