Receipt-free secret-ballot elections (extended abstract)
STOC '94 Proceedings of the twenty-sixth annual ACM symposium on Theory of computing
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Security considerations in e-cognocracy
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
E-ACTIVITIES'11 Proceedings of the 10th WSEAS international conference on E-Activities
Hi-index | 0.00 |
On-line voting and on-line election workflow can be done securely by employing basic security applications readily provided by well established cryptographic technologies. By analyzing data-flow between actors in the workflow secure processes can be implemented using Web, database and cryptographic techniques. The implementation must deliver a system that provides performance properties of authentication, democracy, anonymity, no coercion, accuracy, reliability, veracity, verifiability, neutrality, and linkability.