716 resources related to Electronic voting
- Topics related to Electronic voting
- IEEE Organizations related to Electronic voting
- Conferences related to Electronic voting
- Periodicals related to Electronic voting
- Most published Xplore authors for Electronic voting
The conference program will consist of plenary lectures, symposia, workshops and invitedsessions of the latest significant findings and developments in all the major fields of biomedical engineering.Submitted full papers will be peer reviewed. Accepted high quality papers will be presented in oral and poster sessions,will appear in the Conference Proceedings and will be indexed in PubMed/MEDLINE.
2020 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
CVPR is the premier annual computer vision event comprising the main conference and several co-located workshops and short courses. With its high quality and low cost, it provides an exceptional value for students, academics and industry researchers.
The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2020, the 27th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.
The International Conference on Robotics and Automation (ICRA) is the IEEE Robotics and Automation Society’s biggest conference and one of the leading international forums for robotics researchers to present their work.
The 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2020) will be held in Metro Toronto Convention Centre (MTCC), Toronto, Ontario, Canada. SMC 2020 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report most recent innovations and developments, summarize state-of-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics. Advances in these fields have increasing importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience and thereby improve quality of life. Papers related to the conference theme are solicited, including theories, methodologies, and emerging applications. Contributions to theory and practice, including but not limited to the following technical areas, are invited.
The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.
IEEE Antennas and Wireless Propagation Letters (AWP Letters) will be devoted to the rapid electronic publication of short manuscripts in the technical areas of Antennas and Wireless Propagation.
Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.
Methods, algorithms, and human-machine interfaces for physical and logical design, including: planning, synthesis, partitioning, modeling, simulation, layout, verification, testing, and documentation of integrated-circuit and systems designs of all complexities. Practical applications of aids resulting in producible analog, digital, optical, or microwave integrated circuits are emphasized.
The design and manufacture of consumer electronics products, components, and related activities, particularly those used for entertainment, leisure, and educational purposes
IEEE Potentials, 2004
Proceedings. 13th International Workshop on Database and Expert Systems Applications, 2002
We are in the process of producing a common user requirement specification for electronic voting systems, based on a generic voting model that takes into account: a) the existing European legal framework, b) organizational details of conventional voting processes, c) the required security attributes, and d) opportunities offered and constraints imposed by state-of-the-art technology. The requirements elicitation process has been ...
36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the, 2003
IEEE Spectrum, 2001
Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217), 1998
We propose two new anonymous secure electronic voting schemes that protect the privacy of the voters and prevent double voting. These schemes do not require any special voting channel and the communications can occur entirely over existing networks such as the Internet. The proposed schemes are based on the ElGamal digital signature algorithm and can be applied to elections in ...
Message from IEEE President Ray
IEEE Sections Congress 2011 - Closing Ceremony
Working Group Topic Selection - ETAP Forum Namibia, Africa 2017
Synthesize and Refine Selection of Highest Priority Issues - ETAP Tel Aviv 2015
IEEE Highlight: Electronic Nose: Diagnosing Cancer Through Smell
Vincenzo Piuri - Moving Our Ideas Forward - Closing Ceremony: Sections Congress 2017
Rapid Fire Round-up of Key Issues - ETAP Tel Aviv 2015
IEEE Future Directions: Green Information and Communications Technology: An Overview
APEC 2011-Intergrid: A Future Electronic Energy Network?
Developing Automated Analysis Tools for Space/Time Sidechannel Detection - IEEE SecDev 2016
Robotics History: Narratives and Networks Oral Histories:Alan Winfield
On the Shoulders of Giants
IEEE Sections Congress 2011 - vTools
Karen Bartleson - Standards Education 1 of 3 | IEEE-SA
Mouser by the Numbers
How to Build a Superconducting Opto-Electronic Neuromorphic Computer - Sonia Buckley - ICRC 2018
Care Innovations: Toxics In Electronics (com legendas em portugues)
IEEE IPC Special Session with Domanic Lavery of UCL
Steve Mills - Standards Education 3 of 3 | IEEE-SA
We are in the process of producing a common user requirement specification for electronic voting systems, based on a generic voting model that takes into account: a) the existing European legal framework, b) organizational details of conventional voting processes, c) the required security attributes, and d) opportunities offered and constraints imposed by state-of-the-art technology. The requirements elicitation process has been based on the rational unified process with each "use case" referring to a functional requirement of the system. Its "security attributes" (mainly imposed by the legal framework) are being expressed as non-functional requirements which are either "use case specific" or "system wide".
