Dissertations / Theses on the topic 'Voting system'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Voting system.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Cornejo, Ramírez Mario Sergei. "An elastic electronic voting system." Tesis, Universidad de Chile, 2015. http://repositorio.uchile.cl/handle/2250/136271.
Full textEn los últimos años, organizaciones y movimientos sociales han aparecido demandando más participación en políticas públicas. En éstas organizaciones, los miembros demandan ser parte del proceso de toma de decisiones el cual generalmente se realiza mediante iniciativas de voto directo entre los miembros. Además utilizan Internet intensamente como la plataforma principal de comunicación y tienden a confundir sistemas de encuestas con herramientas de votación electrónica. Por otra parte, no es claro que software se debe utilizar, y la debilidad de la mayoría de éstos que tienen con respecto a la robustez (capacidad de computar bien el resultado) más que con la privacidad del voto, además de la facilidad de uso. Como una forma de mejorar la participación, nosotros proponemos un sistema de votación electrónica para ese segmento, que incluye organizaciones sociales, federaciones de estudiantes, colegios, sindicatos, sociedades profesionales, etc. El problema de votación electrónica ha sido ampliamente estudiado por criptógrafos, y hoy en día, existen varios protocolos para resolver problemas específicos a votación electrónica. Nosotros proponemos una solución que toma en consideración esas soluciones existentes combinadas con protocolos de sistemas distribuidos para introducir un sistema de votación electrónica remota elástica. El sistema utiliza la tecnología elastic computing de Amazon que permite escalar en términos de capacidad de computación y alta disponibilidad junto al anonimato de los votantes y la garantía que el voto fue correctamente contado. Concretamente, el sistema está pensado sobre cinco principios: i) Computación elástica, ii) Internet iii) Facilidad de uso, iv) Anonimato y computación verificable, v) Cliente liviano. El objetivo de esta tesis no es solamente resolver el problema abierto descrito anteriormente, sino también establecer una base sólida para plataformas de votación electrónicas a través de Internet. De este modo, nosotros creamos un nuevo sistema de votación electrónica en donde el votante no realiza ninguna computación grande, sino que la trasladamos al servidor, que idealmente está en una plataforma de Cloud Computing como Amazon Web Services. Esta técnica previene ataques de denegación de servicio, robo de identidad y accesos no autorizados, al mismo tiempo preserva la privacidad y la verificabilidad. La plataforma se probó en un caso real, concretamente en una experiencia de votación electrónica en donde los chilenos demandando su derecho a voto en el extranjero, pudieron votar en una elección simbólica. Se presenta la experiencia, los problemas y las soluciones que encontramos utilizando un sistema de identificación simple. Esta proyecto nos permitió estudiar de forma técnica, política y práctica aplicaciones de votación electrónica en América Latina.
Aggeborn, Linuz. "Voting System, Voter Turnout, Policy Outcome." Thesis, Uppsala universitet, Nationalekonomiska institutionen, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-156872.
Full textLiburd, Soyini (Soyini Denise) 1980. "An N-version electronic voting system." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/28441.
Full textIncludes bibliographical references (p. 103-109).
The ballot battles of the 2000 US Presidential Election clearly indicate that existing voting technologies and processes are not sufficient to guarantee that every eligible voter is granted their right to vote and implicitly to have that vote counted, as per the fifteenth, nineteenth, twenty fourth and twenty sixth amendments to the US constitution [1-3]. Developing a voting system that is secure, correct, reliable and trustworthy is a significant challenge to current technology [3, 4]. The Secure Architecture for Voting Electronically (SAVE) demonstrates that N-version programming increases the reliability and security of its systems, and can be used to increase the trustworthiness of systems. Further, SAVE demonstrates how a viable practical approach to voting can be created using N-version programming. SAVE represents a significant contribution to voting technology research because of its design, and also because it demonstrates the benefits of N-version programming and introduces these benefits to the field of voting technology.
by Soyini D. Liburd.
M.Eng.
Scorza, Andrea. "Implementazione di un Voting System su Blockchain." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/16716/.
Full textGong, XiangQi. "Ellection markup language (EML) based tele-voting system." Thesis, University of the Western Cape, 2009. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_5841_1350999620.
Full textvoting machines, voting via the Internet, telephone, SMS and digital interactive television. This thesis concerns voting by telephone, or televoting, it starts by giving a brief overview and evaluation of various models and technologies that are implemented within such systems. The aspects of televoting that have been investigated are technologies that provide a voice interface to the voter and conduct the voting process, namely the Election Markup Language (EML), Automated Speech Recognition (ASR) and Text-to-Speech (TTS).
