[PDF][PDF] A review of contemporary e-voting: Requirements, technology, systems and usability
E-voting technology has been developed for more than 30 years. However it is still distance
away from serious application. The major challenges are to provide a secure solution and to …
away from serious application. The major challenges are to provide a secure solution and to …
e-Voting intent: A comparison of young and elderly voters
The ability to vote online has the potential to increase voter turnout for elections due to
increased convenience over traditional voting polls. This study examines factors that can …
increased convenience over traditional voting polls. This study examines factors that can …
Understanding the security of arm debugging features
Processors nowadays are consistently equipped with debugging features to facilitate the
program analysis. Specifically, the ARM debugging architecture involves a series of …
program analysis. Specifically, the ARM debugging architecture involves a series of …
Investigating usability and user experience of individually verifiable internet voting schemes
Internet voting can afford more inclusive and inexpensive elections. The flip side is that the
integrity of the election can be compromised by adversarial attacks and malfunctioning …
integrity of the election can be compromised by adversarial attacks and malfunctioning …
Development of blockchain-based E-voting system: requirements, design and security perspective
Elections make a fundamental contribution to democratic governance and are very important
to select the appropriate person to determine the fate of a nation while a large number of …
to select the appropriate person to determine the fate of a nation while a large number of …
A systematic literature review on secure software development using feature driven development (fdd) agile model
Agile methodologies have gained recognition as efficient development processes through
their quick delivery of software, even under time constraints. However, like other agile …
their quick delivery of software, even under time constraints. However, like other agile …
Revisiting arm debugging features: Nailgun and its defense
Processors nowadays are consistently equipped with debugging features to facilitate
program analysis. Specifically, the ARM debugging architecture involves a series of …
program analysis. Specifically, the ARM debugging architecture involves a series of …
E-voting system using homomorphic encryption technique
The main objective of this project is to develop a safe Electronic voting System Software
using Fingerprint Authentication method. ie, e-voting system. Initially, fingerprints are …
using Fingerprint Authentication method. ie, e-voting system. Initially, fingerprints are …
[PDF][PDF] APreview on Microcontroller Based Electronic Voting Machine
Voting is most pivotal process of democratic society through which people determine it's
government. Governments around the world are increasingly considering the replacement of …
government. Governments around the world are increasingly considering the replacement of …
Summative usability assessments of STAR-Vote: a cryptographically secure e2e voting system that has been empirically proven to be easy to use
Background: From the project's inception, STAR-Vote was intended to be one of the first
usable, end-to-end (e2e) voting systems with sophisticated security. To realize STAR-Vote …
usable, end-to-end (e2e) voting systems with sophisticated security. To realize STAR-Vote …