Secure Electronic Voting Research Papers (original) (raw)

A system with a porous electoral process will produce the wrong leadership. The quality of an election determines the quality of the selected leadership of a community, state, and nation at large. Over the years, different solutions... more

A system with a porous electoral process will produce the wrong leadership. The quality of an election determines the quality of the selected leadership of a community, state, and nation at large. Over the years, different solutions ranging from the manual method to electronic methods have been proposed to address the various electoral malpractices associated with elections, however, the key issues of privacy, trust, and fairness in elections yet remain. In this research, we proposed an electronic voting system based on blockchain technology to address the identified issues of privacy, trust, and fairness. Smart contracts which kept track of votes in real-time and maintained the security of the electoral process were also proposed. The system was implemented on the Ethereum blockchain network, where Ganache was used to perform simulations of the voting process. We finally recommended that small-scale and medium-scale businesses could firstly adopt the system, after which, it could be implemented on a larger scale such as in national elections.

Election is a key issue when it comes to deciding who the next leader(s) or representative(s) are going to be through democratic means. The existing prevalent processes of voting in these elections are slow and strenuous and the outcome... more

Election is a key issue when it comes to deciding who the next leader(s) or representative(s) are going to be through democratic means. The existing prevalent processes of voting in these elections are slow and strenuous and the outcome is often inaccurate. Thus, people lose faith in the electoral process and consequently in their leaders as well. This work developed an electronic voting system that aids the process of choosing such leaders in a manner that is fast, free and fair. The device was developed by interfacing fingerprint sensor, a keypad, GSM module, real time clock, an LCD and a personal computer to an Arduino Mega. Algorithm was developed and coded using the Arduino IDE. The unit stores voter data, which includes biometric information, during registration and randomly assign voting pins to registered voters to their given mobile numbers. Prior to voting, it checks for a match with the stored data during the authentication by comparing biometric and then pin of a voter to that in the database. Upon successful authentication, the voter is allowed to cast their vote, either in open ballot or closed ballot mode. The device collates result of voting including time of each vote and can deduce the winner based on majority votes. The device was deployed and evaluated against a mock election using the secret ballot system and was found to not only produce expected results but was also found to eliminate possible irregularities such as vote inflation while also reducing both voting and collation times.

An Online Voting System is a web based system that facilitates the running of elections online. Most higher learning institutions in Kenya conduct elections regularly in order to elect a student leadership to elect them. The elections... more

An Online Voting System is a web based system that facilitates the running of elections online. Most higher learning institutions in Kenya conduct elections regularly in order to elect a student leadership to elect them. The elections conducted are mainly manual hence they are marred with irregularities which usually affect negatively the results of the election. In this era of advanced technology where online systems boosts work speed, reduces mistakes and promote the generation of accurate results, having a manual system like the paper-based version becomes a misfortune. An online system, which involves procedures like registration of voters, vote casting, vote counting, and declaring results etc. would constitute a good solution to replace current system that is in the universities in Kenya. Online systems have the advantage of providing convenience to the voter and reduce the time wasted in the queuing process at election centers and also promote security in the voting process. This paper hence describes the UVS which is a web-based online voting system that helps facilitate voting on the internet by providing a platform students are provided with an online registration form which requires them to register as voters, and then the details filled on the form are submitted in the database which then approves the user who can then login into the UVS and cast their vote. The UVS was developed using the waterfall model due to the adaptive nature of web based applications and the system proved that a computerized solution is possible with elimination of human related faults that are a commonplace in employment of human clerks to manage the election process. This paper has proposed the basic structure of the system and its functionality which can be employed to replace the current electoral system used in Universities.

