Please use this identifier to cite or link to this item: http://hdl.handle.net/20.500.12188/23958
DC FieldValueLanguage
dc.contributor.authorRibarski, Pancheen_US
dc.contributor.authorAntovski, Ljupchoen_US
dc.date.accessioned2022-10-31T10:44:36Z-
dc.date.available2022-10-31T10:44:36Z-
dc.date.issued2010-
dc.identifier.urihttp://hdl.handle.net/20.500.12188/23958-
dc.description.abstractVoting takes great part in the human society. The act of choosing a representative in a vote-like process has always been a delicate and fragile. Electronic voting is being introduced not so long ago [12]. We can see the progress of evoting just by looking the goals that researchers set their selves [1, 3, 7, 21, 22]. Accomplishment of these goals went in two directions: using blind signatures [1, 2, 3, 4, 5, 12, 24], or using homomorphic crypto-system [6, 9, 10, 20, 26]. The notion of mixnets is also intertwining with e-voting systems to ensure an anonymous communication channel. This research will try to unite these concepts and to review the various techniques brought by researchers in the past 20 years or so.en_US
dc.publisherInstitute of Informatics, Faculty of Natural Sciences and Mathematics, Ss. Cyril and Methodius University in Skopje, Macedoniaen_US
dc.titleIntroduction To Secure Electronic Voting Requirementsen_US
dc.typeProceedingsen_US
dc.relation.conferenceThe 7th International Conference for Informatics and Information Technology (CIIT 2010)en_US
item.grantfulltextopen-
item.fulltextWith Fulltext-
crisitem.author.deptFaculty of Computer Science and Engineering-
Appears in Collections:Faculty of Computer Science and Engineering: Conference papers
Files in This Item:
File Description SizeFormat 
7CiiT-30.pdf65.46 kBAdobe PDFView/Open
Show simple item record

Page view(s)

32
checked on Jul 18, 2024

Download(s)

8
checked on Jul 18, 2024

Google ScholarTM

Check


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.