In this chapter, first the authors discuss the current trends in the usage of formal techniques in the development of e-voting systems. They then present their experiences on their usage to specify and verify the behaviors of one of the currently deployed e-voting systems, using formal techniques and verification against a subset of critical security properties that the system should meet. The authors also specify attacks that have been shown to successfully compromise the system. The attack information is used to extend the original specification of the system and derive what the authors call the extended model. This work is a step towards fostering open specification and the (partial) verification of a voting machine. The specification an...
Voting systems aim to provide trustworthiness in elections; however, they have always been a target ...
Abstract: Electronic democracy (e-democracy) is a necessity in this era of computers and information...
Abstract. Performing a good security analysis on the design of a system is an essential step in orde...
Deploying a system in a safe and secure manner requires ensuring the tech- nical and procedural leve...
We have seen that several currently deployed e-voting systems share critical failures in their desig...
Electronic voting systems are a perfect example of security-critical computing. One of the critical...
Abstract-Electronic voting systems are a perfect example of security-critical computing. One of the ...
International audienceElectronic voting should offer at least the same guarantees than traditional p...
Abstract. Electronic voting should offer at least the same guarantees than tra-ditional paper-based ...
International audienceElectronic voting machines have complex requirements. These machines should be...
AbstractElectronic voting machines have complex requirements. These machines should be developed fol...
A large amount of research has been conducted to improve public verifiability of e-voting systems. O...
We are involved in a project related to the evaluation and possible introduction of \mbox{e-voting} ...
Abstract: This paper presents a methodology for procedural security analysis in order to analyze and...
Abstract: As discussed in the literature [PrMü01; Rub04; Phi02] e-voting faces a lot of threats. The...
Voting systems aim to provide trustworthiness in elections; however, they have always been a target ...
Abstract: Electronic democracy (e-democracy) is a necessity in this era of computers and information...
Abstract. Performing a good security analysis on the design of a system is an essential step in orde...
Deploying a system in a safe and secure manner requires ensuring the tech- nical and procedural leve...
We have seen that several currently deployed e-voting systems share critical failures in their desig...
Electronic voting systems are a perfect example of security-critical computing. One of the critical...
Abstract-Electronic voting systems are a perfect example of security-critical computing. One of the ...
International audienceElectronic voting should offer at least the same guarantees than traditional p...
Abstract. Electronic voting should offer at least the same guarantees than tra-ditional paper-based ...
International audienceElectronic voting machines have complex requirements. These machines should be...
AbstractElectronic voting machines have complex requirements. These machines should be developed fol...
A large amount of research has been conducted to improve public verifiability of e-voting systems. O...
We are involved in a project related to the evaluation and possible introduction of \mbox{e-voting} ...
Abstract: This paper presents a methodology for procedural security analysis in order to analyze and...
Abstract: As discussed in the literature [PrMü01; Rub04; Phi02] e-voting faces a lot of threats. The...
Voting systems aim to provide trustworthiness in elections; however, they have always been a target ...
Abstract: Electronic democracy (e-democracy) is a necessity in this era of computers and information...
Abstract. Performing a good security analysis on the design of a system is an essential step in orde...