Liu, Charles Z. "Performance optimization of a split-value voting system." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/100631.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 57-59).
As digital technology becomes more powerful and commonplace, the benefits of using computers to conduct elections become more apparent. In today's elections dominated by paper ballots, we cannot be certain that the election result is correct. Many parts of the world are plagued by corrupt election officials and rampant bribery. In this thesis, we review the cryptographic techniques available for designing a secure election system and introduce a system designed around a verifiable mixnet using split-value commitments. The main work done in this thesis is a series of performance optimizations to the existing prototype, greatly improving the real-world viability of the system. Finally, we suggest further work that can be done to improve performance, fault tolerance, and security. The code that accompanies this thesis may be found at https://github.com/ron-rivest/ split-value-voting.
by Charles Z. Liu.
M. Eng.
Yu, Hong. "Creating Public Trust in Electronic Voting Systems." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-224219.
Full textDet finns många positiva aspekter av elektroniska röstningssystem: säkerhet, verifierbarhet, bekvämlighet, resursbesparingar, och liknande. Emellertid så saknas det fortfarande hos allmänheten tillit till elektroniska röstningssystem. Ett av skälen till detta skulle kunna vara att idéerna i samband med elektronisk röstning är utmanande att förstå för allmänheten. I detta projekt har vi försökt att skapa allmän tillit med hjälp av ett förklaringssystem. Ett förklaringssystem tillverkades för att förklara hur ett modernt elektroniskt röstningssystem fungerar. Användartester utfördes därefter, för att verifiera huruvida detta förklaringssystem förmådde öka människors tillit till elektroniska röstningssystem. Efter analys av data insamlade genom användartesterna, fick vi lovande resultat som gav oss anledning att tro att detta slags förklaring kan användas för att skapa allmän tillit till elektroniska röstningssystem.
Pedroso, Marco Antonio L. "The implementation of a split-value verifiable voting system." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/100649.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 30-32).
This study provides a proof-of-concept of a newly designed verifiable voting system. The implementation elicits details in the communication and synchronization among servers, unavailable in the original design paper [M. O. Rabin and R. L. Rivest, "Efficient End to End Verifiable Electronic Voting Employing Split Value Representations." in Proc. EVOTE '14, Bregenz, Austria.]. The implemented system was tested on networks of virtual machines in a cluster, and its performance was evaluated based on the computational time and amount of data transferred. The preliminary results simulates elections with up to ten thousand votes. The team will conduct further work to implement the handling of server failures and the secure channels among the servers. This study demonstrates the feasibility of running large elections with more transparent voting systems, by leveraging the split-value representation and simple cryptographic primitives.
by Marco Antonio L. Pedroso.
M. Eng.
Alsubaiei, Nasser. "Enhancing the Voting System in Saudi Arabia Using Technology." Digital Commons at Loyola Marymount University and Loyola Law School, 2014. https://digitalcommons.lmu.edu/etd/366.
Full textGaffar, Afan. "Javanese Voters: A Case Study of Election Under a Hegemonic Party System." The Ohio State University, 1988. http://catalog.hathitrust.org/api/volumes/oclc/23627830.html.
Full textTypescript. eContent provider-neutral record in process. Description based on print version record. Includes bibliographical references (leaves 370-387).
Kark, Kristof. "A new uniform voting system for elections to the European Parliament?" Thesis, Cardiff University, 2013. http://orca.cf.ac.uk/48286/.
Full textAgafonov, Konstantin. "Elektroninių rinkimų įgyvendinimo galimybės: pasaulinė patirtis ir Lietuvos perspektyva." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2008. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2007~D_20080115_151850-53458.
Full textAround all over the world, at this moment, there is one main problem, while government organizations are organizing general elections or referendums. Problem is that citizens are very apathetic and their participation in elections and referendums are very low. Elections and referendums which are based on traditional election system, using paper ballots, are uncomfortable for a lot of citizens, which have election right, because it’s not very comfortable or possible to reach voting poll’s on an election day. In this case the participation of citizens is very low, because it’s not always possible to visit polling stations when the distance to it is quiet big or citizen have no time to vote. This problem is very urgent in Lithuania to. One of the easiest ways to increase participation of citizens in country political processes is creation of electronical voting systems which can be used to cast citizen vote remotely or not. Because of opinion that e-voting systems will be more convenient for the voters and this will increase voters turnout on elections and referendums, governments of some countries are trying to create and begin to use those systems on their countries general elections and referendums. This paper work is representing the standards and main aspects of creation of the e-voting systems and main threats to electronical voting systems. It discusses about system attack methods and people which are interested in e-voting systems compromising. Also it analyzes the... [to full text]
Culeac, Petru. "Contradictory electoral behavior and the post-Soviet party-system in Republic of Moldova." Laramie, Wyo. : University of Wyoming, 2007. http://proquest.umi.com/pqdweb?did=1404353611&sid=1&Fmt=2&clientId=18949&RQT=309&VName=PQD.
