The information is taken from: ACM Communications, Vol 52, No-2. Author F. Gerlach, Badden Wurttemberg, Germany
- Proven Security: All protocols and techniques must be mathematically proved to be secure
- Trustworthy Design Responsibility: The E-voting responsibility should be assigned to a highly reliable and trustworthy organization
- Published Source Code: Application source code should be made public
- Vote Verification: All voters should be able to verify their votes afterward
- Voter Accessibility: A full list of voters must be available to all citizens
- Ensure Anonymization: Techniques like onion routing should be used for anonymization
- Expert Oversight: The election system must be handled by experts. For example, experts must be employed to handle DDOS attacks.
From: http://sitestree.com/?p=5176
Categories:103
Tags:
Post Data:2009-02-20 10:30:48
Shop Online: <a href='https://www.ShopForSoul.com/' target='new' rel="noopener">https://www.ShopForSoul.com/</a>
(Big Data, Cloud, Security, Machine Learning): Courses: <a href='http://Training.SitesTree.com' target='new' rel="noopener"> http://Training.SitesTree.com</a>
In Bengali: <a href='http://Bangla.SaLearningSchool.com' target='new' rel="noopener">http://Bangla.SaLearningSchool.com</a>
<a href='http://SitesTree.com' target='new' rel="noopener">http://SitesTree.com</a>
8112223 Canada Inc./JustEtc: <a href='http://JustEtc.net' target='new' rel="noopener">http://JustEtc.net (Software/Web/Mobile/Big-Data/Machine Learning) </a>
Shop Online: <a href='https://www.ShopForSoul.com'> https://www.ShopForSoul.com/</a>
Medium: <a href='https://medium.com/@SayedAhmedCanada' target='new' rel="noopener"> https://medium.com/@SayedAhmedCanada </a>