Assurable, transparent, and mutual restraining e-voting involving multiple conflicting parties

X Zou, H Li, Y Sui, W Peng, F Li - IEEE INFOCOM 2014-IEEE …, 2014 - ieeexplore.ieee.org
E-voting techniques and systems have not been widely accepted and deployed by society
due to various concerns and problems. One particular issue associated with many existing e …

Distributed Internet voting architecture: A thin client approach to Internet voting

JE Helm - Journal of Information Technology, 2021 - journals.sagepub.com
Principles required for secure electronic voting using the Internet are known and published.
Although the Internet voting functionalities and technologies are well-defined, none of the …

[HTML][HTML] Transparent, auditable, and stepwise verifiable online e-voting enabling an open and fair election

X Zou, H Li, F Li, W Peng, Y Sui - Cryptography, 2017 - mdpi.com
Many e-voting techniques have been proposed but not widely used in reality. One of the
problems associated with most existing e-voting techniques is the lack of transparency …

[PDF][PDF] An analysis of electronic voting machine for its effectiveness

V Shrivastava, G Tere - International Journal of Computing …, 2016 - academia.edu
The procedure of Election with straightforwardness and security is basic in any nation to
guarantee the privilege of voting in favor of the residents. As misleading is an unavoidable …

Sealed‐bid auction: a cryptographic solution to bid‐rigging attack in the collusive environment

J Howlader, AK Mal - Security and Communication Networks, 2015 - Wiley Online Library
Sealed‐Bid auction is an efficient and rational way to establish the price and trading goods
in the open market. However sealed‐bid auctions are subject to bid‐rigging attack. Receipt …

Practical receipt-free sealed-bid auction in the coercive environment

J Howlader, SK Roy, AK Mal - … Security and Cryptology--ICISC 2013: 16th …, 2014 - Springer
Sealed-Bid auction is an efficient and rational method to establish the price in open market.
However sealed-bid auctions are subject to bid-rigging attack. Receipt-free mechanisms …

System architecture for secure mobile internet voting

S Thakur - 2015 - openscholar.dut.ac.za
This thesis focuses on the development of an enhanced innovative secure mobile Internet
voting system architecture that offers desirable security requirements to theoretically mitigate …

Some Notes on Deniability, Obfuscation, and Multiparty Computation

S Sarkar, J Howlader - International Conference on Network Security and …, 2024 - Springer
Modern privacy-preserving mechanisms typically address different methods of concealing
private data during communication through a public network or storing it in a physical …

A Study on Extending the Mechanism for Preventing Fraud in Polling Stations to Electronic Voting Schemes

Y Ueshige, K Sakurai - Proceedings of the 2024 5th International Artificial …, 2024 - dl.acm.org
E-voting has been studied from both theoretical and implementation perspectives.
Theoretical studies include e-voting, a method based on security technologies such as quasi …

Efficient Secure E-Voting and its Application in Cybersecurity Education

N Swearingen - 2022 - scholarworks.indianapolis.iu.edu
As the need for large elections increases and computer networking becomes more widely
used, e-voting has become a major topic of interest in the field of cryptography. However …