Design of a secured e-voting system
H Hussien, H Aboelnaga - 2013 International Conference on …, 2013 - ieeexplore.ieee.org
E-voting systems are becoming popular with the widespread use of computers and
embedded systems. Security is the vital issue should be considered in such systems. This …
embedded systems. Security is the vital issue should be considered in such systems. This …
A survey of cryptographic and stegano-cryptographic models for secure electronic voting system
OM Olaniyi, AO Tayo… - Covenant …, 2013 - journals.covenantuniversity.edu.ng
The success rate of an electronic voting system in electronic decision making is dependent
on security, authenticity and integrity of pre-electoral, electoral and post electoral phases of …
on security, authenticity and integrity of pre-electoral, electoral and post electoral phases of …
A verifiable ranked choice internet voting system
This paper, proposes a web-based voting system, which allows voters to cast and submit
their electronic ballots by ranking all candidates according to their personal preference …
their electronic ballots by ranking all candidates according to their personal preference …
Ensuring trust and integrity: a revolutionary approach to electronic voting through Blockchain
HM Misni, B Jokonowoa, H Santoso - International Journal of Artificial …, 2024 - ijair.id
The voting method has recently been a subject of continuous discourse in numerous
countries. Nevertheless, the utilization of electronic voting systems raises apprehensions …
countries. Nevertheless, the utilization of electronic voting systems raises apprehensions …
Comparison of ID-based blind signatures from pairings for e-voting protocols
P Ribarski, L Antovski - 2014 37th International Convention on …, 2014 - ieeexplore.ieee.org
Elliptic curves are gaining momentum as scientists are continuously proving their security
and performance. Pairings over elliptic curves are relatively new in the world of …
and performance. Pairings over elliptic curves are relatively new in the world of …
Democratic governance: a review of secured digital electoral service infrastructure
LMP Selvam, V Ponnusamy, K Rafique - … recent technologies for …, 2020 - igi-global.com
In any democratic nation, electoral processes pave the way to democratic governance. In
regards to this, a fully digitized online voting system should be introduced, and governments …
regards to this, a fully digitized online voting system should be introduced, and governments …
Design and implementation of an electronic voting system for choosing the position of advisor student in a university
G Gallegos-Garcia, VKR Venegas… - 2011 IEEE …, 2011 - ieeexplore.ieee.org
Due to the importance of choosing a representative, electoral processes have been
necessaries, which have evolved with modern society, so the use of information …
necessaries, which have evolved with modern society, so the use of information …
Authentication mechanisms for E-Voting
E Abu-Shanab, R Khasawneh… - Public Affairs and …, 2015 - igi-global.com
The e-government paradigm became an essential path for governments to reach citizens
and businesses and to improve service and public performance. One of the important tools …
and businesses and to improve service and public performance. One of the important tools …
Collaborative generations of SM9 private key and digital signature using homomorphic encryption
Y Long, F **ong - 2020 5th International Conference on …, 2020 - ieeexplore.ieee.org
SM9 is a class of identity based cryptography (IBC) schemes released by the State
Cryptography Administration of China. With SM9, a user's private key is generated by a …
Cryptography Administration of China. With SM9, a user's private key is generated by a …
Secure voting system based on blockchain and threshold cryptography
G Wu, W Wang, K Yang - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Traditional electronic voting schemes based on blind signature often rely on fully trusted
signature authorities, tally authorities, and face security threats. In this paper, threshold …
signature authorities, tally authorities, and face security threats. In this paper, threshold …