4,587 resources related to Voting
- Topics related to Voting
- IEEE Organizations related to Voting
- Conferences related to Voting
- Periodicals related to Voting
- Most published Xplore authors for Voting
The conference program will consist of plenary lectures, symposia, workshops and invitedsessions of the latest significant findings and developments in all the major fields of biomedical engineering.Submitted full papers will be peer reviewed. Accepted high quality papers will be presented in oral and poster sessions,will appear in the Conference Proceedings and will be indexed in PubMed/MEDLINE.
ICC 2021 - IEEE International Conference on Communications
IEEE ICC is one of the two flagship IEEE conferences in the field of communications; Montreal is to host this conference in 2021. Each annual IEEE ICC conference typically attracts approximately 1,500-2,000 attendees, and will present over 1,000 research works over its duration. As well as being an opportunity to share pioneering research ideas and developments, the conference is also an excellent networking and publicity event, giving the opportunity for businesses and clients to link together, and presenting the scope for companies to publicize themselves and their products among the leaders of communications industries from all over the world.
2020 IEEE Conference on Computer Vision and Pattern Recognition (CVPR)
CVPR is the premier annual computer vision event comprising the main conference and several co-located workshops and short courses. With its high quality and low cost, it provides an exceptional value for students, academics and industry researchers.
The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2020, the 27th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.
The 2020 IEEE International Conference on Systems, Man, and Cybernetics (SMC 2020) will be held in Metro Toronto Convention Centre (MTCC), Toronto, Ontario, Canada. SMC 2020 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report most recent innovations and developments, summarize state-of-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems, and cybernetics. Advances in these fields have increasing importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience and thereby improve quality of life. Papers related to the conference theme are solicited, including theories, methodologies, and emerging applications. Contributions to theory and practice, including but not limited to the following technical areas, are invited.
The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.
Broad coverage of concepts and methods of the physical and engineering sciences applied in biology and medicine, ranging from formalized mathematical theory through experimental science and technological development to practical clinical applications.
Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...
Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)
IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...
IEEE Potentials, 2004
Proceedings. 13th International Workshop on Database and Expert Systems Applications, 2002
We are in the process of producing a common user requirement specification for electronic voting systems, based on a generic voting model that takes into account: a) the existing European legal framework, b) organizational details of conventional voting processes, c) the required security attributes, and d) opportunities offered and constraints imposed by state-of-the-art technology. The requirements elicitation process has been ...
36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of the, 2003
IEEE Spectrum, 2001
Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217), 1998
We propose two new anonymous secure electronic voting schemes that protect the privacy of the voters and prevent double voting. These schemes do not require any special voting channel and the communications can occur entirely over existing networks such as the Internet. The proposed schemes are based on the ElGamal digital signature algorithm and can be applied to elections in ...
Message from IEEE President Ray
IEEE Sections Congress 2011 - Closing Ceremony
Working Group Topic Selection - ETAP Forum Namibia, Africa 2017
Synthesize and Refine Selection of Highest Priority Issues - ETAP Tel Aviv 2015
Vincenzo Piuri - Moving Our Ideas Forward - Closing Ceremony: Sections Congress 2017
Rapid Fire Round-up of Key Issues - ETAP Tel Aviv 2015
Developing Automated Analysis Tools for Space/Time Sidechannel Detection - IEEE SecDev 2016
We are in the process of producing a common user requirement specification for electronic voting systems, based on a generic voting model that takes into account: a) the existing European legal framework, b) organizational details of conventional voting processes, c) the required security attributes, and d) opportunities offered and constraints imposed by state-of-the-art technology. The requirements elicitation process has been based on the rational unified process with each "use case" referring to a functional requirement of the system. Its "security attributes" (mainly imposed by the legal framework) are being expressed as non-functional requirements which are either "use case specific" or "system wide".
We propose two new anonymous secure electronic voting schemes that protect the privacy of the voters and prevent double voting. These schemes do not require any special voting channel and the communications can occur entirely over existing networks such as the Internet. The proposed schemes are based on the ElGamal digital signature algorithm and can be applied to elections in a variety of situations ranging from an election in a small organization to a country.
Voting systems have become controversial in the years following the multiple election disasters that occurred in the United States during and after 2000. Of particular note were the electronic voting (e-voting) systems that were widely deployed to replace the pre-scored punch-card systems, systems that had have been frequently judged to be central to the problem in the 2000 Florida general election. The (premature) deployment of e-voting machines stimulated a new field of security and privacy research around the subject of elections, a subject that has turned out to be more complex and deeper than anyone would have predicted a decade ago. Here we present a sample of some of the finest recent work on election technology from authors on three continents.
Scantegrity is a security enhancement for optical scan voting systems. It's part of an emerging class of "end-to-end" independent election verification systems that permit each voter to verify that his or her ballot was correctly recorded and counted. On the Scantegrity ballot, each candidate position is paired with a random letter. Election officials confirm receipt of the ballot by posting the letter that is adjacent to the marked position. Scantegrity is the first voting system to offer strong independent verification without changing the way voters mark optical scan ballots, and it complies with legislative proposals requiring "unencrypted" paper audit records.
Cryptographic protocols are the basis for the security of any protected system, including the electronic voting system. One of the most effective ways to analyze protocol security is to use verifiers. In this paper, the formal verifier SPIN was used to analyze the security of the cryptographic protocol for e-voting, which is based on model checking using linear temporal logic (LTL). The cryptographic protocol of electronic voting is described. The main structural units of the Promela language used for simulation in the SPIN verifier are described. The model of the electronic voting protocol in the language Promela is given. The interacting parties, transferred data, the order of the messages transmitted between the parties are described. Security of the cryptographic protocol using the SPIN tool is verified. The simulation of the protocol with active intruder using the man in the middle attack (MITM) to substitute data is made. In the simulation results it is established that the protocol correctly handles the case of an active attack on the parties' authentication.
Voting is common in our daily life, from electing president to electing committee; we need to set up a complete electronic voting scheme suitable for all kinds of voting with safe guaranty where the voter's privacy can be protected. However, most present electronic voting schemes are still in experimental stage. People often question about the security of electronic voting because all schemes require the verification of trusted centers. And these trusted centers add the complexity of processing. In this paper, we present a one-server private information retrieval (PIR) electronic voting scheme with secure coprocessor (SC). In the scheme, we not only protect personal privacy but also increase the security of the voting procedure. Besides, using only one server can lower the cost. This idea can be used in small-scale election practically, because of its high security, low cost and good efficiency. By this novel and practical electronic voting system, electronic voting can be applied more easily in everyday life.
Recently, the use of formal methods to specify and verify properties of electronic voting (e-voting) systems, with particular interest in security, verifiability, and anonymity, is getting much attention. Formal specification and verification of such systems can greatly help to better understand the system requirements by thoroughly specifying and analyzing the underlying assumptions and security specific properties. Unfortunately, even though these systems have been formally verified to satisfy the desired system security requirements, they are still vulnerable to attack. In this paper we extend a formal specification of the ES&S voting system by specifying attacks that have been shown to successfully compromise the system. We believe that performing such analysis is important for two reasons: first, it allows us to discover some missing critical requirements for the specification and/or assumptions that were not met Second, it allows us to derive mitigation or counter-measure strategies when the system behaves differently than it should. We used the ASTRAL language for the specification, and the verification is performed using the PVS tool.
No standards are currently tagged "Voting"