Full textKim, Myunghee. "System support and ideological congruence between voters and policy positions." Diss., Online access via UMI:, 2004. http://wwwlib.umi.com/cr/binghamton/main/.
Full textSlezák, David. "Bezdrátový hlasovací systém." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-236064.
Full textLee, Keum-Chang. "Design of an intrusion detection system based on a fuzzy classification and voting approach." Thesis, University of Manchester, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.506587.
Full textTuesta, Soldevilla Fernando. "A lethal voting: preferential vote and political parties in Peru." Politai, 2013. http://repositorio.pucp.edu.pe/index/handle/123456789/91536.
Full textEl artículo busca analizar el impacto que tiene y ha tenido el voto preferencial sobre los procesos electorales y el sistema de partidos, de manera particular en el caso peruano. Presenta en primera instancia, el tema del voto preferencial como elemento del sistema electoral, para continuar con su estudio en el caso particular de Perú en donde señala su origen, la mecánica que sigue, el impacto en el parlamento y su evaluación.
Albrecht, Pavel. "Bezdrátový hlasovací systém založený na IEEE 802.15.4/Zigbee." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2010. http://www.nusl.cz/ntk/nusl-237253.
Full textGyimah, Nana Afua Boamah, and Bertrand Asongwe Tita. "Electronic Voting; A Possible Solution for Sub-Saharan Africa? : A focus on the Ghanaian Electoral System." Thesis, Internationella Handelshögskolan, Högskolan i Jönköping, IHH, Informatik, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-12573.
Full textAseere, Ali. "A voting-based agent system to support personalised e-learning in a course selection scenario." Thesis, University of Southampton, 2012. https://eprints.soton.ac.uk/344399/.
Full textMagliano, Samuel A. "Information Management System for Electronic Voting in support of the Schieffelin Award for Excellence in Teaching." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA397138.
Full textThesis advisors: Dolk, Daniel R. ; Mar, Dennis R. "September 2001." Includes bibliographical references (p. 379-381). Also available online.
Masuku, Wiseman Khethokwakhe. "An exploratory study on the planning and design of a future e-voting system for South Africa." Thesis, University of the Western Cape, 2006. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_7837_1183351619.
Full textThis study focuses on the future role and nature of an e-voting system for a future electoral system in South Africa. The study is of the view that rapid technological advancement and opportunities may contribute to efficient and effective e-voting systems. The study will investigate the international experience where initiatives have been undertaken, particularly in countries like the USA, the Netherlands, India, and Nigeria. Lessons born out of experience have been identified to highlight best practice and potential problems to be avoided in our future elections. As an outcome, the study indirectly seeks ways to increase turnout, particularly amongst the youth, increase voting access (everywhere and anytime), cost effectiveness and availability of quick national election results.
The primary objective of this study has been to develop future options for the planning and design of an e-voting for South Africa. From the outset of this research, the critical issue was not only about e-voting, but rather the planning and designing of an e-voting system. Suffice it to say that the central issue about e-voting was not whether electronic voting should be developed but how and in what ways it should be designed and planned for successful implementation. Interestingly enough, this question has been bothering the IEC as well, particularly pertaining to planning (see 1.5.3). In a nutshell, it is against this background that experts on elections were interviewed. The research investigation found that many problems still existed in South African elections. This research found that both participation and communication are the main pillars in any policy or project.
The study revealed that e-voting would appeal to younger voters and will subsequently boost turnout in SA. In a nutshell, this study found that members of the public and election experts were in favor of telephone voting and SMS, Internet voting, and EVMs. However, it was noted that rural communities would benefit in the long run from e-voting because they are still faced with an infrastructure backlog. Proper planning supported by sound planning principles need to be done to ensure that a e-voting in SA will be made successful and specific recommendations were made in this regard.
Humphreys, Samuel H. "A comparison of Tennessee elected and appointed school superintendents on selected demographic and school system variables." Diss., Virginia Polytechnic Institute and State University, 1989. http://hdl.handle.net/10919/54197.
Full textEd. D.
Saleemi, Asmara. "Electoral System Effects On Anti-muslim Sentiments In Western Europe." Thesis, University of North Texas, 2011. https://digital.library.unt.edu/ark:/67531/metadc103386/.
Full textMiddents, Janelle. "UNDERSTANDING THE SPLIT-TICKET VOTER." Master's thesis, University of Central Florida, 2010. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3958.
