IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Authentication Mechanisms for E-Voting

Authentication Mechanisms for E-Voting
View Sample PDF
Author(s): Emad Abu-Shanab (Yarmouk University, Jordan), Rawan Khasawneh (Yarmouk University, Jordan)and Izzat Alsmadi (Yarmouk University, Jordan)
Copyright: 2013
Pages: 16
Source title: Human-Centered System Design for Electronic Governance
Source Author(s)/Editor(s): Saqib Saeed (Department of Computer Information Systems, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, Dammam, Saudi Arabia)and Christopher G. Reddick (University of Texas at San Antonio, USA )
DOI: 10.4018/978-1-4666-3640-8.ch006

Purchase

View Authentication Mechanisms for E-Voting on the publisher's website for pricing and purchasing information.

Abstract

The e-government paradigm became an essential path for governments to reach citizens and businesses and to improve service and public performance. One of the important tools used in political and administrative venues is e-voting, where ICT tools are used to facilitate the process of voting for electing representatives and making decisions. The integrity and image of such applications won't be maintained unless strict measures on security and authenticity are applied. This chapter explores the e-voting process, reviews the authentication techniques and methods that are used in this process and proposed in the literature, and demonstrates few cases of applying e-voting systems from different countries in the world. Conclusions and proposed future work are stated at the end of the chapter.

Related Content

Serpil Kır Elitaş. © 2023. 11 pages.
Sami Kiraz. © 2023. 14 pages.
Kadir Bendaş. © 2023. 10 pages.
Fatih Değirmenci. © 2023. 15 pages.
Elifnur Terzioğlu. © 2023. 14 pages.
Türker Elitaş. © 2023. 16 pages.
Sudeep Uprety. © 2023. 14 pages.
Body Bottom