Academic literature on the topic 'Voting scheme'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Voting scheme.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Voting scheme"

1

Khan, Kashif Mehboob, Junaid Arshad, and Muhammad Mubashir Khan. "Secure Digital Voting System Based on Blockchain Technology." International Journal of Electronic Government Research 14, no. 1 (January 2018): 53–62. http://dx.doi.org/10.4018/ijegr.2018010103.

Full text
Abstract:
Electronic voting or e-voting has been used in varying forms since 1970s with fundamental benefits over paper-based systems such as increased efficiency and reduced errors. However, challenges remain to the achieving of wide spread adoption of such systems, especially with respect to improving their resilience against potential faults. Blockchain is a disruptive technology of the current era and promises to improve the overall resilience of e-voting systems. This article presents an effort to leverage benefits of blockchain such as cryptographic foundations and transparency to achieve an effective scheme for e-voting. The proposed scheme conforms to the fundamental requirements for e-voting schemes and achieves end-to-end verifiability. The article presents details of the proposed e-voting scheme along with its implementation using Multichain platform. The article also presents an in-depth evaluation of the scheme which successfully demonstrates its effectiveness to achieve an end-to-end verifiable e-voting scheme.
APA, Harvard, Vancouver, ISO, and other styles
2

Vaibhav Sinha and Sachin Garg. "Online Voting System - Powered by Blockchain." January 2021 7, no. 01 (January 4, 2021): 73–76. http://dx.doi.org/10.46501/ijmtst070116.

Full text
Abstract:
Electronic voting or e-voting has been used in varying forms since the 1970s with fundamental benefits over paper based systems such as increased efficiency and reduced errors. However, there remain challenges to achieve widespread adoption of such systems especially with respect to improving their resilience against potential faults. Blockchain is a disruptive technology of the current era and promises to improve the overall resilience of e-voting systems. This paper presents an effort to leverage benefits of blockchain such as cryptographic foundations and transparency to achieve an effective scheme for e voting. The proposed scheme conforms to the fundamental requirements for e-voting schemes and achieves end-to-end verifiability. The paper presents details of the proposed e-voting scheme along with its implementation using the Multichain platform. The paper presents in-depth evaluation of the scheme which successfully demonstrates its effectiveness to achieve an end-to-end verifiable e-voting scheme.
APA, Harvard, Vancouver, ISO, and other styles
3

LI, Yan-Jiang. "An Electronic Voting Scheme." Journal of Software 16, no. 10 (2005): 1805. http://dx.doi.org/10.1360/jos161805.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

ISHIDA, N. "Efficient Divisible Voting Scheme." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E88-A, no. 1 (January 1, 2005): 230–38. http://dx.doi.org/10.1093/ietfec/e88-a.1.230.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Salman, W. "Analysis of Homomorphic Cryptosystems of Benaloh and Paillier for the Construction of an Electronic Voting System." Proceedings of Telecommunication Universities 7, no. 2 (June 30, 2021): 102–9. http://dx.doi.org/10.31854/1813-324x-2021-7-2-102-109.

Full text
Abstract:
The analysis of the performance of two cryptographic algorithms (Paillier and Benaloh), in order to apply them in the construction of electronic voting systems is carried out. A description of each system and their homomorphic properties is given. Electronic voting systems based on these schemes are described. The requirements for the voting system are formulated and a comparative analysis of the voting systems based on the schemes of Paillier and Benaloh is carried out. The analysis showed that the Paillier scheme is the best and simplest method for building secure electronic voting systems, while the Benaloh scheme is more complex and computationally more time-consuming.
APA, Harvard, Vancouver, ISO, and other styles
6

Zou, Xiu Bin, Yong Quan Cui, and Cai Fu. "An Hierarchical Electronic Voting Scheme." Advanced Materials Research 452-453 (January 2012): 883–87. http://dx.doi.org/10.4028/www.scientific.net/amr.452-453.883.