Full textM.S.
Department of Political Science
Sciences
Political Science MA
Kaltoun, Jan. "Elektronické volby v podmínkách VŠE Praha a ČR." Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-81981.
Full textRapkin, Jonathan D. "Out with the Old? Voting Behavior and Party System Change in Canada and the United States in the 1990's." Thesis, University of North Texas, 1997. https://digital.library.unt.edu/ark:/67531/metadc278907/.
Full textŠkorpil, Jiří. "Online hlasovací systém." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2017. http://www.nusl.cz/ntk/nusl-363824.
Full textYungShianHsu and 徐永憲. "E-voting system." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/75693764265444614207.
Full text東海大學
數學系
95
In this thesis, we construction of our e-voting system. First, we discuss the security and verification of RSA, DSA, Blind signature, Shamir and Elliptic Curve Secret Sharing Algorithm. Finally, we try to use these technique to construct a security and fast e-voting system with keeping the privacy.
You, Jinrong, and 游謹榕. "Zero Invalid Ballot Voting System." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/61912415334938609407.
Full text東海大學
數學系
99
In the thesis, we propose a Zero Invalid Ballot Voting System. We gave some basic knowledge of number theory, including Euler Theorem, RSA digital signature, blind signature and secret sharing first; and use them to construct a Zero Invalid Ballot Voting System.
Sun, Wei-zhe, and 孫偉哲. "Uncoercible Anonymous Electronic Voting System." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/82512566952959598131.
Full text國立中山大學
資訊工程學系研究所
94
Due to convenience and efficiency, electronic voting (e-voting) techniques gradually replace traditional paper-based voting activities in some developed countries. A secure anonymous e-voting system has to satisfy many properties, such as completeness, tally correctness, and uncoercibility, where the uncoercibility property is the most difficult one to be achieved. Since each voter can obtain a voting receipt in an electronic voting system, coercion and bribe (vote-buying and vote-selling are included) become more and more serious in electronic voting environments than traditional paper-based voting environments. Unfortunately, most of the solutions, like receipt-freeness or untappable channels, proposed in the literature, are impractical owing to lack of efficiency or too complicated to be implemented. It will make uncoercible e-voting systems unacceptable by the people. In order to cope with the drawbacks of the previous schemes, this thesis will present a generic idea, which is independent of the underlying cryptographic components, on electronic voting to achieve the uncoercibility property and other requirements. The proposed method is an efficient and quite practical solution to match the current environments of electronic voting.
Yuan, Wang Te, and 王德源. "voting System and it's applications." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/41372118869621813405.
Full text國立中正大學
資訊工程研究所
89
Because of the popularity of Internet, net users increase more and more. With the Internet environment, it is more easy and convenient for people to do surveying or voting in the Internet. Information transfer in the internet is fast with no distance limited, and so many users like to use the internet, so the Internet is a good choice to hold the surveying or voting, and digital voting or digital survey is popular in the internet. In this thesis, we will describe an implement action of a voting system. Net users can hold a voting or surveying in World Wide Web. And with the convenient interface of WWW, people will hold voting or surveying in the Internet more easily. We will study several important issues for the voting system. And discuss how to check the legal voter, how to prevent vote more than once, and voters how to verify the ballot. We hope that it will be more useful and safe. We also apply the voting system in network examination. Using it, we can design a examination paper for the testing in distance education.
Liu, Tai-Wai, and 劉泰瑋. "Timestamp-based Secure Electronic Voting System." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/33625032943810980872.
Full text亞洲大學
資訊工程學系碩士班
100
Many countries even enterprises are trying to use electronic voting system because the issue of electronic voting has been discussed in recent years. A complete electronic voting system has some requirements as following. First, there is a perfect voting system to protect the privacy of voters during the voting. Second, the identification and voting content are not known by others. Third, the completeness, verifiability and equity of important essentials have to be maintained. During the electronic voting, the stability of voting system is an important element. The voting system cannot run because it’s not stable. The answers that members of parliament choose are not disclosed during deciding a policy because the purpose of the research is to protect the identification of member of legislative body by using the large-scale electronic voting system of all citizens to transfer to the small-scale legislative voting system. The complexity of several-times identification verification is concerned. The researcher develops the one-time verification of time token and largely decreases the severe loading of server in verification.
Tseng, Yao-Hsien, and 曾耀賢. "The Electronic Voting System for Few Candidates." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/57089724795530944713.
