Authors
Riza Aditya, Colin Boyd, Ed Dawson, Kapali Viswanathan
Publication date
2003
Conference
Electronic Government: Second International Conference, EGOV 2003, Prague, Czech Republic, September 1-5, 2003. Proceedings 2
Pages
246-249
Publisher
Springer Berlin Heidelberg
Description
Electronic voting (e-voting) systems can greatly enhance the efficiency, and potentially, the transparency of national elections. However, the security of such systems is an area of on-going research. The literature for secure e-voting is predominantly concerned with 1-out-of-m voting strategies, where m is the number of candidates running for the elections. This paper presents a case study of cryptologic protocols for secure e-voting systems that use preferential voting strategies.
Total citations
200420052006200720082009201020112012201320142015201620172018201920202021202220232024441111111312121
Scholar articles
R Aditya, C Boyd, E Dawson, K Viswanathan - … Second International Conference, EGOV 2003, Prague …, 2003