Full text
Abstract:
The author presents a hierarchical electronic voting shceme for numerous voters. In the scheme,The administrator can separate those voters into a number of districts and designate a administrator and ballot inspector to manage voting and check ballot in every district, respectively. The districts are not divided into some smaller ones until those districts are moderate in size. The hierarchical electronic voting scheme works efficiently and meets the requirement for general electronic voting scheme.
APA, Harvard, Vancouver, ISO, and other styles
7

Rawat, Ram Murti, Tarun Kumar Gupta, Mohammad Sajid, Shiv Prakash, Dinesh Prasad Sahu, Sohan Kumar Yadav, and Chanchal Kumar. "An Improved Fuzzy Voting Scheme for Fault Tolerant Systems." International Journal of Applied Evolutionary Computation 6, no. 2 (April 2015): 41–49. http://dx.doi.org/10.4018/ijaec.2015040103.

Full text
Abstract:
Voting is a widely used fault masking techniques for safety-critical systems to enhance the overall reliability of the system. Researchers over the period have proposed numerous advanced techniques in order to improve on the drawback of the existing methods. In this paper a fuzzy voting scheme has been survey and a generalized improved fuzzy voting scheme has been proposed. A comparative study of these schemes has also been carried out. It is found that proposed model is better than existing models. Single objective, multi-objective objective and many objective will be applied in future.
APA, Harvard, Vancouver, ISO, and other styles
8

DIMITRIADOU, EVGENIA, ANDREAS WEINGESSEL, and KURT HORNIK. "A COMBINATION SCHEME FOR FUZZY CLUSTERING." International Journal of Pattern Recognition and Artificial Intelligence 16, no. 07 (November 2002): 901–12. http://dx.doi.org/10.1142/s0218001402002052.

Full text
Abstract:
In this paper we present a voting scheme for fuzzy cluster algorithms. This voting method allows us to combine several runs of cluster algorithms resulting in a common partition. This helps us to tackle the problem of choosing the appropriate clustering method for a data set where we have no a priori information about it. We mathematically derive the algorithm from theoretical considerations. Experiments show that the voting algorithm finds structurally stable results. Several cluster validity indexes show the improvement of the voting result in comparison to simple fuzzy voting.
APA, Harvard, Vancouver, ISO, and other styles
9

Hajdu, Andras, Lajos Hajdu, Agnes Jonas, Laszlo Kovacs, and Henrietta Toman. "Generalizing the Majority Voting Scheme to Spatially Constrained Voting." IEEE Transactions on Image Processing 22, no. 11 (November 2013): 4182–94. http://dx.doi.org/10.1109/tip.2013.2271116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

HUANG, Hong-sheng, Hong ZHONG, Fei-fei YAN, and Yan-fei SUN. "Coercion-resistant electronic voting scheme." Journal of Computer Applications 29, no. 6 (August 5, 2009): 1725–27. http://dx.doi.org/10.3724/sp.j.1087.2009.01725.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Voting scheme"

1

Thomas, Michael Kyle. "Implementation of the Security-Dependability Adaptive Voting Scheme." Thesis, Virginia Tech, 2011. http://hdl.handle.net/10919/32542.

Full text
Abstract:
As the world moves further into the 21st century, the electricity demand worldwide continues to rapidly grow. The power systems that supply this growing demand continue to be pushed closer to their limits. When those limits are exceeded, system blackouts occur that have massive societal and economical impact. Power system protection relays make up a piece of these limits and can be important factors in preventing or causing a system blackout. The purpose of this thesis is to present a working implementation of an adaptive protection scheme known as the adaptive voting scheme, used to alter the security/dependability balance of protection schemes. It is argued that as power system conditions change, the ability of protection relays to adjust the security/dependability balance based on those conditions can allow relays to play a part in preventing power system catastrophes. It is shown that the adaptive voting scheme can be implemented on existing protection technology given Wide Area Measurements (WAMs) provided by Phasor Measurement Units (PMUs). The proposed implementation characteristics allow numerous existing protection practices to be used without changing the basic operation of the practices.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
2

Quint, Ryan David. "Practical Implementation of a Security-Dependability Adaptive Voting Scheme Using Decision Trees." Thesis, Virginia Tech, 2011. http://hdl.handle.net/10919/35667.