A fair voting process is a fundamental part of any system that works in a democratic manner as it gives individuals the power to voice their opinion. The existing system incorporates Electronic Voting Machines (EVM) that stores data... more

A fair voting process is a fundamental part of any system that works in a democratic manner as it gives individuals the power to voice their opinion. The existing system incorporates Electronic Voting Machines (EVM) that stores data locally and is centralized which makes it point of weakness. Since the data is stored locally over the EVM(s) until the end of the elections it could be hacked. Moreover, there have actually been incidents of "booth-hijacking" that have taken place in some places during the elections. In the recent years there have been lots of accusations of EVM being hacked and the elections manipulated due to it. Unfortunately, there is no methodology incorporated into the existing system which could be used to prove that the a particular vote has been casted successfully and the EVM was not hacked. The blockchain is an emerging, decentralized, and distributed technology that promises to enhance different aspects of many industries. With the blockchain being a practically hack-proof way of logging transactions, expanding e-voting into blockchain technology could be the solution to alleviate the present concerns in e-voting. This paper presents a blockchain based e-voting system, named VoteEth that is secure and reliable. It will increase accessibility as the users could cast their votes without paying a visit to the polling booths. VoteEth utilizes Ethereum's blockchain and smart contracts for its implementation.

Ethereum is an open-source, public, block chain-based distributed computing platform and operating system featuring smart contract functionality. In this paper, we proposed an Ethereum based electronic voting (e-voting) protocol,... more

Ethereum is an open-source, public, block chain-based distributed computing platform and operating system featuring smart contract functionality. In this paper, we proposed an Ethereum based electronic voting (e-voting) protocol, Ques-Chain, which can ensure the authentication can be done without hurting confidentiality and the anonymity can be protected without problems of scams at the same time. Furthermore, the authors considered the wider usages Ques-Chain can be applied on, pointing out that it is able to process all kinds of messages and can be used in all fields with similar needs.

A large part of society today does not trust decision making in government policies and projects. It is time to move into new technology such as decision making on government policies and projects using the latest technology like... more

A large part of society today does not trust decision making in government policies and projects. It is time to move into new technology such as decision making on government policies and projects using the latest technology like blockchain and advanced cryptography. Building of blockchain-based secure, reliable, and distributed voting system for decision making in government policies and projects has been a challenge for a long time. Distributed ledger technologies are exciting technology advancement in the information technology world. Blockchain-based technologies offer an infinite range of applications that benefit from sharing economies of scale. The purpose of this research paper is to evaluate the use of blockchain as the implementation of distributed electronic voting systems for decision making on government policies and projects. More generally, this article assesses the potential of distributed ledger technologies in improves security by implementing an election process and blockchain-based application. This technology will be benefited to Grama sewa officers who will give correct vote. Because country like Sri Lanka we have 14020 Grama sewa regions. Each member get a chance to cast his vote. One vote for each project, it can be changed before the due date and only the last one can be counted. The grama sewa officer who cast his vote cannot be tracked, but the officer can cast a unique vote. After a while, the officer may join a fund or a fine. Voting on government policies or projects is mandatory and officer cannot prevent it. This will help to get the best option for government policies or projects.

This paper explores biometrics and electronic voting in a bid to design a Biometrics-based E-Voting System that could be applicable in Ghana and other similar developing countries, its shortcomings and the advantages of the biometrics... more

This paper explores biometrics and electronic voting in a bid to design a Biometrics-based E-Voting System that could be applicable in Ghana and other similar developing countries, its shortcomings and the advantages of the biometrics authentication module incorporated in the system.

The end-to-end-verifiability enables software-independent verification of remote electronic voting systems. Each voter should be able to convince himself that his vote was "cast as intended", "recorded as cast" and "tallied as recorded",... more

The end-to-end-verifiability enables software-independent verification of remote electronic voting systems. Each voter should be able to convince himself that his vote was "cast as intended", "recorded as cast" and "tallied as recorded", regardless of the software used. In this thesis different approaches of verifiability are demonstrated. In addition, it is examined whether new safety problems and points of attack have emerged.
----------------------
Die Ende-zu-Ende-Verifizierbarkeit ermöglicht die Software-unabhängige Verifikation elektronischer Wahlen. Jeder Wähler soll sich selbst und unabhängig von der eingesetzten Software davon überzeugen können, dass seine Stimme korrekt abgegeben, erfasst und ausgezählt wurde. In dieser Arbeit werden am norwegischen, estnischen und Helios-Wahlsystem verschiedene Ansätze der Verifizierbarkeit demonstriert. Darüber hinaus wird untersucht, ob sich aus dem praktischen Einsatz neue Sicherheitsprobleme und Angriffspunkte ergeben haben.

