SEARCH

SEARCH BY CITATION

REFERENCES

  • 1
    Cooke R, Anane R. A service-oriented architecture for robust e-voting. Service Oriented Computing and Applications 2012; 6: 249266.
  • 2
    Sampigethaya K, Poovendran R. A framework and taxonomy for comparison of electronic voting schemes. Computers & Security 2006; 25: 137153.
  • 3
    Nguyen T, Dang T. Enhanced security in Internet voting protocol using blind signature and dynamic ballots. Electronic Commerce Research 2013; 13: 116.
  • 4
    Baiardi F, Falleni A, Granchi R, Martinelli F, Petrocchi M, Vaccarelli A. SEAS, a secure e-voting protocol: design and implementation. Computers & Security 2005; 24: 642652.
  • 5
    Haenni R, Koenig RE. A generic approach to prevent board flooding attacks in coercion-resistant electronic voting schemes. Computers & Security 2013; 33: 5969.
  • 6
    Fujioka A, Okamoto T, Ohta K. A practical secret voting scheme for large scale elections. In Advances in Cryptology—AUSCRYPT '92. Vol. 718, Seberry J, Zheng Y (eds). Springer: Berlin Heidelberg, 1993; 244251.
  • 7
    Liaw HT. A secure electronic voting protocol for general elections. Computers & Security 2004; 23:107119.
  • 8
    Spycher O, Koenig R, Haenni R, Schläpfer M. A new approach towards coercion-resistant remote e-voting in linear time. In Financial Cryptography and Data Security, Vol. 7035, Danezis G (ed). Springer: Berlin Heidelberg, 2012; 182189.
  • 9
    Fan CI, Sun WZ. An efficient multi-receipt mechanism for uncoercible anonymous electronic voting. Mathematical and Computer Modelling 2008; 48: 16111627.
  • 10
    Mauw S, Verschuren J, De Vink E. Data anonymity in the FOO voting scheme. Electronic Notes in Theoretical Computer Science 2007; 168: 528.
  • 11
    Benaloh J, Tuinstra D. Receipt-free secret-ballot elections, presented at the Proceedings of the twenty-sixth annual ACM symposium on Theory of computing, Montreal, Quebec, Canada, 1994; 544553.
  • 12
    Chen X, Wu Q, Zhang F, et al. New receipt-free voting scheme using double-trapdoor commitment. Information Sciences 2011; 181:14931502.
  • 13
    Philip AA, Simon SA. A receipt-free multi-authority e-voting system. International Journal of Computer Applications 2011; 30:1523.
  • 14
    Guomin C, Chunhui W, Wei H, Xiaofeng C, Hyunrok L, Kwangjo K. A new receipt-free voting scheme based on linkable ring signature for designated verifiers, in Embedded Software and Systems Symposia, 2008. ICESS Symposia '08. International Conference on, 2008; 1823.
  • 15
    Chaum DL. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 1981; 24(2): 8490.
  • 16
    Furukawa J, Mori K, Sako K. An implementation of a mix-net based network voting scheme and its use in a private organization. In Towards Trustworthy Elections, David C, Markus J, Ronald LR, Peter AR, Josh B (eds). Springer-Verlag: Germany, Heidelberg, 2010; 141154.
  • 17
    Camenisch J, Lysyanskaya A, A formal treatment of onion routing. In In Advances in Cryptology—CRYPTO, Vol. 3621, Shoup V (ed). Springer: Berlin Heidelberg, 2005; 169187.
  • 18
    Cramer R, Gennaro R, Schoenmakers B. A secure and optimally efficient multi-authority election scheme. European transactions on telecommunications. In Advances in Cryptology—EUROCRYPT ’97, Vol. 1233, Fumy W (ed). Springer: Berlin Heidelberg, 1997; 103118.
  • 19
    Acquisti A. Receipt-free homomorphic elections and write-in voter verified ballots (ISRI Technical report CMU-ISRI-04-116), Carnegie Mellon University 2004.
  • 20
    Chaum D. Elections with unconditionally secret ballots and disruption equivalent to breaking RSA. Springer-Verlag, 1988; 177182.
  • 21
    Cetinkaya O, Doganaksoy A. A practical verifiable e-voting protocol for large scale elections over a network, presented at the Proceedings of the The Second International Conference on Availability, Reliability and Security, Ankara, Turkey, 2007.
  • 22
    Kremer S, Ryan M, Smyth B. Election verifiability in electronic voting protocols, Computer Security–ESORICS 2010, 2011; 389404.
  • 23
    Cranor LF, Cytron RK. Sensus: a security-conscious electronic polling system for the Internet, in System Sciences, 1997, Proceedings of the Thirtieth Hawaii International Conference on, 1997; 561570.
  • 24
    Herschberg MA. Secure electronic voting over the world wide web, Massachusetts Institute of Technology, M.Sc. thesis, 1997.
  • 25
    DuRette BW. Multiple administrators for electronic voting, Bachelor thesis, Massachusetts Institute of Technology, Boston, USA, 1999.
  • 26
    Joaquim R, Zúquete A, Ferreira P. REVS—a robust electronic voting system. IADIS International Journal of WWW/Internet 2003; 1: 4763.
  • 27
    Pasquinucci A. Web voting, security and cryptography. Computer Fraud & Security 2007; 2007: 58.
  • 28
    Adida B. Helios: Web-based open-audit voting, 2008; 335348.
  • 29
