Communications of the ACM
Gauging the risks of internet elections
Communications of the ACM
A critical analysis of the council of Europe recommendations on e-voting
EVT'06 Proceedings of the USENIX/Accurate Electronic Voting Technology Workshop 2006 on Electronic Voting Technology Workshop
The New Front Line: Estonia under Cyberassault
IEEE Security and Privacy
Scantegrity: End-to-End Voter-Verifiable Optical- Scan Voting
IEEE Security and Privacy
Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines
HICSS '09 Proceedings of the 42nd Hawaii International Conference on System Sciences
Helios: web-based open-audit voting
SS'08 Proceedings of the 17th conference on Security symposium
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
The Digital Divide and Internet Voting Acceptance
ICDS '10 Proceedings of the 2010 Fourth International Conference on Digital Society
The development of remote e-voting around the world: a review of roads and directions
VOTE-ID'07 Proceedings of the 1st international conference on E-voting and identity
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
HICSS '11 Proceedings of the 2011 44th Hawaii International Conference on System Sciences
Measures to establish trust in internet voting
Proceedings of the 5th International Conference on Theory and Practice of Electronic Governance
The application of i-voting for estonian parliamentary elections of 2011
VoteID'11 Proceedings of the Third international conference on E-Voting and Identity
Hi-index | 0.00 |
More than a decade after the first enthusiastic attempts at deploying Internet voting, there is still only a single case of continued adoption for the election of a political body. In this paper we illustrate the motivations behind the apparent failure of a process that, at a first sight, looks desirable for many reasons. We analyze the most relevant efforts in the field, which can be grouped in two main lines: those grounded on a strong formal foundation, and those designed to achieve maximum participation. From the analysis, we derive a set of desirable features, classify the systems according to their ability to achieve them, and conclude that no system is currently able to strike a convincingly positive balance between them.