O artigo sugere a criação do “Modelo Brasileiro de Votação Mecatrônica Independente de Software” ou “Votação Mecatrônica,” que propõe pesquisas e o desenvolvimento de novos equipamentos para um sistema automatizado de identificação do... more

O artigo sugere a criação do “Modelo Brasileiro de Votação Mecatrônica Independente de Software” ou “Votação Mecatrônica,” que propõe pesquisas e o desenvolvimento de novos equipamentos para um sistema automatizado de identificação do eleitor, coleta e apuração da votação, e de softwares capazes de gerar dois ou mais registros diferentes e auditáveis do voto digital e impresso.

This study was commissioned and supervised by the European Parliament’s Department for Citizens’ Rights and Constitutional Affairs at the request of the AFCO Committee. It addresses the potentials and challenges of the implementation of... more

This study was commissioned and supervised by the European Parliament’s Department for Citizens’ Rights and Constitutional Affairs at the request of the AFCO Committee. It addresses the potentials and challenges of the implementation of Internet voting in European Parliament elections. It considers the social, political, legal, and technological implications of its introduction as an alternative to on-paper ballot and builds on the recent experience of previous trials and successful e-enabled elections to issue technical recommendations regarding Internet voting in the European Union.

This paper provides a systematic overview of the major constitutional and legalaspects of e-voting, together with their technical implications. All democracy-oriented legal and constitutional requirements of an Internet-based voting... more

This paper provides a systematic overview of the major constitutional and legalaspects of e-voting, together with their technical implications. All democracy-oriented legal and constitutional requirements of an Internet-based voting system are identified. Such a voting system has to comply with these, in order to encourage and promote the participation of citizens, without violating any of their fundamental rights (privacy, anonymity, equality, etc.).

The advancement in the mobile devices, wireless and web technologies given rise to the new application that will make the voting process very easy and efficient. The E-voting promises the possibility of convenient, easy and safe way to... more

The advancement in the mobile devices, wireless and web technologies given rise to the new application that will make the voting process very easy and efficient. The E-voting promises the possibility of convenient, easy and safe way to capture and count the votes in an election[1]. This research project provides the specification and requirements for E-Voting using an Android platform. The e-voting means the voting process in election by using electronic device. The android platform is used to develop an e-voting application. At first, an introduction about the system is presented. Sections II and III describe all the concepts (survey, design and implementation) that would be used in this work. Finally, the proposed e-voting system will be presented. This technology helps the user to cast the vote without visiting the polling booth. The application follows proper authentication measures in order to avoid fraud voters using the system. Once the voting session is completed the results can be available within a fraction of seconds. All the candidates vote count is encrypted and stored in the database in order to avoid any attacks and disclosure of results by third person other than the administrator. Once the session is completed the admin can decrypt the vote count and publish results and can complete the voting process.

The need for fool proof authentication procedures away from traditional authentication mechanisms like passwords, security PINS has led to the advent of biometric authentication in information systems. Biometric data extracted from... more

The need for fool proof authentication procedures away from traditional authentication mechanisms like passwords, security PINS has led to the advent of biometric authentication in information systems. Biometric data extracted from physiological features of a person including but not limited to fingerprints, palm prints, face or retina for purpose of verification & identification is saved as biometric templates. The inception of biometrics in access control systems has not been without its own hitches & like other systems it has its fair share of challenges. Biometric fingerprints being the most mature of all biometric spheres are the most widely adopted biometric authentication systems. Biometric systems effectiveness lies on how secure they are at preventing inadvertent disclosure of biometric templates in an information system’s archive. This however has not been the case as biometric templates have been fraudulently accessed to gain unauthorized access in identification and verification systems. In order to achieve strong and secure biometric systems, biometric systems developers need to build biometric systems that properly secure biometric templates. Several biometric template protection schemes and approaches have been proposed and used to safeguard stored biometric templates. Despite there being various biometric template protection schemes and approaches in existence, none of them has provided the most authentic, reliable, efficient and deterrent means to totally secure biometric fingerprint templates. This research sought to establish status of the current biometric template protection techniques and methods by conducting a survey and analyzing data gathered from a sample of seventy-eight (78) respondents. We will report these results and give our conclusion based on findings of the survey in this paper.

