This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Sept.-Oct. 2012 (vol. 10 no. 5)
pp. 16-17
Michael Shamos, Carnegie Mellon University
Alec Yasinsac, University of South Alabama
There has been substantial debate about e-voting security in the past 10 years. As a result, e-voting has evolved away from lever machines and punched cards, through touchscreen voting machines, to a voter-verifiable paper audit trail phase, and voter-marked paper ballots paired with optical scan tabulators. Still, the debate over e-voting security continues. The guest editors introduce the articles in this special issue, which cover technology aimed at both improving election integrity and providing confidence through postelection audits. These articles advance the e-voting security debate and will contribute to long-term election integrity.
Index Terms:
Special issues and sections,Electronicvoting,Legal aspects,Fraudulent activities,Security of data,Computer security,voting machines,e-voting,audit trail
Citation:
Michael Shamos, Alec Yasinsac, "Realities of E-voting Security," IEEE Security & Privacy, vol. 10, no. 5, pp. 16-17, Sept.-Oct. 2012, doi:10.1109/MSP.2012.124
Usage of this product signifies your acceptance of the Terms of Use.