The technical feasibility and security of e-voting

An Electronic voting (E-voting) system is a voting system in which the election data is recorded, stored and processed primarily as digital information. E-voting may become the quickest, cheapest, and the most efficient way to administer election and count vote since it only consists of simple process or procedure and require a few worker within the process.

[1]  A. El-Sisi Fast Cryptographic Privacy Preserving Association Rules Mining on Distributed Homogenous Database , 2008, Int. Arab J. Inf. Technol..

[2]  Ronald Leenes,et al.  Adopting E-voting in Europe: context matters , 2002 .

[3]  Nik Thompson Analysis of an Electronic Voting System , 2014 .

[4]  Aviel D. Rubin,et al.  Security Considerations for Remote Electronic Voting over the Internet , 2001, ArXiv.

[5]  D. Jefferson,et al.  Security analysis of SERVE 1 A Security Analysis of the Secure Electronic Registration and Voting Experiment ( SERVE ) , 2004 .

[6]  Howard Falk Computer intrusions and attacks , 1999, Electron. Libr..

[7]  Rudolf Schmid,et al.  Organization for the advancement of structured information standards , 2002 .

[8]  C. D. Mote,et al.  Report of the national workshop on internet voting: issues and research agenda , 2000, DG.O.

[9]  Dan S. Wallach,et al.  Analysis of an electronic voting system , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[10]  Steven Furnell,et al.  Internet-based security incidents and the potential for false alarms , 2000, Internet Res..

[11]  Indrajit Ray,et al.  An anonymous electronic voting protocol for voting over the Internet , 2001, Proceedings Third International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems. WECWIS 2001.

[12]  Ahto Buldas,et al.  Practical Security Analysis of E-Voting Systems , 2007, IWSEC.

[13]  Ken Thompson,et al.  Reflections on trusting trust , 1984, CACM.

[14]  David A. Wagner,et al.  Analyzing internet voting security , 2004, CACM.

[15]  Hung-Min Sun,et al.  An efficient remote use authentication scheme using smart cards , 2000, IEEE Trans. Consumer Electron..

[16]  Herman T. Tavani,et al.  Defining the boundaries of computer crime: piracy, break-ins, and sabotage in cyberspace , 2000, CSOC.

[17]  Lorrie Faith Cranor,et al.  Design and Implementation of a Practical Security-Conscious Electronic Polling System , 1996 .

[18]  Subhash C. Kak,et al.  How to improve security in electronic voting? , 2007, UBIQ.

[19]  L. Lanza-Kaduce,et al.  THE PROCESS OF CRIMINALIZATION: THE CASE OF COMPUTER CRIME LAWS* , 1988 .