Abstract
"The right of suffrage is a fundamental Article in Republican Constitutions"[6]
- Charett, R.N., (1989). Software Engineering Risk Analysis and Management. McGraw-Hill. Google ScholarDigital Library
- Gillum, J. and Huseman, J., 2020. The Iowa Caucuses App Had Another Problem: It could have been hacked. Electionland. https://www.propublica.org/article/the-iowa-caucuses-app-had-another-problem-it-could-have-been-hacked.Google Scholar
- Goldmacher, S. and Corasaniti, N. 2020 'A systemwide disaster': How the Iowa Cacuses Melted Down. The New York Times. https://www.ny-times.com/2020/02/04/us/politics/what-happened-iowa-caucuses.html.Google Scholar
- Greenhalgh, S., Goodman, S., Rosenzwig, P., and Epstein, J., 2018. Email and Internet voting: The overlooked threat to elections security. https://www.acm.org/binaries/content/assets/public-policy/jtreportemailinternetvoting.pdf.Google Scholar
- Grove, J., 2004. ACM Statement on voting systems. CACM 47(10), 69--70. Google ScholarDigital Library
- Madison, J., (1781). Note to his speech on the right of suffrage. United States 1787 Convention, CCCXLII, 450.Google Scholar
Index Terms
- When voting, trust computer scientists: not computers?
Recommendations
A New Coercion-Resistant and Receipt-Free Electronic Voting System with Verifiability and Secrecy
ICEE '12: Proceedings of the 2012 3rd International Conference on E-Business and E-Government - Volume 02The coexistence of verifiability and voting receipts in an electronic voting system is a contradictory issue. Because the electronic vote is in a virtual form, voters rely on voting receipts to verify the integrity of the votes. However, the voting ...
A Receipt-Free Punch-Hole Ballot Electronic Voting Scheme
SITIS '07: Proceedings of the 2007 Third International IEEE Conference on Signal-Image Technologies and Internet-Based SystemThe punch-hole ballot electronic voting protocol is a special version of the e-voting paradigms based on homomorphic encryption. Assume that there are L candidates and a voter can select K distinct candidates, the punch-hole ballot is represented as a ...
Scalable Coercion-Resistant E-Voting under Weaker Trust Assumptions
SAC '23: Proceedings of the 38th ACM/SIGAPP Symposium on Applied ComputingElectronic voting (e-voting) is regularly used in many countries and organizations for legally binding elections. In order to conduct such elections securely, numerous e-voting systems have been proposed over the last few decades. Notably, some of these ...
Comments