Cart (Loading....) | Create Account
Close category search window
 

Realities of E-voting Security

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

The purchase and pricing options are temporarily unavailable. Please try again later.
2 Author(s)
Shamos, Michael ; Carnegie Mellon University ; Yasinsac, Alec

There has been substantial debate about e-voting security in the past 10 years. As a result, e-voting has evolved away from lever machines and punched cards, through touchscreen voting machines, to a voter-verifiable paper audit trail phase, and voter-marked paper ballots paired with optical scan tabulators. Still, the debate over e-voting security continues. The guest editors introduce the articles in this special issue, which cover technology aimed at both improving election integrity and providing confidence through postelection audits. These articles advance the e-voting security debate and will contribute to long-term election integrity.

Published in:

Security & Privacy, IEEE  (Volume:10 ,  Issue: 5 )

Date of Publication:

Sept.-Oct. 2012

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.