Autor: |
Aditya, Riza, Boyd, Colin, Dawson, Ed, Viswanathan, Kapali |
Zdroj: |
Electronic Government; 2003, p246-249, 4p |
Abstrakt: |
Electronic voting (e-voting) systems can greatly enhance the efficiency, and potentially, the transparency of national elections. However, the security of such systems is an area of on-going research. The literature for secure e-voting is predominantly concerned with 1-out-of-m voting strategies, where m is the number of candidates running for the elections. This paper presents a case study of cryptologic protocols for secure e-voting systems that use preferential voting strategies. [ABSTRACT FROM AUTHOR] |
Databáze: |
Supplemental Index |
Externí odkaz: |
|