2019 International Conference on Intelligent Computing and Its Emerging Applications (ICEA) 2019
DOI: 10.1109/icea.2019.8858289
|View full text |Cite
|
Sign up to set email alerts
|

How to design the faultless bribery and coercion prevention electronic voting scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 22 publications
0
1
0
Order By: Relevance
“…According to the property of this system, it can protect the voters from trading their votes or compelling. Based on the proposal of Wu et al [2,41], they represented that the issues of bribery and coercion can be protected as long as the modus applied to perform bribery and coercion can make people comprehend clearly. As a result, the methods that applied to the system of bribe and coercion can be divided into five levels: Level-1: Receipt Checking Making the voters believe their vote is efficiently accepted and calculated, there are several e-voting systems offer the voting evidence and receipts to voters [3,4,5,[6][7][8][9][10][11].…”
Section: Introductionmentioning
confidence: 99%
“…According to the property of this system, it can protect the voters from trading their votes or compelling. Based on the proposal of Wu et al [2,41], they represented that the issues of bribery and coercion can be protected as long as the modus applied to perform bribery and coercion can make people comprehend clearly. As a result, the methods that applied to the system of bribe and coercion can be divided into five levels: Level-1: Receipt Checking Making the voters believe their vote is efficiently accepted and calculated, there are several e-voting systems offer the voting evidence and receipts to voters [3,4,5,[6][7][8][9][10][11].…”
Section: Introductionmentioning
confidence: 99%