Efficient anonymous channel and all/nothing election scheme
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems
Almost entirely correct mixing with applications to voting
Proceedings of the 9th ACM conference on Computer and communications security
An Efficient Scheme for Proving a Shuffle
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Optimistic Mixing for Exit-Polls
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking
Proceedings of the 11th USENIX Security Symposium
Rainbow: Architecture-Based Self-Adaptation with Reusable Infrastructure
ICAC '04 Proceedings of the First International Conference on Autonomic Computing
Architecture-Based Autonomous Repair Management: An Application to J2EE Clusters
SRDS '05 Proceedings of the 24th IEEE Symposium on Reliable Distributed Systems
Coercion-resistant electronic elections
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Journal of Systems and Software
Reengineering J2EE Servers for Automated Management in Distributed Environments
IEEE Distributed Systems Online
Civitas: Toward a Secure Voting System
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Helios: web-based open-audit voting
SS'08 Proceedings of the 17th conference on Security symposium
Hi-index | 0.00 |
This paper presents Mosaic a practical and secure e-voting system. Compared to existing remote e-voting systems, Mosaic is practical since it deals with availability, ease of usage and scalability in addition to the implementation of an efficient security scheme. We demonstrate that the adaptable architecture of Mosaic system enforces the system scalability and performability by evaluating the system on the French grid, grid 5K. An embedded management system allows for Mosaic self-adaptation in front of failures or security attacks without breaking the security properties of the system.