Vulnerability analysis of three remote voting methods - Computer Science > Computers and SocietyReportar como inadecuado




Vulnerability analysis of three remote voting methods - Computer Science > Computers and Society - Descarga este documento en PDF. Documentación en PDF para descargar gratis. Disponible también para leer online.

Abstract: This article analyses three methods of remote voting in an uncontrolledenvironment: postal voting, internet voting and hybrid voting. It breaks downthe voting process into different stages and compares their vulnerabilitiesconsidering criteria that must be respected in any democratic vote:confidentiality, anonymity, transparency, vote unicity and authenticity.Whether for safety or reliability, each vulnerability is quantified by threeparameters: size, visibility and difficulty to achieve. The study concludesthat the automatisation of treatments combined with the dematerialisation ofthe objects used during an election tends to substitute visible vulnerabilitiesof a lesser magnitude by invisible and widespread vulnerabilities.



Autor: Chantal Enguehard LINA, Rémi Lehn LINA

Fuente: https://arxiv.org/



DESCARGAR PDF




Documentos relacionados