Full text
Abstract:
Todayâ s electric power system is operated under increasingly stressed conditions. As electrical demand increases, the existing grid is operated closer to its stable operating limits while maintaining high reliability of electric power delivery to its customers. Protective schemes are designed to account for pressures towards unstable operation, but there is always a tradeoff between security and dependability of this protection. Adaptive relaying schemes that can change or modify their operation based on prevailing system conditions are an example of a protective scheme increasing reliability of the power system. The purpose of this thesis is to validate and analyze implementation of the Security-Dependability Adaptive Voting Scheme. It is demonstrated that this scheme can be implemented with a select few Phasor Measurement Units (PMUs) reporting positive sequence currents to a Phasor Data Concentrator (PDC). At the PDC, the state of the power system is defined as Stressed or Safe and a set of relays either vote or perform normal operation, respectively. The Adaptive Voting Scheme was implemented using two configurations: hardware- and software-based PDC solutions. Each was shown to be functional, effective, and practical for implementation. Practicality was based on the latency of Wide Area Measurement (WAM) devices and the added latency of relay voting operation during Stressed conditions. Phasor Measurement Units (PMUs), Phasor Data Concentrators (PDCs), and relay operation delays were quantified to determine the benefits and limitations of WAMS protection and implementation of the voting scheme. It is proposed that the delays injected into the existing protection schemes would have minimal effect on the voting scheme but must be accounted for when implementing power system controls due to the real-time requirements of the data.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
3

Aditya, Riza. "Secure Electronic Voting with Flexible Ballot Structure." Queensland University of Technology, 2005. http://eprints.qut.edu.au/16156/.

Full text
Abstract:
Voting is a fundamental decision making instrument in any consensus-based society. It is employed in various applications from student body elections, reality television shows, shareholder meetings, to national elections. With the motivation of better eciency, scalability, speed, and lower cost, voting is currently shifting from paper-based to the use of electronic medium. This is while aiming to achieve better security, such that voting result reflects true opinions of the voters. Our research focuses on the study of cryptographic voting protocols accommodating a flexible ballot structure as a foundation for building a secure electronic voting system with acceptable voting results. In particular, we search for a solution suitable for the preferential voting system employed in the Australian Federal Election. The outcomes of the research include: improvements and applications of batch proof and verication theorems and techniques, a proposed alternative homomorphic encryption based voting scheme, a proposed Extended Binary Mixing Gate (EBMG) mix-network scheme, a new threshold randomisation technique to achieve receipt-freeness property in voting, and the application of cryptographic voting protocol for preferential voting. The threats and corresponding requirements for a secure secret-ballot voting scheme are rst discussed. There are significant security concerns about the conduct of electronic voting, and it is essential that the voting results re ect the true opinions of the voters - especially in political elections. We examine and extend batch processing proofs and verifications theorems and proposed applications of the theorems useful for voting. Many instances of similar operations can be processed in a single instance using a batch technique based on one of the batch theorems. As the proofs and verications provide formal assurances that the voting process is secure, batch processing offers great efficiency improvements while retaining the security required in a real-world implementation of the protocol. The two main approaches in cryptographic voting protocols, homomorphic encryption based voting and mix-network based voting, are both studied in this research. An alternative homomorphic voting scheme using multiplicative homomorphism property, and a number of novel mix-network schemes are proposed. It is shown that compared to the mix-network approach, homomorphic encryption schemes are not scalable for straight-forward adaptation of preferential systems. One important requirement of secret-ballot voting is receipt-freeness. A randomisation technique to achieve receipt-freeness in voting is examined and applied in an ecient and practical voting scheme employing an optimistic mix-network. A more general technique using threshold randomisation is also proposed. Combination of the primitives, both the homomorphic encryption and mixnetwork approach, yields a hybrid approach producing a secure and ecient secret-ballot voting scheme accommodating a exible ballot structure. The resulting solution oers a promising foundation for secure and practical secret-ballot electronic voting accommodating any type of counting system.
APA, Harvard, Vancouver, ISO, and other styles
4

Xia, Yifei, and 夏怡斐. "The effect of the presentation format of bonus scheme on investors' judements and voting decisions." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2014. http://hdl.handle.net/10722/202352.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kulyk, Oksana [Verfasser], Melanie [Akademischer Betreuer] Volkamer, and Marc [Akademischer Betreuer] Fischlin. "Extending the Helios Internet Voting Scheme Towards New Election Settings / Oksana Kulyk ; Melanie Volkamer, Marc Fischlin." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2017. http://d-nb.info/1132774705/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wondie, Binyam Lewoyehu. "Prospect of employing e-voting scheme in Ethiopia: understanding perception of the government and opposition political parties." Thesis, Örebro universitet, Handelshögskolan vid Örebro universitet, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-19440.