Governance for the people of any country is executed by the democratically elected party through the voting process. Earlier the paper ballot voting system was used manually, which was later substituted by Electronic Voting Machine (EVM)... more

Governance for the people of any country is executed by the democratically elected party through the voting process. Earlier the paper ballot voting system was used manually, which was later substituted by Electronic Voting Machine (EVM) in India. This mechanism has been suspected by some people and the possibilities of tampering in process cannot be ruled out. Every citizen of the country gradually expects to introduce the user-friendly, flexible, cost-effective, transparent, accurate, reliable, robust, and secure voting system in the twenty-first century using the latest concepts of emerging Blockchain technology by building Next-Generation Electoral system. It can save time, reduce cost and electoral fraud, increase voter privacy, and remove a lot of hurdles in the voting process on a secured platform, thereby increasing voter involvement and participation. The paper comprises of general evaluation of the current voting mechanism and proposes an effective and viable alternative model using Blockchain technology. This paper also provides a comparison of various prequalified criteria comprising of costing, timing, security, transparency, audit of voting process, and risk factors involved.

The study's goal is to investigate the feasibility of developing an electronic voting system for the Gumaca National High School-Accountancy, Business, and Management (GNHS-ABM) Society via Information and Communication Technology (ICT)... more

The study's goal is to investigate the feasibility of developing an electronic voting system for the Gumaca National High School-Accountancy, Business, and Management (GNHS-ABM) Society via Information and Communication Technology (ICT) operations that can automate the election process and serve as an alternative venue for continuing to work in a new, normal way. The population consists of 422 ABM students, and the sample was selected using the most convenient sampling technique, which yielded 129 respondents. It utilizes quantitative approach and a descriptive research method. An online form containing a 15-item self-made questionnaire was used to collect the data. For necessary statistical treatments such as descriptive and inferential statistics, normality tests, and reliability tests, Microsoft Excel and SPSS were used. According to the findings of the study, active participation is achieved by younger strata and is dominated by lower grade and female groups. In this study, the gadget exposure reveals a key aspect with a gap to consider while the overall perception agreed to the benefit of electronic voting method. Hypothesis testing revealed that all grouping variables has a p-value greater than 0.05 showing no significant difference exist and it fails to reject null hypothesis. Following the proposed intervention, the researcher suggests that the voting process be recreated. Make digital technology more accessible to students and give ample infrastructure support for students to use in order to close the gap between gadget exposure and digital transformation maximized.

Though there are online voting systems available, the authors propose a new and secure steganography based E2E (end-to-end) verifiable online voting system, to tackle the problems in voting process. This research implements a novel... more

Though there are online voting systems available, the authors propose a new and secure steganography based E2E (end-to-end) verifiable online voting system, to tackle the problems in voting process. This research implements a novel approach to online voting by combining visual cryptography with image steganography to enhance system security without degrading system usability and performance. The voting system will also include password hashed-based scheme and threshold decryption scheme. The software is developed on web-based Java EE with the integration of MySQL database server and Glassfish as its application server. The authors assume that the election server used and the election authorities are trustworthy. A questionnaire survey of 30 representative participants was done to collect data to measure the user acceptance of the software developed through usability testing and user acceptance testing.

O presente estudo sugere a reformulação do processo de votação brasileiro, no sentido de aprimorar a eficiência, a segurança e a transparência no registro e auditoria do voto, observando os conceitos científicos, leis e discussões atuais... more

O presente estudo sugere a reformulação do processo de votação brasileiro, no sentido de aprimorar a eficiência, a segurança e a transparência no registro e auditoria do voto, observando os conceitos científicos, leis e discussões atuais relacionadas aos sistemas de votação eletrônicos utilizados nas Américas, e recomenda à Justiça Eleitoral a criação do “Modelo Brasileiro de Votação Mecatrônica Independente de Software” ou “Votação Independente,” que propõe pesquisas e o desenvolvimento de novos equipamentos que permitam um sistema automatizado de identificação do eleitor, coleta e apuração da votação, e ainda a criação de softwares distintos, capazes de gerar dois ou mais registros diferentes de voto, sendo um digital e outro impresso, e auditá-los.
Palavras-chave: Assinatura Digital, Biometria, Voto Eletrônico, Software Livre, Ecodesign, Inclusão Digital, Acessibilidade, Reforma política.

In this paper is presented a novel solution for the implementation of an electronic voting system using smart cards and digital certificates. The novelty of implemented solution is based on using smart card as secure processing and... more

In this paper is presented a novel solution for the implementation of an electronic voting system using smart cards and digital certificates. The novelty of implemented solution is based on using smart card as secure processing and anonymizer device and constraining their processing capability to a certain number of voting records, which is equal to the final number of voters that voted at specific polling station. The national election commission configures each smart card, as part of polling station infrastructure, to allow decryption of number of records that matches the number of voters in voting list. For security reasons, polling station certificate and its associated private key are stored in a smart card. The access to private key is protected by a personal identification number, which is XOR-ed based on number of commissioners at the polling station. The developed model is used to compare the costs and efficiency of e-Voting against the traditional paper based voting system...

Proponents of blockchain technology state that it facilitates transparency, verifiability, and auditability. Thereby, sometimes it is promoted and tested as an experimental e-voting design. In this relation, the contribution overviews the... more

Proponents of blockchain technology state that it facilitates transparency, verifiability, and auditability. Thereby, sometimes it is promoted and tested as an experimental e-voting design. In this relation, the contribution overviews the three cases of e-voting in Ukraine based on blockchain. Considering the available data, the cases are compared in the aspects of integrity mechanisms, social consensus arrangements, and political functions. It was found that despite differences in technology, all viewed e-voting systems allow remote internet voting, rely on an e-voting organizer, and enable advanced voting transparency. Finally, each consecutive blockchain-based e-voting initiative is more large-scale in the number of voters and the role in policy making and politics.

In recent years, blockchain technology has affected to a large extent all aspects of life, however, until now paper-based elections have been practiced. It is time to upgrade the election scenario using modern technology such as... more

In recent years, blockchain technology has affected to a large extent all aspects of life, however, until now paper-based elections have been practiced. It is time to upgrade the election scenario using modern technology such as blockchain and advanced cryptography methods. Actually, both of Estonia and New South Wales have been using i-voting systems, but after developing an example software of their systems for the purpose of analysis, it is discovered that it has weaknesses against many kinds of attacks, such as malwares, network attacks, and servers attacks. The fact that the blockchain technology has demonstrated infinite immutability and resistance against hacking, so it is possible to use it to secure election results from fraud by saving every single piece of data, record or transaction with unchangeable history. By abandoning the traditional database and compensating it with two blockchains instead of one ensures voter/vote privacy, as well as, safeguards the results from manipulation. Also, using blockchain's distributed network reduces the load on the network. Finally, solutions to problems of impersonation and vote selling are suggested. The technology behind the digital voting system design is explained in terms of the processes involved, such as ID creation, authentication, voting, and vote tallying.

The most important aspect of delivering multimedia services or applications over Internet protocol is not only meeting its optimized QoS objectives, rather see that how exactly the intellectual property is preserved. In this paper,... more

The most important aspect of delivering multimedia services or applications over Internet protocol is not only meeting its optimized QoS objectives, rather see that how exactly the intellectual property is preserved. In this paper, encapsulation of IPTV system along with security protocol have been presented in order to ensure that Intellectual property management protocol is integrated to have a secure live streaming and IPTV service is portrayed. A complete architecture is modeled in order to show-case a stable P2P IPTV structure to connect user terminals. A balance is maintained between the joining and leaving peer by means of tuning uplink capability, synchronization of delay, parent and child peers. The system is adoptive as per the streaming bandwidth of media server to be resilience to the dynamic network conditions. An integrated approach of real-time data encoding, authentication using RFC 3711 has been proposed to sustain different attacks for compromising intellectual property. On implementation it has been found that protocol design successfully performs its objectives and provides desired QoS in a secured manner..

This paper deals with the security aspect of electronic voting (e-voting) by introducing quantum key distribution (QKD) to the e-voting process. This can offer an extremely high level of security that can be very beneficial for some... more

This paper deals with the security aspect of electronic voting (e-voting) by introducing quantum key distribution (QKD) to the e-voting process. This can offer an extremely high level of security that can be very beneficial for some significant e-voting tasks. Moreover, a framework for the integration of the QKD with the e-voting system is proposed. The Helios voting system, which is considered as one of the open-source and major voting systems, has been chosen for this integration. Investigation of the main design aspects of building a QKD-based e-voting system has been done. Thus, the expected advantages and limitations of the proposal are discussed and analyzed.

Blockchain is a distributed ledger technology that allows digital assets to be transacted in a peer-to-peer decentralized network. Those transactions are verified and registered by every node of the network, thus creating a transparent... more

Blockchain is a distributed ledger technology that allows digital assets to be transacted in a peer-to-peer decentralized network. Those transactions are verified and registered by every node of the network, thus creating a transparent and immutable sequence of registered events whose veracity is provided by a consensus protocol. E-voting system is an electronic way of casting and counting votes. It is an efficient and cost effective way for conducting a voting process in real time. However, globally, concerns on security networking and privacy of communication for e-voting have evolved. Securing e-voting is very urgent and has becoming a popular topic in the area of communications and networking. In Nigeria, citizens have complained over the integrity of national electoral umpire simply because Nigeria is still using traditional voting system. Integrity is put to test on every of our election result especially by the opposition parties. Electronic voting systems are one example of a use case that can be improved by the block-chain technology. We therefore, try to apply block-chain technology to our electoral process in order to improve the security of e-voting in Nigeria. This paper proposed block-chain based electronic voting in order to have safe, free, fair, and transparent elections in Nigeria. Finally, we recommend this system to be absorbed by Independent National Electoral Commission for reliable, effective and efficient electoral system.

Objective of wireless sensor network is monitoring particular area for event to happen and forwarding event to the destination as soon as possible and in reliable manner. There exists different technique for forwarding the event packet to... more

Objective of wireless sensor network is monitoring particular area for event to happen and forwarding event to the destination as soon as possible and in reliable manner. There exists different technique for forwarding the event packet to the destination as soon as event is detected in wireless sensor network. Some method uses single node to forward event packet, some methods uses multiple nodes and some method uses all nodes in particular region where event has happened to forward event packet. In this paper we focus on real time event detection based on concept of clustering of nodes and transformation of detected event in reliable and secure manner. Here we consider single node to forward event to sink. It leads to minimize energy conversion, computation cost of network and also it ensures the reliability and security in event forwarding.

งานวิจัยนี้ทำการศึกษารูปแบบวิธีการลงคะแนนเสียงเลือกตั้งและวิธีการในการชดเชยให้ผู้มาใช้สิทธิลงคะแนนเลือกตั้งโดยรัฐของกลุ่มประเทศที่มีประชาธิปไตยระดับแนวหน้า เพื่อเปรียบเทียบข้อดี-ข้อเสีย ผลกระทบที่เกิดขึ้น ทั้งในแง่ปริมาณ เช่น... more

งานวิจัยนี้ทำการศึกษารูปแบบวิธีการลงคะแนนเสียงเลือกตั้งและวิธีการในการชดเชยให้ผู้มาใช้สิทธิลงคะแนนเลือกตั้งโดยรัฐของกลุ่มประเทศที่มีประชาธิปไตยระดับแนวหน้า เพื่อเปรียบเทียบข้อดี-ข้อเสีย ผลกระทบที่เกิดขึ้น ทั้งในแง่ปริมาณ เช่น จำนวนผู้ออกมาใช้สิทธิ และเชิงคุณภาพ เช่น ระดับการพัฒนาประชาธิปไตยของประเทศโดยภาพรวม และบริบทที่เหมาะสมสำหรับการนำรูปแบบวิธีการลงคะแนนเสียงเลือกตั้งและมาตรการ ในการชดเชยให้ผู้มาใช้สิทธิลงคะแนนเลือกตั้งโดยรัฐแต่ละแนวทางไปใช้ ตลอดจนการทบทวนบทเรียนเกี่ยวกับรูปแบบ วิธีการ และมาตรการที่ประเทศไทยเคยใช้ เพื่อพิจารณาทางเลือกที่เป็นไปได้สำหรับการพัฒนาปรับปรุงรูปแบบวิธีการลงคะแนนเสียงเลือกตั้ง รวมถึงวิธีการที่เหมาะสมในการชดเชยให้ผู้มาใช้สิทธิลงคะแนนเลือกตั้งของประเทศไทย

With the local elections on 25 October 2015 Bulgarian citizens also decided on the introduction of remote electronic voting (“E-voting”). A vast majority of roughly 70 percent opted for the opportunity to cast their votes in future... more

With the local elections on 25 October 2015 Bulgarian citizens also decided on the introduction of remote electronic voting (“E-voting”). A vast majority of roughly 70 percent opted for the opportunity to cast their votes in future national elections and referenda via the Internet. However, the turnout was too low for a binding decision. Therefore, the parliament will have the final say on the subject matter. Bulgaria’s President Rosen Plevneliev originally also intended to ask the citizens to decide on a mixed election system and the introduction of compulsory voting. Yet, the parliament refused to submit these two issues to the citizens. Against the background of the long-lasting crisis of the Bulgarian democracy, the article analyzes the history and the results of the referendum and discusses the chances and risks of the original three reform proposals.

Artigo voto mecatrônico - Edição Revista Democrática

Elections form the cornerstone of our country which is the largest democracy in the world and as Abraham Lincoln has rightly said “A ballot is stronger than a bullet”, it is of utmost importance to protect the integrity of elections to... more

Elections form the cornerstone of our country which is the largest democracy in the world and as Abraham Lincoln has rightly said “A ballot is stronger than a bullet”, it is of utmost importance to protect the integrity of elections to make it a fair process of electing the representatives who hold the public office and run the country. The election process must be sufficiently robust to withstand any fraudulence and must be sufficiently transparent and comprehensible so that the voters and candidates can accept the results of an election without objections. In order to replace the less-reliable conventional ballot system, we propose voting system using electronic voting machines which make use of Biometry to verify the voter authentication by matching the voter fingerprint with the fingerprint already saved in the database. This will ensure that no bogus voting or any other fraud is entertained.

As part of a research project that aims to study the sociodemographic characteristics of people who perform Teleworking in Victoria de Durango, it was essential to locate people who are currently working as Teleworkers, and who are also... more

As part of a research project that aims to study the sociodemographic characteristics of people who perform Teleworking in Victoria de Durango, it was essential to locate people who are currently working as Teleworkers, and who are also residents of the city before mentioned, which is the objective of this work. A first attempt to locate this type of workers were carried out with conventional methods, but the result was not satisfactory, so, from the literary review, it was possible to identify that, this group of people have hidden sample characteristics, and therefore the appropriate tool was the so-called on-line virtual sampling as a method of locating called participants. For this purpose the social network Facebook was used as a methodological tool called Virtual Snowball, applying some pilot tests and two open campaigns restricted just for the geographic location of the before mentioned city, resulting in a group of more than 13.000 people who answered and 23 localized teleworkers, with which it was possible to establish a numerical factor that helped to calculate an approximate universe of teleworkers in the City of Durango, this information being useful for the subsequent phases of the integral study.

Security of electronic transaction over insecure communication channel is a challenging task that includes many critical areas as secure communication channel, strong data encryption technique and trusted third party to maintain the... more

Security of electronic transaction over insecure communication channel is a challenging task that includes many critical areas as secure communication channel, strong data encryption technique and trusted third party to maintain the electronic database. The conventional methods of encryption in Secure Electronic Transaction can only maintain the data security. The confidential information of customer could be accessed by the unauthorized user for malicious purpose. Therefore, it is necessary to apply effective encryption methods to enhance data security as well as authentication of data communication. The multiple encryption technique provides sufficient security for electronic transactions over wireless network. In this research paper, the needs of multiple encryption technique in Secure Electronic Transaction are proposed to enhance the security of confidential data. This technique increases the data security in such a manner that unauthorized user can not access any part of information over wireless network as internet.

This study was commissioned and supervised by the European Parliament’s Department for Citizens’ Rights and Constitutional Affairs at the request of the AFCO Committee. It addresses the potentials and challenges of the implementation of... more

This study was commissioned and supervised by the European Parliament’s Department for Citizens’ Rights and Constitutional Affairs at the request of the AFCO Committee. It addresses the potentials and challenges of the implementation of Internet voting in European Parliament elections. It considers the social, political, legal, and technological implications of its introduction as an alternative to on-paper ballot and builds on the recent experience of previous trials and successful e-enabled elections to issue technical recommendations regarding Internet voting in the European Union.

General population survey results report on internet voting in Switzerland, 2016

This paper describes an on-line e-voting system security implementation to reduce attacks with the help of time stamping and hash function. E-voting is electronically voting process via Internet, it gaining popularity in applications that... more

This paper describes an on-line e-voting system security implementation to reduce attacks with the help of time stamping and hash function. E-voting is electronically voting process via Internet, it gaining popularity in applications that require high security. The system represents security analysis against large-scale attacks performed by rationally thinking attackers. Electronic Voting promises a lot of advantages; it is not only fast and very convenient to use, but it also features additional security properties that cannot be achieved with traditional voting, such as individual or universal verifiability. However, due to the sensitive and critical nature of voting protocols, it is crucial to formally guarantee their correctness with respect to certain intended security properties. We develop a model for describing the real life environment where voting takes place and analyze the behavior of rational adversaries. The system also eliminates the voting process of non-eligible vot...

This paper describes an on-line e-voting system security implementation to reduce attacks with the help of time stamping and hash function. E-voting is electronically voting process via Internet, it gaining popularity in applications that... more

This paper describes an on-line e-voting system security implementation to reduce attacks with the help of time stamping and hash function. E-voting is electronically voting process via Internet, it gaining popularity in applications that require high security. The system represents security analysis against large-scale attacks performed by rationally thinking attackers. Electronic Voting promises a lot of advantages; it is not only fast and very convenient to use, but it also features additional security properties that cannot be achieved with traditional voting, such as individual or universal verifiability. However, due to the sensitive and critical nature of voting protocols, it is crucial to formally guarantee their correctness with respect to certain intended security properties. We develop a model for describing the real life environment where voting takes place and analyze the behavior of rational adversaries. The system also eliminates the voting process of non-eligible vot...

"Why We Can't Have Nice Things" explores the feasibility of using internet or online voting processes in U.S. national elections. For many years, the consensus has been that online voting could never be trusted for elections due the... more

"Why We Can't Have Nice Things" explores the feasibility of using internet or online voting processes in U.S. national elections. For many years, the consensus has been that online voting could never be trusted for elections due the perception of the vulnerability of online transactions to hacking, fraud, theft, and other harmful acts. However, just as technological advances has increased the availability and use of internet based survey and voting methods, also as technology advanced with ways to secure those transactions and activities. According to some, the idea of highly vulnerable online elections is a myth to prevent allowing more Americans to participate in national elections. For others, any risk of tampering is too great to accept, for online or in person voting.

The shift to direct recording electronic machines that has been fueled by the Help America Vote Act of 2002 has raised some important concerns. Some question the security of the machines and the possibility of a manufacturer's political... more

The shift to direct recording electronic machines that has been fueled by the Help America Vote Act of 2002 has raised some important concerns. Some question the security of the machines and the possibility of a manufacturer's political agenda affecting device integrity. Others are concerned with a lack of a paper trail in some jurisdictions for verification purposes during an electoral dispute. After an exploration of the evolution of voting machine technology and the pros and cons of electronic voting machines, the authors offer a system of checks and balances, using both a printed ticket — including a barcode for checksum verification — in combination with peripheral devices that can monitor a voting machine electronically, independent of the voting machine itself.

This paper describes an on-line e-voting system security implementation to reduce attacks with the help of time stamping and hash function. E-voting is electronically voting process via Internet, it gaining popularity in applications that... more

This paper describes an on-line e-voting system security implementation to reduce attacks with the help of time stamping and hash function. E-voting is electronically voting process via Internet, it gaining popularity in applications that require high security. The system represents security analysis against large-scale attacks performed by rationally thinking attackers. Electronic Voting promises a lot of advantages; it is not only fast and very convenient to use, but it also features additional security properties that cannot be achieved with traditional voting, such as individual or universal verifiability. However, due to the sensitive and critical nature of voting protocols, it is crucial to formally guarantee their correctness with respect to certain intended security properties. We develop a model for describing the real life environment where voting takes place and analyze the behavior of rational adversaries. The system also eliminates the voting process of non-eligible vot...