Electronic voting systems
313 resources related to Electronic voting systems
- Topics related to Electronic voting systems
- IEEE Organizations related to Electronic voting systems
- Conferences related to Electronic voting systems
- Periodicals related to Electronic voting systems
- Most published Xplore authors for Electronic voting systems
The conference program will consist of plenary lectures, symposia, workshops and invitedsessions of the latest significant findings and developments in all the major fields of biomedical engineering.Submitted full papers will be peer reviewed. Accepted high quality papers will be presented in oral and poster sessions,will appear in the Conference Proceedings and will be indexed in PubMed/MEDLINE.
The 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2020) will be held in Metro Toronto Convention Centre (MTCC), Toronto, Ontario, Canada. SMC 2020 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report most recent innovations and developments, summarize state-of-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics. Advances in these fields have increasing importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience and thereby improve quality of life. Papers related to the conference theme are solicited, including theories, methodologies, and emerging applications. Contributions to theory and practice, including but not limited to the following technical areas, are invited.
The Conference focuses on all aspects of instrumentation and measurement science andtechnology research development and applications. The list of program topics includes but isnot limited to: Measurement Science & Education, Measurement Systems, Measurement DataAcquisition, Measurements of Physical Quantities, and Measurement Applications.
Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.
The ICASSP meeting is the world's largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions.
The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.
Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed technical content that covers all aspects of computer science, computer engineering, technology, and applications. Computer is a resource that practitioners, researchers, and managers can rely on to provide timely information about current research developments, trends, best practices, and changes in the profession.
Methods, algorithms, and human-machine interfaces for physical and logical design, including: planning, synthesis, partitioning, modeling, simulation, layout, verification, testing, and documentation of integrated-circuit and systems designs of all complexities. Practical applications of aids resulting in producible analog, digital, optical, or microwave integrated circuits are emphasized.
The design and manufacture of consumer electronics products, components, and related activities, particularly those used for entertainment, leisure, and educational purposes
IEEE Transactions on Industrial Informatics focuses on knowledge-based factory automation as a means to enhance industrial fabrication and manufacturing processes. This embraces a collection of techniques that use information analysis, manipulation, and distribution to achieve higher efficiency, effectiveness, reliability, and/or security within the industrial environment. The scope of the Transaction includes reporting, defining, providing a forum for discourse, and informing ...
IEEE Security & Privacy, 2008
Scantegrity is a security enhancement for optical scan voting systems. It's part of an emerging class of "end-to-end" independent election verification systems that permit each voter to verify that his or her ballot was correctly recorded and counted. On the Scantegrity ballot, each candidate position is paired with a random letter. Election officials confirm receipt of the ballot by posting ...
IEEE Potentials, 2004
Proceedings. 13th International Workshop on Database and Expert Systems Applications, 2002
We are in the process of producing a common user requirement specification for electronic voting systems, based on a generic voting model that takes into account: a) the existing European legal framework, b) organizational details of conventional voting processes, c) the required security attributes, and d) opportunities offered and constraints imposed by state-of-the-art technology. The requirements elicitation process has been ...