Full text
Abstract:
Abstract Over the years, the opposition parties argued that the existing election system in Ethiopia has many problems during the election process and the outcome of actual results and it is not a kind of election system they can trust.  Whereas the government officials claimed it was fair and free election system. The integrity of the election process is fundamental to the integrity of democracy itself. Hence, electronic voting (e-Voting) is a newly popular method to cast ballots of an election using electronic devices. This scheme is deployed highly as a main election system in some countries and still others are using a hybrid system. However, there are countries like Ethiopia which adopt the manual election scheme for several years till now. Therefore, the purpose of this study is to understand the perception of the government and opposition political parties towards the prospect of implementing e-voting scheme in the present context of Ethiopia.   Even though there are setbacks in implementing e-voting in the present political situation of Ethiopia. However, the benefits are deemed to be much useful. Therefore, it is in the hands of the public and the government to work in developing and adopting e-voting scheme in a way that is helpful for both stakeholders. This paper suggests the government and the oppositions should have a reasonable consensus and planned date for starting the campaign which gives the right for the people for free and fair election and the rise of new political arena.   Key words- e-voting, hybrid system, manual election scheme
APA, Harvard, Vancouver, ISO, and other styles
7

Smrž, Jan. "Skupinové digitální podpisy." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-220375.

Full text
Abstract:
Digital signatures are widespread in IT nowadays. In some cases there is emphasized the security of signer identity when signing an electronic message. For this type of signature group digital signatures are suitable. In this thesis basic cryptographic functions are presented which are used for group digital signatures. The principle of group signatures is explained, its advantages and nowadays use. Further are explained electronic election and it dis- and advantages. The practical part is a design and implementation of system suitable for electronic election allowing anonymity of voters using group digital signatures.
APA, Harvard, Vancouver, ISO, and other styles
8

McDonald, Mercedes Terre. "OCR: A STATISTICAL MODEL OF MULTI-ENGINE OCR SYSTEMS." Master's thesis, University of Central Florida, 2004. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4459.

Full text
Abstract:
This thesis is a benchmark performed on three commercial Optical Character Recognition (OCR) engines. The purpose of this benchmark is to characterize the performance of the OCR engines with emphasis on the correlation of errors between each engine. The benchmarks are performed for the evaluation of the effect of a multi-OCR system employing a voting scheme to increase overall recognition accuracy. This is desirable since currently OCR systems are still unable to recognize characters with 100% accuracy. The existing error rates of OCR engines pose a major problem for applications where a single error can possibly effect significant outcomes, such as in legal applications. The results obtained from this benchmark are the primary determining factor in the decision of implementing a voting scheme. The experiment performed displayed a very high accuracy rate for each of these commercial OCR engines. The average accuracy rate found for each engine was near 99.5% based on a less than 6,000 word document. While these error rates are very low, the goal is 100% accuracy in legal applications. Based on the work in this thesis, it has been determined that a simple voting scheme will help to improve the accuracy rate.
M.S.
Department of Electrical and Computer Engineering
Engineering and Computer Science
Electrical and Computer Engineering
APA, Harvard, Vancouver, ISO, and other styles
9

Stel, Johannes van der. "Strategy-proof voting schemes on Euclidean spaces." Maastricht : Maastricht : Universitaire Pers Maastricht ; University Library, Maastricht University [Host], 1993. http://arno.unimaas.nl/show.cgi?fid=5869.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yestekov, Yernat. "Design and Analysis of Novel Verifiable Voting Schemes." Thesis, University of North Texas, 2013. https://digital.library.unt.edu/ark:/67531/metadc407785/.

