Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
ISSN No:-2456-2165
Fig:1
Procedure REFERENCES
(1) First of all the voter sees a booth login page where he
enters the booth id and password provided to him. [1]. T. M. Carbaugh, “Secretary of State Kevin Shelley
(2) After the login, the system shows a plain screen where Announces Directives To Ensure Voter Confidence in
user scans the QR code present in the slip. The details Electronic Systems,” California Secretary of
are verified at the backend and if the verification is State,2003.
correct a “success” message is displayed on the screen. If [2]. D.L.Chaum,“UntraceableElectronicMail,ReturnAddres
the verification fails then voter contacts the voter help ses,andDigitalPseudonyms,”Communicationsof the
service. ACM, Vol.24, No.2, 1981,pp.84-88.
(3) After getting the “success” message the next step is face [3]. C. T. Chiou, “A Study of Election Reform in Taiwan:
recognition. If the face matches with the one stored in An Observation from e-Voting Experiences in
database then voter moves to the next step otherwise he DevelopedCountries,”JournalofResearch,Development
needs to contact the help services. andEvaluationCommission,Vol.28,No.4,2004, pp.25-
(3) After the face matches in the face recognition the voter 35 (inChinese).
casts the vote to his favorite candidate and the voting [4]. CompuwareCorporation,“DirectRecordingElectronic(
process finishes with a Thank You message at last. DRE)TechnicalSecurityAssessmentReport,”Ohio
(4) If any difficulty is faced at any stage of the voting Secretary of State,2003.
process, a voter help service is present inside the booth [5]. C. A. Gaston, “A Better Way to Vote,” Proceedings of
for helping the voter in resolving the issue. the 38th Annual Hawaii International Conference on
System Sciences, 2005,p.117c.
Vote Counting [6]. C. A. Gaston, SAVIOC Voting Systems, [Online],
When the election ends, votes are counted using Available: http://www.savioc.com/,2007.
information stored in the database. After this the counting is [7]. InternetPolicyInstitute,“ReportoftheNationalWorkshop
combined to get the final result. Before counting of votes, onInternetVoting:IssuesandResearchAgenda,”
we assure the counting is fair and accurate. [8]. Proceedings of the 2000 Annual National Conference
on Digital Government Research, 2000, pp.1-59.
IV. CONCLUSION [9]. A.M.Keller,A.Dechert,K.Auerbach,D.Mertz,
A.Pearl,andJ.L.Hall,“APC-basedOpen-SourceVoting
This paper states that our implementation provides Machine with an Accessible Voter-Verifiable Paper
features like the voter’s identity accuracy is maintained Ballot,” Proceedings of the USENIX Annual Technical
within the system. Next, details of voters are not used to Conference, U.S.A., 2005,p.52.
break privacy of the voter. They are kept confidential. The [10]. T. Kohno, A. Stubblefield, A. D. Ribin, and D. S.
system validates the voter’s authorization to make sure that Wallach, “Analysis of an Electronic Voting System,”
only legal voter cast the vote. In the future, to eliminate poor IEEE Computer Society, 2004,pp.27-40.
processes and human destruction, setting up of a E-voting [11]. R. Mercuri, “A Better Ballot Box?” IEEE Spectrum,
system which is secure is important. It will rapidly increase Vol.39, No.10, 2002,pp.46-50.
the electoral procedures, make counting more efficient and [12]. C. H. Yang, Network Security: Theory and Practice,
use resources effectively. Key Hold Information Inc., Taipei, Taiwan, 2006 (in
Chinese)