Computer Science – Computers and Society
Scientific paper
2009-08-07
XXI IPSA World Congress of Political Science, RC10 Electronic Democracy - Dilemmas of Change?, Santiago : Chile (2009)
Computer Science
Computers and Society
15 pages
Scientific paper
This article analyses three methods of remote voting in an uncontrolled environment: postal voting, internet voting and hybrid voting. It breaks down the voting process into different stages and compares their vulnerabilities considering criteria that must be respected in any democratic vote: confidentiality, anonymity, transparency, vote unicity and authenticity. Whether for safety or reliability, each vulnerability is quantified by three parameters: size, visibility and difficulty to achieve. The study concludes that the automatisation of treatments combined with the dematerialisation of the objects used during an election tends to substitute visible vulnerabilities of a lesser magnitude by invisible and widespread vulnerabilities.
Enguehard Chantal
Lehn Rémi
No associations
LandOfFree
Vulnerability analysis of three remote voting methods does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Vulnerability analysis of three remote voting methods, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Vulnerability analysis of three remote voting methods will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-153270