    Joaquim R, Ribeiro C, Ferreira P, VeryVote: a voter verifiable code voting system, presented at the Proceedings of the 2nd International Conference on E-Voting and Identity, Luxembourg, 2009; 106121.
  • 30
    Joaquim R, Ribeiro C, Ferreira P. Improving remote voting security with codevoting. In Towards Trustworthy Elections, David C, Markus J, Ronald LR, Peter AR, Josh B (eds). Springer-Verlag: Germany, Heidelberg, 2010; 310329.
  • 31
    Heiberg S, Lipmaa H, Van Laenen F, On e-vote integrity in the case of malicious voter computers, Computer Security–ESORICS 2010, 2011; 373388.
  • 32
    Zúquete A, Costa C, Romão M. An intrusion-tolerant e-voting client system, presented at the 1st Workshop on Recent Advances on Intrusion-Tolerant Systems (WRAITS 2007), Lisboa, Portugal, 2007.
  • 33
    FINREAD and specification. 2011-08-07. Available: http://www.cen.eu/cen/Sectors/Sectors/ISSS/CEN%20Workshop%20Agreements/Pages/FINREAD.aspx (Accessed 7 August 2011)
  • 34
    Chung-Huang Y, Shih-Yi T, Pei-Hua Y. Implementation of an electronic voting system with contactless IC cards for small-scale voting, in Information Assurance and Security, 2009. IAS '09. Fifth International Conference on, 2009; 122125.
  • 35
    Canard S, Sibert H. How to fit cryptographic e-voting into smart cards. Fundamenta Informaticae 2001; 21:10011012.
  • 36
    Chen Z. Java Card technology for smart cards: architecture and programmer's guide: Prentice Hall, 2000.
  • 37
    Kalajdzic K, Patel A, Golafshan L, Taghavi M. Design and implementation of a zero-knowledge authentication framework for Java Card. International Journal of Information Security, Vol. 6035, Gollmann D (eds). 2011; 5: 118.
  • 38
    Oracle. Application Programming notes, Java Card 3 Platform, Version 3.0.2, April 2010; p. 216.
  • 39
    W. P. SUN Microsystem Inc. The Java Card™ 3 platform, August 2008.
  • 40
    Allenbach P(Oracle). Classic functionality gets a connectivity boost, 2012-1-20. Available: http://www.oracle.com/technetwork/articles/javase/javacard3-142122.html (Accessed 20 January 2012)
  • 41
    Sterckx M, Gierlichs B, Preneel B, Verbauwhede I. Efficient implementation of anonymous credentials on Java Card Smart Cards, in Information Forensics and Security, 2009. WIFS 2009. First IEEE International Workshop on, 2009; 106110.
  • 42
    Barbu G, Thiebeauld H, Guerin V. Attacks on Java Card 3.0 combining fault and logical attacks. In Smart Card Research and Advanced Application, Vol. 6035 Gollmann D, Lanet J-L, Iguchi-Cartigny J (eds). Springer: Berlin, Heidelberg, 2010; 148163.
  • 43
    Hopkins B. (oracle), 2012-2-10. Deploying servlets on smart cards: portable Web servers with Java Card 3.0. Available: http://www.oracle.com/technetwork/articles/javase/javacard-servlets-136657.html (Accessed 10 February 2010)
  • 44
    Myers AC. JFlow: practical mostly-static information flow control, in Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, 1999; 228241.
  • 45
    Jif reference manual. 2012-01-07. Available: http://www.cs.cornell.edu/jif/doc/jif-3.3.0/manual.html (Accessed 7 January 2012)
  • 46
    Xu Y, Zhang Q. Design of objects sharing mechanism with security domain in Java Smart Card, in Electronic Computer Technology, 2009 International Conference on, 2009; 6468.
  • 47
    Lauer TW. The risk of e-voting. Electronic Journal of E-government 2004; 2:177186.
  • 48
    Joaquim R, Ferreira P, Ribeiro C. EVIV: an end-to-end verifiable Internet voting system. Computers & Security 2013; 32:170191.
  • 49
    Fuglerud K, Røssvoll T. An evaluation of Web-based voting usability and accessibility. Universal Access in the Information Society 2012; 11: 359373.
  • 50
    Cranor LF, Cytron RK. Sensus: a security-conscious electronic polling system for the Internet, presented at the Proceedings of the 30th Hawaii International Conference on System Sciences: Information System Track-Organizational Systems and Technology - Volume 3, 1997.
  • 51
    Based MA, Mjølsnes S. Security requirements for Internet voting systems. In Emerging Trends in Computing, Informatics, Systems Sciences, and Engineering, Vol. 151, Sobh T, Elleithy K (eds). Springer: New York, 2013; 519530.
  • 52
    Cetinkaya O, Doganaksoy A. A practical privacy preserving e-voting protocol using dynamicballots, presented at the In Proceedings of the 2nd national cryptology symposium, Ankara,Turkey, 2006.
  • 53
    Simons B, Jones DW. Internet voting in the U.S. Communications of the ACM 2012; 55: 6877.
  • 54
    Dini G. A secure and available electronic voting service for a large-scale distributed system. Future Generation Computer Systems 2003; 19: 6985.
  • 55
    Juels A, Catalano D, Jakobsson M, Coercion-resistant electronic elections, presented at the Proceedings of the 2005 ACM workshop on Privacy in the electronic society, Alexandria, VA, USA, 2005.