Full text義守大學
資訊工程學系
91
The concept of electronic voting has been proposed for many years and many of electronic voting schemes have been designed. These electronic voting schemes are based on homomophic encryption, mix-type or blind signatures. In these voting schemes, the intention of each voter is put in the message. The ballot contains the message and its corresponding signature. We can see the goal of the ballot from the message. In this thesis, we present another scheme to show the goal of the ballot. The intentions of voters depend on the choice of verification key. The ballot also contains a random message and its corresponding signature signed by the chosen key. Thus we can see the goal of the ballot by adaptive verification key. To satisfy the above function, we use a RSA oblivious blind signature technique instead of the blind signature schemes. Besides, our scheme is based on an anonymous channel. The proposed scheme not only can satisfy the requirements of secure election: eligibility, privacy, unreusability, completeness, soundness, fairness and verifiability but also can be used in real, large-scale election.
Wu, Ying-Shiuan, and 吳盈萱. "Java-based Uncoercibility System in Electronic Voting." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/56372701501903301677.
Full text淡江大學
資訊管理學系碩士班
98
Only when the possible coercing behaviors in the developmental electronic voting system can be solved, the system can become practical. We explore the evolution of voting system in this paper. The defect that the large resources are expending in the traditional voting system is the reason that evolves the mechanical voting system and the electronic- counted voting system. However, both systems count only at the tally stage. Farther more an electronic voting system was proposed to provide a state-of-the-art capability through the voting process. However, within this system the voters might be threatened to cast the candidate that the voters don’t want to support by the coercers. Thus, we propose a mechanism to free from the coercers in electronic voting. In the system, we use two pairs of PIN code, PW1 and PW2, to login our electronic voting system. The voter enter the PIN code, PW1, that is used in uncoerced condition to derive a couple of keys, (ei1 ,di1). If the voter has used this private key to sign his vote, the vote is the valid ballot. Whereas, the voter enter the PIN code, PW2, that is used in coerced condition to derive a couple of keys, (ei2 ,di2). And if the voter has used this private key to sign his vote, the vote is the void ballot. The same is, regardless of using which couple of keys, the voter will get the ticket according to his signed vote by the Tally Center. Thus, we can reduce the possibility of coerced, and make the electronic voting system to be more reasonable and safe.
Chiang, Pei-chi, and 江沛其. "The Myth of Mandatory Cumulative Voting System." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/a44rjk.
Full text國立臺灣大學
法律學研究所
106
With regard to the legislation on the cumulative voting system, all countries in the world are not actively relaxing their restraint and control, especially in Europe and the United States. In contrast, Taiwan has consistently adhered to the mandatory cumulative voting system for 40 years and has the potential to explore the value behind this. In this regard, scholars in our country mentioned that although the mandatory cumulative voting system is not the mainstream of the corporate legal system in the world at present, it does not need to follow the trend of the countries in Europe and the United States. Moreover, there is no recessionary backdrop in the United States for the compulsory cumulative voting system. In this regard, this article agrees, but after reviewing and analyzing the causes of the changes in the legal system abroad, we should carefully consider the meaning behind them as a reference for the legal reform in our country. Therefore, based on the analysis of the cost-effectiveness of cumulative voting, we find that the "minority shareholders" that have accumulated their voting system in fact are not the imaginary minority. It is so close to the minority shareholder of Droop Quota. In addition, the cumulative voting system not only sacrifices the operating efficiency of the company, but also overextensively negotiates the cost of negotiations, causing frequent stalemate among the shareholders of all factions. Therefore, this paper tries to find out the reason behind our sticking to the cumulative voting system and finds that the ownership structure difference plays a crucial role. Because in the minority control structure, neither the external control nor the internal control can effectively check and balance, but only intervenes the composition of the board of directors, East Asian scholars hold the position of affirming the mandatory cumulative voting system only through monitoring of other interest representatives with opposite interests. In addition, the article thinks that the phenomenon of high retail investment and high transaction turnover in our country is also the reason why Taiwan sticks to the compulsory cumulative voting system. These two phenomena make it difficult for the controlling shareholder to change the charter, so the legislator has never let it easily company charter autonomy. However, this kind of "paternalistic" thinking of protection has caused Taiwan to plunge into a long-term myth. Only by sacrificing the harmonious operation of enterprises can the interests of minority shareholders be protected. In fact, even the compulsory cumulative vote almost disappeared in the United States faced with the choice between mandatory and permissive cumulative voting, as foreign scholars said, because of the consideration of the modern large-scale companies is not a simple shareholder structure, and minority shareholders to protect the model has changed before the legislator choose to use permissive cumulative voting system. By emphasizing the openness of corporate information and establishing a proper exit mechanism, the United States law has made it more effective and direct that the protection of minority shareholders be more effective than the cumulative voting system. Therefore, the mandatory cumulative voting system has been replaced by other systems. This is exactly what the United States the law behind the meaning of change should be a mirror for our country''s legal system.
