2020
DOI: 10.1007/978-981-15-5558-9_19
|View full text |Cite
|
Sign up to set email alerts
|

Secure I-Voting System with Modified Voting and Verification Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…The first one is the development of the Estonian system, which does not use Blockchain technology, and the second one is the systems based on Blockchain technology. In [2], attacks on the Estonian system were analyzed, where it was revealed that an attacker can re-vote using fake software, and a more secure voting protocol was proposed. In [3], in order to strengthen the confidence of voters, it is proposed to conduct cyber risk checks by knowledgeable users.…”
Section: Methodsmentioning
confidence: 99%
“…The first one is the development of the Estonian system, which does not use Blockchain technology, and the second one is the systems based on Blockchain technology. In [2], attacks on the Estonian system were analyzed, where it was revealed that an attacker can re-vote using fake software, and a more secure voting protocol was proposed. In [3], in order to strengthen the confidence of voters, it is proposed to conduct cyber risk checks by knowledgeable users.…”
Section: Methodsmentioning
confidence: 99%
“…Paper [4] analyzes the main client attacks on the Estonian voting system. A trespasser was found to be able to re-vote using fake software.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%