Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

e-Voting System: Technologies and Implementations

by Madona Raichel, Anitha Sandeep
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 117 - Number 24
Year of Publication: 2015
Authors: Madona Raichel, Anitha Sandeep
10.5120/20700-3348

Madona Raichel, Anitha Sandeep . e-Voting System: Technologies and Implementations. International Journal of Computer Applications. 117, 24 ( May 2015), 4-7. DOI=10.5120/20700-3348

@article{ 10.5120/20700-3348,
author = { Madona Raichel, Anitha Sandeep },
title = { e-Voting System: Technologies and Implementations },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 117 },
number = { 24 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 4-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume117/number24/20700-3348/ },
doi = { 10.5120/20700-3348 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:00:15.470293+05:30
%A Madona Raichel
%A Anitha Sandeep
%T e-Voting System: Technologies and Implementations
%J International Journal of Computer Applications
%@ 0975-8887
%V 117
%N 24
%P 4-7
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The exponential headway in data and electronic correspondence has offered climb to new applications that were inconceivable only few years prior. One of the primary applications is in the region of voting. There exists an opportunity and inspiration to execute such an application with the reason for offering voters a plausibility of e voting at private or government race particularly for NRIs. The real playing point is significant diminishment in the expense and money of race process and significant impediment is stage similarity.

References
  1. Larry A. Dunning,and Ray Kresman, "Privacy Preserving Data Sharing With Anonymous ID Assignment" IEEE Transactions On Forensics And Security ,vol:8, no:2,pp 402-413 year 2013
  2. Caltech/MIT Voting Technology Project (VTP) Report "Voting – What is, What Could be,", July 2001
  3. J. W. Yoon and H. Kim, "A perfect collision-free pseudonym system," IEEE Commun. Lett. , vol. 15, no. 6, pp. 686–688, Jun. 2011.
  4. A. Friedman, R. Wolff, and A. Schuster, "Providing k-anonymity in data mining," VLDB Journal, vol. 17, no. 4, pp. 789–804, Jul. 2008.
  5. C. Clifton, M. Kantarcioglu, J. Vaidya, X. Lin, and M. Y. Zhu, "Tools for privacy preserving distributed data mining," ACM SIGKDD Explorations Newsletter, vol. 4, no. 2, pp. 28–34, Dec. 2002.
  6. R. Canetti, "Security and composition of multi-party cryptographic protocols," J. Cryptol. , vol. 13, no. 1, pp. 143–202, 2000.
  7. The Caltech-MIT Voting Technology Project "A Preliminary Assessment of the Reliability of Existing Voting Equipment ", March 30, 2001 (revised). Available at http://www. vote. caltech. edu/Reports/index. html)
  8. Lorrie Cranor's Voting Papers,. Lorrie Faith Cranor. http://lorrie. cranor. org/pubs/voting. html
  9. "A Better Ballot Box?" Rebecca Mercuri, IEEE Spectrum, Volume 39, Number 10, October 2002.
  10. Security Criteria for Electronic Voting,. Peter Neumann, presented at the 16th National Computer Security Conference Baltimore, Maryland, September 20-23, 1993. Available at http://www. csl. sri. com/users/neumann/ncs93. html
  11. Secret-Ballot Receipts and Transparent Integrity,. David Chaum, draft. Available at http://www. vreceipt. com/article. pdf
  12. Electronic Voting - Evaluating the Threat,. Michael Ian Shamos, CFP '93.
  13. Available at http://www. cpsr. org/conferences/cfp93/shamos. html
  14. Electronic Voting,. Rebecca Mercuri. http://www. notablesoftware. com/evote. html
Index Terms

Computer Science
Information Sciences

Keywords

e-voting privacy anonymous identity multiparty computation