Thakur, Surendra. "System architecture for secure mobile internet voting." Thesis, 2015. http://hdl.handle.net/10321/1393.
Full textThis thesis focuses on the development of an enhanced innovative secure mobile Internet voting system architecture that offers desirable security requirements to theoretically mitigate some of the intrinsic administrative and logistical challenges of voting, inter alia lack of mobility support for voters, voter inconvenience, election misconduct, and possible voter coercion often associated with the conventional poll-site voting system. Systems in existence have tended to revolve around the need to provide ubiquitous voting, but lack adequate control mechanism to address, in particular, the important security requirement of controlling possible coercion in ubiquitous voting. The research work reported in this thesis improves upon a well-developed Sensus reference architecture. It does so by leveraging the auto-coupling capability of near field communication, as well as the intrinsic merits of global positioning system, voice biometric authentication, and computational intelligence techniques. The leveraging of the combination of these features provides a theoretical mitigation of some of the security challenges inherent in electoral systems previously alluded to. This leveraging also offers a more pragmatic approach to ensuring high level, secure, mobile Internet voting such as voter authentication. Experiments were performed using spectral features for realising the voice biometric based authentication of the system architecture developed. The spectral features investigated include Mel-frequency Cepstral Coefficients (MFCC), Mel-frequency Discrete Wavelet Coefficients (MFDWC), Linear Predictive Cepstral Coefficients (LPCC), and Spectral Histogram of Oriented Gradients (SHOG). The MFCC, MFDWC and LPCC usually have higher dimensions that oftentimes lead to high computational complexity of the pattern matching algorithms in automatic speaker authentication systems. In this study, higher dimensions of each of the features were reduced per speaker using Histogram of Oriented Gradients (HOG) algorithm, while neural network ensemble was utilised as the pattern-matching algorithm. Out of the four spectral features investigated, the LPCC-HOG gave the best statistical results with an R statistic of 0.9257 and Mean Square Error of 0.0361. These compact LPCC-HOG features are highly promising for implementing the authentication module of the secure mobile Internet voting system architecture reported in this thesis.
D
Lin, Hong-Dar, and 林宏達. "A Practical Technique for Electronic Voting System." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/7a8eja.
Full text逢甲大學
資訊工程所
91
In Taiwan, the different voting events usually hold at the same time. For example, the elections of the head of village and borough were held on the same day in 2002. It implies that each voter belonging to different village or borough has the different candidates to be voted simultaneously. When the different voting events hold at the same time, in order to distinguish each different ballot paper by the voting center, each voting event must use its own public key to identify the candidate. However, how to carefully generating the public key is a complicated process. It implies the cost of the public key generation should be more concerned. The second problem is that in a traditional voting, voters register and get blank ballots in polling booth. But in current electronic voting techniques, it seems difficult to simulate to get blank ballots in polling booth. In this paper, a new scheme combining the techniques of "Similar Partially Blind Signature" and "One-Way Hash Function" is proposed to implement the electronic voting system that will be applied on the Internet. In our scheme, the problem for multi-voting activities working at the same time is solved by only one pair of the public key. In addition, our scheme simulates traditional voting to get blank ballots in virtual polling booth and distribute those to voters. The proposed method provides users a secure and convenient environment to determine which candidate will be voted in the polling time.
Chan, Yu-Shih, and 詹雨時. "A Global Voting System for Clustering Ensemble." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/xyjf4f.
Full text國立臺灣科技大學
資訊工程系
106
Clustering is the process of partitioning a dataset into clusters based on the similar-ity between data points. Many clustering methods have been proposed, but different methods usually generate different clustering results because of various properties of these methods. To combine different clustering results into a better and more robust clustering result, clustering ensemble has been proposed. However, some methods re-quire users to specify parameters, and results are generally affected by settings of pa-rameters severely. In this work, a novel clustering ensemble method called Global Voting Clustering Ensemble (GVCE) is proposed, where no parameter is required, in-cluding the number of clusters. There are three satges in GVCE, in the creating stage, fragments will be extracted to further create appropriate candidate clusters. Then, in the voting stage, a voting process is designed to allow candidate clusters to evolve into final candidate clusters containing all data points. Finally, an assigning stage is devised to make sure that each data point is assigned to only one cluster. Experimental results on a variety of real-world datasets verified that our proposed method is better than state-of-the-art clustering ensemble methods.
Holmes, Danae. "Vote-By-Phone: Usability of an IVR Voting System with Adjustable Audio Speed." Thesis, 2013. http://hdl.handle.net/1911/71967.
Full textChen, Yuan Shun, and 陳淵順. "An e-voting system based on oblivious signatures." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/20979792262510673071.
