Accuracy, integrity and security in computerized vote-tallying
Communications of the ACM
Communications of the ACM
An analysis of the hart intercivic DAU eSlate
EVT'07 Proceedings of the USENIX Workshop on Accurate Electronic Voting Technology
Are your votes really counted?: testing the security of real-world electronic voting systems
ISSTA '08 Proceedings of the 2008 international symposium on Software testing and analysis
Towards a Framework on the Security Requirements for Electronic Voting Protocols
RE-VOTE '09 Proceedings of the 2009 First International Workshop on Requirements Engineering for e-Voting Systems
E-voting and forensics: prying open the black box
EVT/WOTE'09 Proceedings of the 2009 conference on Electronic voting technology/workshop on trustworthy elections
Modeling and analyzing faults to improve election process robustness
EVT/WOTE'10 Proceedings of the 2010 international conference on Electronic voting technology/workshop on trustworthy elections
Hi-index | 0.00 |
Without a threat model and a system model, voting standards cannot ensure the integrity or accuracy of the voting process.