Full text
Abstract:
Free and fair elections are the basis for democracy, but conducting elections is not an easy task. Different groups of people are trying to influence the outcome of the election in their favor using the range of methods, from campaigning for a particular candidate to well-financed lobbying. Often the stakes are too high, and the methods are illegal. Two main properties of any voting scheme are the privacy of a voter’s choice and the integrity of the tally. Unfortunately, they are mutually exclusive. Integrity requires making elections transparent and auditable, but at the same time, we must preserve a voter’s privacy. It is always a trade-off between these two requirements. Current voting schemes favor privacy over auditability, and thus, they are vulnerable to voting fraud. I propose two novel voting systems that can achieve both privacy and verifiability. The first protocol is based on cryptographical primitives to ensure the integrity of the final tally and privacy of the voter. The second protocol is a simple paper-based voting scheme that achieves almost the same level of security without usage of cryptography.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Voting scheme"

1

Casella, Alessandra. A simple scheme to improve the efficiency of referenda. Cambridge, MA: National Bureau of Economic Research, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Arzheimer, Kai. Explaining Electoral Support for the Radical Right. Edited by Jens Rydgren. Oxford University Press, 2018. http://dx.doi.org/10.1093/oxfordhb/9780190274559.013.8.

Full text
Abstract:
The literature on the radical right’s electorate offers a plethora of potential explanations as to why people vote for the radical right. This chapter organizes the presumptive causes of right-wing voting along the lines of the familiar micro-meso-macro scheme, focusing both on a number of landmark studies and on some of the latest research. In doing so, it weighs the evidence in favor of and against some prominent hypotheses about the conditions for radical right party success, including the pure-protest hypothesis, the charismatic-leader hypothesis, and the silent-counterrevolution hypothesis. It also discusses the existing knowledge on the effects of a host of meso- and macro-level factors, and points out some directions for further research. The chapter concludes that radical right mobilization is now the rule rather than the exception, and that we should perhaps focus on understanding why it is not successful in some cases.
APA, Harvard, Vancouver, ISO, and other styles
3

Italy. Direzione centrale per i servizi elettorali. and Italy. Direzione generale dell'amministrazione civile., eds. Elezioni politiche, 21 aprile 1996: Elettori, votanti, voti non validi, schede bianche, voti validi e seggi. Roma: Istituto poligrafico e Zecca dello Stato, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Italy. Direzione centrale per i servizi elettorali., ed. Elezioni regionali: 23 aprile 1995 : elettori e votanti, voti non validi e schede bianche voti validi e seggi alle liste. [Roma]: Ministero dell'interno, Direzione centrale per i servizi elettorali, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kelleher, Richard. Old Money, New Methods. Edited by Christopher Gerrard and Alejandra Gutiérrez. Oxford University Press, 2018. http://dx.doi.org/10.1093/oxfordhb/9780198744719.013.23.

Full text
Abstract:
This chapter discusses the relationship between numismatics and archaeology in the later medieval period. It begins by tracing the beginning of the serious study of medieval coins in the eighteenth and nineteenth centuries and discusses the estranged relationship between the disciplines of archaeology and numismatics into the modern period. It demonstrates the vital role that coin hoards have played in the study of the monetary economy of medieval England and Wales and the growth of numismatics as a discipline. However, the emergence of single find evidence (principally metal-detector finds recorded with the Portable Antiquities Scheme) provides us with a new dataset that has the potential to rewrite what we can say about monetization, especially in rural contexts. Imported coins and those used as jewellery or as votive objects are discussed.
APA, Harvard, Vancouver, ISO, and other styles
6

Giles, Kate, and Aleksandra McClain. The Devotional Image in Late Medieval England. Edited by Christopher Gerrard and Alejandra Gutiérrez. Oxford University Press, 2018. http://dx.doi.org/10.1093/oxfordhb/9780198744719.013.28.

Full text
Abstract:
In the later Middle Ages, the parish churches of England were populated not simply by parishioners and clergy, but by a community of images: paintings on the walls, depictions in stained glass, and sculptures carved in wood, alabaster, or metal. Lit by beeswax and tallow candles and adorned with gifts of rosaries, textiles, and votive offerings, they held the gaze of worshippers, forming a series of devotional foci within the parish church. In England, most of these images have disappeared, swept away by the reforms and iconoclasm of the sixteenth and seventeenth centuries. They survive as references in contemporary written sources, in decorative schemes exposed during nineteenth-century restoration works, and in museum and art gallery collections. This chapter considers the evidence and assesses the archaeological contribution to current understandings of imagery in medieval religion and belief.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Voting scheme"

