30,262 research outputs found

    E-Voting Solution for Romanian Parliament

    Get PDF
    Every year hundreds of millions of people vote in a variety of settings in many countries around the world. People vote in public elections to choose government leaders and also in private elections to determine the course of action for groups that people are organized in such as non-governmental organizations, unions, associations and corporations (shareholders). Voting is a widely spread, rather democratic, way of making decisions. More and more governments and private organizations realize that the use of new technologies such as the Internet can have beneficial impacts on elections - i.e. higher voter turnout and lower costs of conducting elections. The rules governing elections tend to be highly specialized to meet the specific needs of each type of organization. Most elections, however, require integrity, privacy and authentication.e-voting, elections, democracy, ngo, unions, government

    Mobile services in Estonia

    Get PDF

    Conscript Your Friends into Larger Anonymity Sets with JavaScript

    Full text link
    We present the design and prototype implementation of ConScript, a framework for using JavaScript to allow casual Web users to participate in an anonymous communication system. When a Web user visits a cooperative Web site, the site serves a JavaScript application that instructs the browser to create and submit "dummy" messages into the anonymity system. Users who want to send non-dummy messages through the anonymity system use a browser plug-in to replace these dummy messages with real messages. Creating such conscripted anonymity sets can increase the anonymity set size available to users of remailer, e-voting, and verifiable shuffle-style anonymity systems. We outline ConScript's architecture, we address a number of potential attacks against ConScript, and we discuss the ethical issues related to deploying such a system. Our implementation results demonstrate the practicality of ConScript: a workstation running our ConScript prototype JavaScript client generates a dummy message for a mix-net in 81 milliseconds and it generates a dummy message for a DoS-resistant DC-net in 156 milliseconds.Comment: An abbreviated version of this paper will appear at the WPES 2013 worksho

    Exploratory study to explore the role of ICT in the process of knowledge management in an Indian business environment

    Get PDF
    In the 21st century and the emergence of a digital economy, knowledge and the knowledge base economy are rapidly growing. To effectively be able to understand the processes involved in the creating, managing and sharing of knowledge management in the business environment is critical to the success of an organization. This study builds on the previous research of the authors on the enablers of knowledge management by identifying the relationship between the enablers of knowledge management and the role played by information communication technologies (ICT) and ICT infrastructure in a business setting. This paper provides the findings of a survey collected from the four major Indian cities (Chennai, Coimbatore, Madurai and Villupuram) regarding their views and opinions about the enablers of knowledge management in business setting. A total of 80 organizations participated in the study with 100 participants in each city. The results show that ICT and ICT infrastructure can play a critical role in the creating, managing and sharing of knowledge in an Indian business environment

    Formal security analysis of registration protocols for interactive systems: a methodology and a case of study

    Full text link
    In this work we present and formally analyze CHAT-SRP (CHAos based Tickets-Secure Registration Protocol), a protocol to provide interactive and collaborative platforms with a cryptographically robust solution to classical security issues. Namely, we focus on the secrecy and authenticity properties while keeping a high usability. In this sense, users are forced to blindly trust the system administrators and developers. Moreover, as far as we know, the use of formal methodologies for the verification of security properties of communication protocols isn't yet a common practice. We propose here a methodology to fill this gap, i.e., to analyse both the security of the proposed protocol and the pertinence of the underlying premises. In this concern, we propose the definition and formal evaluation of a protocol for the distribution of digital identities. Once distributed, these identities can be used to verify integrity and source of information. We base our security analysis on tools for automatic verification of security protocols widely accepted by the scientific community, and on the principles they are based upon. In addition, it is assumed perfect cryptographic primitives in order to focus the analysis on the exchange of protocol messages. The main property of our protocol is the incorporation of tickets, created using digests of chaos based nonces (numbers used only once) and users' personal data. Combined with a multichannel authentication scheme with some previous knowledge, these tickets provide security during the whole protocol by univocally linking each registering user with a single request. [..]Comment: 32 pages, 7 figures, 8 listings, 1 tabl

    Implementation of E-Voting via Smart Phone App

    Get PDF
    Voting system is vital requirement of every country due to which representatives are elected by citizens of respective country. Voting system via smart phone app is very effective and user friendly, as physical presence is not required in native place. The objective of this system is to maximize the voting count especially from those people who are eligible but are unable to cast their vote due to transfers to different cities, higher education, NRI?s. In this smart phone application, User has to first download the app after that user has to register himself and user details are stored in online server and Aadhar id is mandatory for user to enter at the time of registration. User get notification about voting date .user has to login for casting vote to his favorable candidate. User can be authenticated by credential such as userid, password and Aadhar card scanning .Authenticated user allow viewing the candidate?s details. User has to first enter OTP which is sent to his registered mobile no then he cast his vote to favourable candidate. This app is applicable for both android users as well as users who are not familiar with android as government agent help them to cast vote. Result declared in the same day as there is no manual calculation. There is no need of election card in this app
    corecore