We propose two new anonymous secure electronic voting schemes that protect the privacy of the voters and prevent double voting. These schemes do not require any special voting channel and the communications can occur entirely over existing networks such as the Internet. The proposed schemes are based on the ElGamal digital signature algorithm and can be applied to elections in a variety of situations ranging from an election in a small organization to a country.
Voting systems have become controversial in the years following the multiple election disasters that occurred in the United States during and after 2000. Of particular note were the electronic voting (e-voting) systems that were widely deployed to replace the pre-scored punch-card systems, systems that had have been frequently judged to be central to the problem in the 2000 Florida general election. The (premature) deployment of e-voting machines stimulated a new field of security and privacy research around the subject of elections, a subject that has turned out to be more complex and deeper than anyone would have predicted a decade ago. Here we present a sample of some of the finest recent work on election technology from authors on three continents.
Cryptographic protocols are the basis for the security of any protected system, including the electronic voting system. One of the most effective ways to analyze protocol security is to use verifiers. In this paper, the formal verifier SPIN was used to analyze the security of the cryptographic protocol for e-voting, which is based on model checking using linear temporal logic (LTL). The cryptographic protocol of electronic voting is described. The main structural units of the Promela language used for simulation in the SPIN verifier are described. The model of the electronic voting protocol in the language Promela is given. The interacting parties, transferred data, the order of the messages transmitted between the parties are described. Security of the cryptographic protocol using the SPIN tool is verified. The simulation of the protocol with active intruder using the man in the middle attack (MITM) to substitute data is made. In the simulation results it is established that the protocol correctly handles the case of an active attack on the parties' authentication.
Voting is common in our daily life, from electing president to electing committee; we need to set up a complete electronic voting scheme suitable for all kinds of voting with safe guaranty where the voter's privacy can be protected. However, most present electronic voting schemes are still in experimental stage. People often question about the security of electronic voting because all schemes require the verification of trusted centers. And these trusted centers add the complexity of processing. In this paper, we present a one-server private information retrieval (PIR) electronic voting scheme with secure coprocessor (SC). In the scheme, we not only protect personal privacy but also increase the security of the voting procedure. Besides, using only one server can lower the cost. This idea can be used in small-scale election practically, because of its high security, low cost and good efficiency. By this novel and practical electronic voting system, electronic voting can be applied more easily in everyday life.
Recently, the use of formal methods to specify and verify properties of electronic voting (e-voting) systems, with particular interest in security, verifiability, and anonymity, is getting much attention. Formal specification and verification of such systems can greatly help to better understand the system requirements by thoroughly specifying and analyzing the underlying assumptions and security specific properties. Unfortunately, even though these systems have been formally verified to satisfy the desired system security requirements, they are still vulnerable to attack. In this paper we extend a formal specification of the ES&S voting system by specifying attacks that have been shown to successfully compromise the system. We believe that performing such analysis is important for two reasons: first, it allows us to discover some missing critical requirements for the specification and/or assumptions that were not met Second, it allows us to derive mitigation or counter-measure strategies when the system behaves differently than it should. We used the ASTRAL language for the specification, and the verification is performed using the PVS tool.
This paper describes the implementative aspects, the main challenges and the adopted solutions for an Internet voting system designed by LepidaSpA and dedicated for specific elections a Land Reclamation Authority in Italian Emilia-Romagna region. Besides the description of the voting system, we also present an efficient and simple administration tool for the management of all the election phases, from the setup to the scrutiny, that represents the essence of this paper as our original contribution. Furthermore, we focus the attention on the characteristics of our implementation in terms of security.
No standards are currently tagged "Electronic voting"