The Security and the Credibility Challenges in e-Voting Systems
| dc.contributor.author | Ahmed Rana | |
| dc.contributor.author | Ibrahim Zincir | |
| dc.contributor.author | Samsun Basarici | |
| dc.contributor.author | Basarici, Samsun | |
| dc.contributor.author | Rana, Ahmed | |
| dc.contributor.author | Zincir, Ibrahim | |
| dc.contributor.editor | N Abouzakhar | |
| dc.coverage.spatial | Univ Hertfordshire Hatfield ENGLAND | |
| dc.date.accessioned | 2025-10-06T16:19:24Z | |
| dc.date.issued | 2015 | |
| dc.description.abstract | E-voting is one of the most emerging social innovations of the 21st century which is being adopted by many countries since it represents the peak of e-government solutions and also enables an easier way to vote for their citizens and expatriates. In addition e-voting systems will not only increase the amount of voters' participation but also will decrease the total cost of electoral process. The main concern with the e-voting system is security. Unlike any other offence it is first difficult to observe ambiguities in voting and also it is much more difficult to locate the lost or to detect the rigged votes. Challenges such as how to authenticate the voter how to securely cast his/her vote and then how to store and to count these votes without outside influence generate whole scrutiny over the e-voting systems. This paper first discusses these challenges and then proposes a unique approach to ensure public confidence and credibility over the electoral systems. This proposal inherits 2 independent modules, first module to verify authentication by implementing an e-government application and smartphone to identify a registered voter. After the completion of successful validation the second module that provides anonymity to the voter similar to TOR (The Onion Router) will be activated to cast the e-ballot. | |
| dc.identifier.isbn | 978-1-910810-29-3 | |
| dc.identifier.isbn | 9781910810293 | |
| dc.identifier.isbn | 9781910810286 | |
| dc.identifier.issn | 2048-8602 | |
| dc.identifier.scopus | 2-s2.0-84940738315 | |
| dc.identifier.uri | https://gcris.yasar.edu.tr/handle/123456789/5798 | |
| dc.language.iso | English | |
| dc.publisher | ACAD CONFERENCES LTD | |
| dc.relation.ispartof | 14th European Conference on Cyber Warfare and Security (ECCWS) | |
| dc.rights | info:eu-repo/semantics/closedAccess | |
| dc.source | PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015) | |
| dc.subject | e-voting, security, cyber security | |
| dc.subject | Cyber Security | |
| dc.subject | E-voting | |
| dc.subject | Security | |
| dc.title | The Security and the Credibility Challenges in e-Voting Systems | |
| dc.type | Conference Object | |
| dspace.entity.type | Publication | |
| gdc.author.scopusid | 55575855800 | |
| gdc.author.scopusid | 56134976500 | |
| gdc.author.scopusid | 21933854900 | |
| gdc.coar.type | text::conference output | |
| gdc.description.department | ||
| gdc.description.departmenttemp | [Rana, Ahmed; Basarici, Samsun] Yasar Univ, Comp Technol Dept, Izmir, Turkey; [Zincir, Ibrahim] Yasar Univ, Comp Engn Dept, Izmir, Turkey | |
| gdc.description.endpage | 232 | |
| gdc.description.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | |
| gdc.description.startpage | 229 | |
| gdc.description.volume | 2015-January | |
| gdc.description.woscitationindex | Conference Proceedings Citation Index - Science | |
| gdc.identifier.wos | WOS:000361690600028 | |
| gdc.index.type | WoS | |
| gdc.index.type | Scopus | |
| gdc.scopus.citedcount | 5 | |
| gdc.virtual.author | Rana, Tohid Ahmed | |
| gdc.wos.citedcount | 5 | |
| oaire.citation.endPage | 232 | |
| oaire.citation.startPage | 229 | |
| relation.isAuthorOfPublication | 0f026070-ed69-4373-aa22-ce6a8e781b31 | |
| relation.isAuthorOfPublication.latestForDiscovery | 0f026070-ed69-4373-aa22-ce6a8e781b31 | |
| relation.isOrgUnitOfPublication | ac5ddece-c76d-476d-ab30-e4d3029dee37 | |
| relation.isOrgUnitOfPublication.latestForDiscovery | ac5ddece-c76d-476d-ab30-e4d3029dee37 |