Full text國立政治大學
資訊科學學系
99
Electronic voting systems have been widely investigated in recent years since they are very convenient for voters. Many countries have begun to implement electronic voting system to replace the traditional voting system. In order to replace the traditional voting system, an e-voting system must satisfy all the security requirements of those in a traditional voting system. Those security requirements are, firstly, to have a sound mechanism to protect a voter’s privacy, and to ensure that the identity of a voter or the content of a ballot will not be leaked to others. Moreover, it must maintain the integrity, verifiability and fairness during the entire voting process. To keep the system stable during the voting process is also an important factor that must be considered. This thesis is a research on designing a secure electronic voting system. Based on some existing electronic voting systems, we design an improved system to enhance the privacy protection of voters on one hand and to reduce the loading of voters on the other hand. In detail, our scheme is modified from the existing e-voting system of Estonian state, and we proposed an improved e-voting system which uses the oblivious signatures as a building block.
Deviani, Rini, and Rini Deviani. "RSA Time-Lock Puzzle Authenticated E-voting System." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/62848021683625961219.
Full text亞洲大學
資訊工程學系碩士班
100
The main principle of e-voting is that it must be as similar to regular voting as possible, compliant with election legislation and principles and be at least as secure as regular voting. Therefore, e-voting must be uniform and secret, only eligible persons must be allowed to (e-) vote. Every voter should be able to cast only one vote; a voter must not be able to prove in favor of whom he/she voted. In addition to this the collecting of votes must be secure, reliable and accountable. In the term of Timed-Release Cryptography, e-voting is intended to prevent the early opening of electronically-case votes. It also avoids election fraud which means that all parties involved do not have access to the results until a specific, predefined time in the future. In this thesis, we propose an RSA time-lock puzzle authenticated e-voting system. Authentication, here, means to provide public key based authenticated encryption algorithm that takes sender’s secret key, receiver’s public key and designated time so that the resulting ciphertext can be decrypted only by receiver and only starting with designated time using receiver’s secret key, sender’s public key and some secret that will be disclosed only on designated time. RSA as one of the most famous cryptosystem is used and secure related to several main security issues.
Lin, Jyan Liang, and 林建良. "An Extended RSA Based Multiauthority Electronic Voting System." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/44690455118281909468.
Full text逢甲大學
電子工程學系
88
Comparing with conventional paper-based voting systems, a secure and sound electronic voting system may be far more efficient and convenient. However, all the previously published electronic voting systems are still unsatisfactory in the sense that cheating by the malicious authority or buying of votes is inevitably allowable in each of these systems. Consequently, they remain impractical for applications in real world environments. In order to solve the two vital problems, in this thesis we first propose an efficient blind multisignature technique. Then, based upon this technique and an extended RSA (ERSA) based group-oriented decryption technique, we develop a multiauthority electronic voting system. It is shown that the developed system can verify the honesty of each authority as well as the correctness of his published tally by simply checking whether each published tally is identical or not. In this way, each individual authority cannot cheat unless all of the authorities conspire together. Further, each individual voter can be convinced that his vote has been taken into account in each authority’s final tally if all published tallies are identical. Accordingly, in the proposed system, there is no need to give a mechanism for the voter to verify whether his vote has been taken into account in each authority’s final tally. Consequently, he is unable to show to anyone else how he votes. This significantly solves the severe problem of vote-buying. To the best of our knowledge, our proposed system is the first one which solves both of the authority-cheating and vote-buying problems simultaneously. In addition, the proposed system satisfies all other security requirements of eligibility, collision free, privacy, fairness, robustness, etc.
Tsay, Yuh-Maw, and 蔡玉茂. "Developing a Voting System with Electronic Bulletin Board." Thesis, 1995. http://ndltd.ncl.edu.tw/handle/70059131194666229175.
Full text國立交通大學
資訊管理研究所
83
Democracy has reached maturity in modern societies. It becomes interesting and feasible to develop an electronic balloting system in computer networks. In this paper, the author has designed a new protocol for anonymous voting; moreover, a system based on the protocol has been successfully implemented in an environment using WINDOWS NT. The system can gain sococess, under an assumption of an anonymous communication channel.
LIN, SHIH-KAI, and 林士凱. "Decentralized Electronic Voting System with Anonymity and Verifiability." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/d635w3.
