2014 5th International Conference on Intelligent Systems, Modelling and Simulation 2014
DOI: 10.1109/isms.2014.98
|View full text |Cite
|
Sign up to set email alerts
|

Trusted3Ballot: Improving Security and Usability of Three Ballot Voting System Using Trusted Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…A system without a proper security mechanism has not only some usability but also security flaws. Therefore, the authors of Uzunay and Bicakci 16 proposed Trusted3Ballot, which is a trusted computing-based voting scheme with three ballots addressing the security and usability related problems. The system is very complex.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A system without a proper security mechanism has not only some usability but also security flaws. Therefore, the authors of Uzunay and Bicakci 16 proposed Trusted3Ballot, which is a trusted computing-based voting scheme with three ballots addressing the security and usability related problems. The system is very complex.…”
Section: Related Workmentioning
confidence: 99%
“…The authors of Uzunay and Bicakci 16 explain the ThreeBallot system, which is an E2E verifiable e-voting system in the absence of any security mechanism. A system without a proper security mechanism has not only some usability but also security flaws.…”
Section: Related Workmentioning
confidence: 99%
“…Finally, the system relies on the assumption that the ballots are all correctly filled and checked, which is dependent on the separate step of scanning and validating the ballots with a machine without storing them. This introduces a vulnerability coming from the use of potentially insecure hardware, and all the proposed solutions so far rely on external electronic remedies either through trusted hardware [47] or online services [40,28]. Contributions.…”
Section: Introductionmentioning
confidence: 99%