Voters' Perceptions of Voting Technology
Social Science Computer Review
TPM meets DRE: reducing the trust base for electronic voting using trusted platform modules
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
True trustworthy elections: remote electronic voting using trusted computing
ATC'11 Proceedings of the 8th international conference on Autonomic and trusted computing
Hi-index | 4.10 |
Many computer scientists have expressed their concern with the security of digital voting machines, especially their lack of a voter-verifiable audit trail. These risks pose real threats that we must resolve. To understand what system checks and balances are possible, we need to examine the entire voting process, not just the technology - even though, let's face it, the technology is woefully flawed at this point. An election has essentially three phases: registration, voting, and tallying. The risks of human manipulation of the system are highest in the first two phases, and the risks of digital manipulation are highest in the last two.