36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the, 2003
IEEE Spectrum, 2001
Message from IEEE President-Elect Kam
APEC 2011-GaN Based Power Devices in Power Electronics
Low Power Image Recognition: The Challenge Continues
Maker Faire 2008: Babbage's Difference Engine No. 2 Replica
Regenerative Energy Storage Systems for Hybrid Electric and Battery Electric Vehicles
Message from IEEE President Ray
IEEE Sections Congress 2011 - Closing Ceremony
The Intergrid - Safe, Dependable, Sustainable: IECON 2018
Electronic Systems for Quantum Computation - David DiVincenzo: 2016 International Conference on Rebooting Computing
Transportation Electrification: Smart Grids and Sustainable Generation
Working Group Topic Selection - ETAP Forum Namibia, Africa 2017
Marian P. Kazmierkowski receives the IEEE Medal in Power Engineering - Honors Ceremony 2017
ASC-2014 SQUIDs 50th Anniversary: 1 of 6 Arnold Silver
ICASSP 2010 - Advances in Neural Engineering
Optimal Design of NPC and Active-NPC Transformerless PV Inverters
Electric Ship Technologies Symposium (Member Access)
Group on Earth Observations (GEOSS)
NIKSUN World Wide Security & Mobility Conference 2011 - Col. R Fellers
Learn About Rebooting Computing
Scantegrity is a security enhancement for optical scan voting systems. It's part of an emerging class of "end-to-end" independent election verification systems that permit each voter to verify that his or her ballot was correctly recorded and counted. On the Scantegrity ballot, each candidate position is paired with a random letter. Election officials confirm receipt of the ballot by posting the letter that is adjacent to the marked position. Scantegrity is the first voting system to offer strong independent verification without changing the way voters mark optical scan ballots, and it complies with legislative proposals requiring "unencrypted" paper audit records.
We are in the process of producing a common user requirement specification for electronic voting systems, based on a generic voting model that takes into account: a) the existing European legal framework, b) organizational details of conventional voting processes, c) the required security attributes, and d) opportunities offered and constraints imposed by state-of-the-art technology. The requirements elicitation process has been based on the rational unified process with each "use case" referring to a functional requirement of the system. Its "security attributes" (mainly imposed by the legal framework) are being expressed as non-functional requirements which are either "use case specific" or "system wide".
We propose two new anonymous secure electronic voting schemes that protect the privacy of the voters and prevent double voting. These schemes do not require any special voting channel and the communications can occur entirely over existing networks such as the Internet. The proposed schemes are based on the ElGamal digital signature algorithm and can be applied to elections in a variety of situations ranging from an election in a small organization to a country.
Voting systems have become controversial in the years following the multiple election disasters that occurred in the United States during and after 2000. Of particular note were the electronic voting (e-voting) systems that were widely deployed to replace the pre-scored punch-card systems, systems that had have been frequently judged to be central to the problem in the 2000 Florida general election. The (premature) deployment of e-voting machines stimulated a new field of security and privacy research around the subject of elections, a subject that has turned out to be more complex and deeper than anyone would have predicted a decade ago. Here we present a sample of some of the finest recent work on election technology from authors on three continents.
Cryptographic protocols are the basis for the security of any protected system, including the electronic voting system. One of the most effective ways to analyze protocol security is to use verifiers. In this paper, the formal verifier SPIN was used to analyze the security of the cryptographic protocol for e-voting, which is based on model checking using linear temporal logic (LTL). The cryptographic protocol of electronic voting is described. The main structural units of the Promela language used for simulation in the SPIN verifier are described. The model of the electronic voting protocol in the language Promela is given. The interacting parties, transferred data, the order of the messages transmitted between the parties are described. Security of the cryptographic protocol using the SPIN tool is verified. The simulation of the protocol with active intruder using the man in the middle attack (MITM) to substitute data is made. In the simulation results it is established that the protocol correctly handles the case of an active attack on the parties' authentication.
Voting is common in our daily life, from electing president to electing committee; we need to set up a complete electronic voting scheme suitable for all kinds of voting with safe guaranty where the voter's privacy can be protected. However, most present electronic voting schemes are still in experimental stage. People often question about the security of electronic voting because all schemes require the verification of trusted centers. And these trusted centers add the complexity of processing. In this paper, we present a one-server private information retrieval (PIR) electronic voting scheme with secure coprocessor (SC). In the scheme, we not only protect personal privacy but also increase the security of the voting procedure. Besides, using only one server can lower the cost. This idea can be used in small-scale election practically, because of its high security, low cost and good efficiency. By this novel and practical electronic voting system, electronic voting can be applied more easily in everyday life.
A Swiss e-voting system, operational since December 2004, is based on a service-oriented architecture that lets voters use Internet or mobile phones to cast votes. Two-step encryption and redundant storage systems keep votes authentic and confidential.
No standards are currently tagged "Electronic voting systems"