2021 IEEE 25th International Enterprise Distributed Object Computing Workshop (EDOCW) 2021
DOI: 10.1109/edocw52865.2021.00030
|View full text |Cite
|
Sign up to set email alerts
|

Security Principles and Challenges in Electronic Voting

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…The consequent step is to filter the points to the ones between −30 and +160 degrees. Equation (5) returns the degree between the first point of the defect area and the center of the contour, and Equation ( 6) calculates the Euclidean distance-the vector length-between the first and the middle points. The whole process from finding the hand contour to detecting the palm hand and fingertips is illustrated in Figure 5.…”
Section: The Proposed Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The consequent step is to filter the points to the ones between −30 and +160 degrees. Equation (5) returns the degree between the first point of the defect area and the center of the contour, and Equation ( 6) calculates the Euclidean distance-the vector length-between the first and the middle points. The whole process from finding the hand contour to detecting the palm hand and fingertips is illustrated in Figure 5.…”
Section: The Proposed Methodsmentioning
confidence: 99%
“…Section 3 presents the abbreviations and As attempts for unauthorized access increase every day, the use of CAPTCHA is needed to prevent the bots from disrupting services such as subscription, registration, and account/password recovery, running attacks like spamming blogs, search engine attacks, dictionary attacks, email worms, and block scrapers. Online polling, survey systems, ticket bookings, and e-commerce platforms are the main targets of the bots [5].…”
Section: Introductionmentioning
confidence: 99%
“…Up-time is referred to the period of time that the system is actively working and accessible to users. Finally,the term "recoverability" refers to the ability of a system to recover its data in an acceptable time frame in the event of a breakdown [12].…”
Section: Availabilitymentioning
confidence: 99%
“…In[66], several types of attacks on blockchain such as hash-based attack, centralization attack, traffic attack, network level attack, injection attack, integrity attack, and private key leakage attack are discussed. It is necessary to mitigate such threats and prevent fraudulent use or disclosure of sensitive voter data without authorization[67,68].3.Scalability: As the number of participants and transactions increases, it becomes crucial to maintain high performance and throughput. The inherent characteristics of blockchain, such as the need for consensus among distributed nodes and the necessity of storing every transaction on the blockchain, present scalability challenges.…”
mentioning
confidence: 99%