Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A study on the ubiquitous e-voting system for the implementation of e-government

Full metadata record
DC Field Value Language
dc.contributor.authorKim, C.S.-
dc.contributor.authorJung, C.D.-
dc.contributor.authorHa, S.Y.-
dc.contributor.authorPark, C.H.-
dc.date.accessioned2021-09-06T09:56:30Z-
dc.date.available2021-09-06T09:56:30Z-
dc.date.created2021-06-17-
dc.date.issued2013-
dc.identifier.issn1738-9976-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/105956-
dc.description.abstractThe Global IT revolution is growing rapidly. Government and business have to be ready to meet the increased demand for effective and secure online services. With the E-Government practicing, day-by-day the public demand is also increasing simultaneously. Now this present moment, one of important research part is secure E-Voting for E-Government service, but for this important factor or Government Issue, it needs information privacy for secure information transaction of citizen's opinions and secure authentication. This paper has analyzed several approaches E-voting protocols, those are implemented with many digital signature mechanisms and maintained many types of cryptographic rules, which are main factor for information privacy. In this paper we discussed them with a view to voter anonymity and protection from manipulations. The paper then developed an algorithm designed to guarantee anonymity of the voter and to avoid the risk of manipulation of votes. In this paper the proposed algorithm is based upon the strict separation of voter's registration and submission of votes, which means that certain information has to be stored on a secure storage media. This paper discusses the secure security criteria and possible implementation options for such secure storage.-
dc.languageEnglish-
dc.language.isoen-
dc.subjectCryptographic-
dc.subjecte-Government-
dc.subjectE-Voting-
dc.subjectSecurity-
dc.subjectubiquitous-
dc.subjectAlgorithms-
dc.subjectAuthentication-
dc.subjectGovernment data processing-
dc.subjectInformation services-
dc.subjectVoting machines-
dc.subjectCryptography-
dc.titleA study on the ubiquitous e-voting system for the implementation of e-government-
dc.typeArticle-
dc.contributor.affiliatedAuthorJung, C.D.-
dc.identifier.scopusid2-s2.0-84883285880-
dc.identifier.bibliographicCitationInternational Journal of Security and its Applications, v.7, no.4, pp.167 - 176-
dc.relation.isPartOfInternational Journal of Security and its Applications-
dc.citation.titleInternational Journal of Security and its Applications-
dc.citation.volume7-
dc.citation.number4-
dc.citation.startPage167-
dc.citation.endPage176-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordPlusCryptographic-
dc.subject.keywordPluse-Government-
dc.subject.keywordPlusE-Voting-
dc.subject.keywordPlusSecurity-
dc.subject.keywordPlusubiquitous-
dc.subject.keywordPlusAlgorithms-
dc.subject.keywordPlusAuthentication-
dc.subject.keywordPlusGovernment data processing-
dc.subject.keywordPlusInformation services-
dc.subject.keywordPlusVoting machines-
dc.subject.keywordPlusCryptography-
dc.subject.keywordAuthorAuthentication-
dc.subject.keywordAuthorCryptographic-
dc.subject.keywordAuthorE-Government-
dc.subject.keywordAuthorE-Voting-
dc.subject.keywordAuthorSecurity-
dc.subject.keywordAuthorubiquitous-
Files in This Item
There are no files associated with this item.
Appears in
Collections
Graduate School > Department of Computer and Information Science > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE