2006
DOI: 10.1016/j.cose.2005.11.003
|View full text |Cite
|
Sign up to set email alerts
|

A framework and taxonomy for comparison of electronic voting schemes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
63
0
3

Year Published

2013
2013
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 74 publications
(66 citation statements)
references
References 44 publications
0
63
0
3
Order By: Relevance
“…In recent years, there have been few in-depth studies of developments in voting literature. Three notable exceptions are the studies by Sampigethaya et al [SP05], by Smith [Smi05b], and by Cha et al [CA12]. Smith's study focuses on the cryptographic blocks used to achieve privacy and verifiability.…”
Section: Evolution Of Privacy and Verifiability Requirements In Votinmentioning
confidence: 97%
“…In recent years, there have been few in-depth studies of developments in voting literature. Three notable exceptions are the studies by Sampigethaya et al [SP05], by Smith [Smi05b], and by Cha et al [CA12]. Smith's study focuses on the cryptographic blocks used to achieve privacy and verifiability.…”
Section: Evolution Of Privacy and Verifiability Requirements In Votinmentioning
confidence: 97%
“…Los requerimientos generales de seguridad que deben cumplir los esquemas de votación electrónica son (Sampigethaya & Poovendran, 2006) (Tubella i Casadevall & Vilaseca i Requena, 2005):…”
Section: Requerimientos De Seguridad De Los Sistemas De Votación Elecunclassified
“…Cryptographic techniques are needed for implementing such verifiable, secret ballot elections. Only cryptographic voting scheme [6] can achieve both verifiability and ballot secrecy at the same time.…”
Section: Need For Cryptographic Votingmentioning
confidence: 99%