Practical distributed voter-verifiable secret ballot system
Proceedings of the 2009 ACM symposium on Applied Computing
Managing Requirements for E-Voting Systems: Issues and Approaches
RE-VOTE '09 Proceedings of the 2009 First International Workshop on Requirements Engineering for e-Voting Systems
A Risk Assessment Model for Voting Systems using Threat Trees and Monte Carlo Simulation
RE-VOTE '09 Proceedings of the 2009 First International Workshop on Requirements Engineering for e-Voting Systems
E-voting and forensics: prying open the black box
EVT/WOTE'09 Proceedings of the 2009 conference on Electronic voting technology/workshop on trustworthy elections
Insider threats to voting systems
Proceedings of the 2010 Workshop on Governance of Technology, Information and Policies
E-Voting Risk Assessment: A Threat Tree for Direct Recording Electronic Systems
International Journal of Information Security and Privacy
Hi-index | 0.00 |
The limitations of current paper- and electronic-based voting systems and recount procedures can undermine the credibility of public elections. A corroborative, redundant voting system that performs vote counts via independent mechanisms at the polling place could address these shortcomings.