Vulnerability analysis of three remote voting methods

Computer Science – Computers and Society

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

15 pages

Scientific paper

This article analyses three methods of remote voting in an uncontrolled environment: postal voting, internet voting and hybrid voting. It breaks down the voting process into different stages and compares their vulnerabilities considering criteria that must be respected in any democratic vote: confidentiality, anonymity, transparency, vote unicity and authenticity. Whether for safety or reliability, each vulnerability is quantified by three parameters: size, visibility and difficulty to achieve. The study concludes that the automatisation of treatments combined with the dematerialisation of the objects used during an election tends to substitute visible vulnerabilities of a lesser magnitude by invisible and widespread vulnerabilities.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Vulnerability analysis of three remote voting methods does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Vulnerability analysis of three remote voting methods, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Vulnerability analysis of three remote voting methods will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-153270

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.