Full text國立高雄科技大學
資訊工程系
107
In recent years, there are many major breakthroughs in information technology, and blockchain is one of them. Before blockchain, most of the network services are based on master-slave architecture, which means the clients need to send their requests to the server and receive the services they want. Because of that, the clients need to trust the server, even if they have doubts about the server, most people still use it because of the convenience of the service. But now with the blockchain, we don’t need a server anymore. Instead, we let all nodes on the network maintain the database, avoiding centralization of power. Furthermore, the data on the blockchain are accessible for everyone. In this paper, we try to combine blockchain with E-voting. Holding elections requires a lot of time and effort, for example, some people don’t live in their constituency, so they need to travel back if they want to vote. And because of the rise of awareness of environmental protection, people want to reduce the usage of papers. Furthermore, the problem of electoral fraud makes people distrust the government. In this paper, we will propose a E-voting system based on blockchain to solve the problems above, and because all information on the blockchain is disclosed, we take a private digital currency called Monero as reference, using ring signature and stealth address presented by Ronald L. Rivest and others. By that, we can protect voter privacy and guarantee the accuracy of vote-counting.
LIN, CHEN-YI, and 林承毅. "Based on Blockchain Smart Contract Electronic Voting System." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/n52jvb.
Full text國立雲林科技大學
資訊管理系
107
Voting is used to being the representative power that voice for people in the democratic system, Whether the voting is safe or not and how to improve the voting convenience has always been the main issue in this research domain, in recent years, information technology is developing rapidly, everyone started thinking about using electronic voting methods instead of traditional voting methods to reduce resource waste and improve convenience, however, due to doubts about safety and trustworthiness several studies have indicated that the electronic voting system may have potential dangers when people voting by the electronic voting system, the study also pointed out that the electronic voting system is manufactured and maintained by humans, it’s inevitable to cause some man-made problems, therefore, it’s very important to propose a safe and trustworthy electronic voting system that can protect the process of voting, block chain technology has been proposed in recent years, the features of decentralized, incorruptible, trackable, encrypted and anonymous makes it become one of the most popular tools for the recent study domain, this study combines block chain technology with an electronic voting system and attempts to establish a secure and trusted electronic voting system.
Nieh, Jong-Liang, and 聶忠良. "An Anonymous Voting System Applied to Group Decisions." Thesis, 1996. http://ndltd.ncl.edu.tw/handle/19152721434637292477.
Full text國立交通大學
資訊管理研究所
84
In this thesis, we have developed an anonymous voting system that canbe applied to group decisions. People can convene a conference on computernetworks because of the development of information technology. But when theyneed to vote in the conference, they will have the same trouble to expressthemselves as face-to-face meeting. The electronic voting system we havedeveloped can provide an anonymous and verifiable voting enviroment by usingcryptographic instruments. The system can be applied to group decisions easilybecause it uses the conventional voting procedure. Now, people will have a convenient, secure, and reliable voting tool when they take a conference on computer networks.
Wu, Wen-Bin, and 吳文斌. "A Secure Voting System on a Public Network." Thesis, 1994. http://ndltd.ncl.edu.tw/handle/15193347349384454005.
Full text國立中正大學
資訊工程研究所
82
Due to the rapid progress in computers and communication networks, we may want to hold a secure electronic election on a public network. The election scheme we proposed in this thesis can fully conform the requirements of holding a large scale election. The privacy of the voters can be preserved against the voting center. No one, including the voting center, knows which voting strategy each voter adopts. The voting center can not present a false tally without being caught. Then "Electronic Election " on a public network is possible by employing our proposed scheme.
Paneru, Sushil. "Blockchain based remote voting system: a performance perspective." Thesis, 2021. http://hdl.handle.net/1828/13204.
Full textGraduate
Wang, Chun, and 王淳. "The Security Analysis of NCKU Electronic Voting System." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/37379786384921253434.
Full text國立成功大學
工學院工程管理專班
96
The election method utilized in Taiwan is traditional paper ballot. It takes a lot of manpower and costs a lot of money to complete the voting and tallying process, and the final election result always announce lately. Because these deficiencies exist in a paper-voting system, dozens of countries have begun researching an e-voting system, and some have already experienced many benefits. The NCKU CNS Lab (Cryptology and Network Security Laboratory) has begun developing Taiwan’s electronic voting system supported by NSC (National Science Council), and this paper’s goal is to analyze the security of the NCKU electronic voting system at the initial design stage. Our analysis approach is “case study”. First, we get basic data by understanding the evolutionary history, the correlation technology, and other countries experiments with e-voting. Next, we get relative data by analyzing the pros and cons of paper voting, internet voting and electronic voting. Then, we began our case study based on this data. We use the ‘KT Problem Solving Model’ as the major tool for the case study, and discuss security vulnerability and potential risks during the initial design stage.Through our security analysis, we can find most security related problems. In the future, we can improve our machine’s design, and make an inspection manual for voting machine’s test based on these potential problems.