1

Ishida, Natsuki, Shin’ichiro Matsuo, and Wakaha Ogata. "Divisible Voting Scheme." In Lecture Notes in Computer Science, 137–50. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/10958513_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Okamoto, Tatsuaki. "An electronic voting scheme." In Advanced IT Tools, 21–30. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-0-387-34979-4_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Heiberg, Sven, Tarvi Martens, Priit Vinkel, and Jan Willemson. "Improving the Verifiability of the Estonian Internet Voting Scheme." In Electronic Voting, 92–107. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52240-1_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ghale, Milad K., Rajeev Goré, and Dirk Pattinson. "A Formally Verified Single Transferable Voting Scheme with Fractional Values." In Electronic Voting, 163–82. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68687-5_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Peng, Kun. "A Hybrid E-Voting Scheme." In Information Security Practice and Experience, 195–206. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-00843-6_18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Michels, Markus, and Patrick Horster. "Cryptanalysis of a voting scheme." In IFIP Advances in Information and Communication Technology, 53–59. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-0-387-35083-7_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ahmed, Taha Kh, and Mohamed Aborizka. "Secure Biometric E-Voting Scheme." In Communications in Computer and Information Science, 380–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-18129-0_60.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Based, Md Abdul, and Stig Fr Mjølsnes. "A Secure Internet Voting Scheme." In Algorithms and Architectures for Parallel Processing, 141–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-24669-2_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kaim, Guillaume, Sébastien Canard, Adeline Roux-Langlois, and Jacques Traoré. "Post-quantum Online Voting Scheme." In Lecture Notes in Computer Science, 290–305. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-662-63958-0_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Araújo, Roberto, and Jacques Traoré. "A Practical Coercion Resistant Voting Scheme Revisited." In E-Voting and Identify, 193–209. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39185-9_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Voting scheme"

1

Chen, Chien-Hsing, and Chung-Chian Hsu. "Boosted Voting Scheme on Classification." In 2008 Eighth International Conference on Intelligent Systems Design and Applications (ISDA). IEEE, 2008. http://dx.doi.org/10.1109/isda.2008.319.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Long-Hai, Cheng-Qiang Huang, and Shao-Feng Fu. "Pairing-Based Anonymous Boardroom Voting Scheme." In 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2014. http://dx.doi.org/10.1109/cyberc.2014.54.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ghavamipoor, Hoda, and Maryam Shahpasand. "An anonymous and efficient e-voting scheme." In 2013 7th International Conference on e-Commerce in Developing Countries: With Focus on e-Security. IEEE, 2013. http://dx.doi.org/10.1109/ecdc.2013.6556734.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Qiao, Yongquan, and Liang Chen. "An analysis on sub-regional voting scheme." In 2013 International Conference on Machine Learning and Cybernetics (ICMLC). IEEE, 2013. http://dx.doi.org/10.1109/icmlc.2013.6890447.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Alrodhan, Waleed A., Ali Alturbaq, and Saud Aldahlawi. "A mobile biometric-based e-voting scheme." In 2014 World Symposium on Computer Applications & Research (WSCAR). IEEE, 2014. http://dx.doi.org/10.1109/wscar.2014.6916802.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sundar, D. Sam, and Nitin Narayan. "A novel voting scheme using quantum cryptography." In 2014 IEEE Conference on Open Systems (ICOS). IEEE, 2014. http://dx.doi.org/10.1109/icos.2014.7042411.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Ke, Fabrizio Lombardi, and Jie Han. "An Approximate Voting Scheme for Reliable Computing." In Design, Automation and Test in Europe. New Jersey: IEEE Conference Publications, 2015. http://dx.doi.org/10.7873/date.2015.0024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ahmed, Farid, Mohammad A. Karim, and Fahmida Rahman. "Voting scheme nonlinearity-based binary composite filter." In Aerospace/Defense Sensing and Controls, edited by David P. Casasent and Tien-Hsin Chao. SPIE, 1996. http://dx.doi.org/10.1117/12.235641.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pu, Hongquan, Zhe Cui, Ting Liu, and Jintao Rao. "An Electronic Voting Scheme Based on FOO Protocol." In 2020 3rd International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE). IEEE, 2020. http://dx.doi.org/10.1109/aemcse50948.2020.00040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Li, Chun-Ta, Min-Shiang Hwang, and Yan-Chi Lai. "A Verifiable Electronic Voting Scheme over the Internet." In 2009 Sixth International Conference on Information Technology: New Generations. IEEE, 2009. http://dx.doi.org/10.1109/itng.2009.93.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography