{"id":"https://openalex.org/W2024761157","doi":"https://doi.org/10.1109/icitst.2013.6750173","title":"End-to-End cryptographic voting: Potentials and limitations","display_name":"End-to-End cryptographic voting: Potentials and limitations","publication_year":2013,"publication_date":"2013-12-01","ids":{"openalex":"https://openalex.org/W2024761157","doi":"https://doi.org/10.1109/icitst.2013.6750173","mag":"2024761157"},"language":"en","primary_location":{"id":"doi:10.1109/icitst.2013.6750173","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2013.6750173","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053430405","display_name":"Mohammed Awad","orcid":"https://orcid.org/0000-0002-4698-133X"},"institutions":[{"id":"https://openalex.org/I4210153389","display_name":"American University of Ras Al Khaimah","ror":"https://ror.org/0440yjn92","country_code":"AE","type":"education","lineage":["https://openalex.org/I4210153389"]}],"countries":["AE"],"is_corresponding":true,"raw_author_name":"Mohammed Awad","raw_affiliation_strings":["Computer Science and Engineering Dept., American University of Ras Al Khaimah, RAK, UAE"],"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering Dept., American University of Ras Al Khaimah, RAK, UAE","institution_ids":["https://openalex.org/I4210153389"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076583178","display_name":"Ernst L. Leiss","orcid":null},"institutions":[{"id":"https://openalex.org/I44461941","display_name":"University of Houston","ror":"https://ror.org/048sx0r50","country_code":"US","type":"education","lineage":["https://openalex.org/I44461941"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ernst L. Leiss","raw_affiliation_strings":["Department of Computer Science, University of Houston, Houston, TX, USA","Department of Computer Science, University of Houston, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Houston, Houston, TX, USA","institution_ids":["https://openalex.org/I44461941"]},{"raw_affiliation_string":"Department of Computer Science, University of Houston, TX, USA","institution_ids":["https://openalex.org/I44461941"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5053430405"],"corresponding_institution_ids":["https://openalex.org/I4210153389"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07779733,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"113","last_page":"118"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.8166923522949219},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7258739471435547},{"id":"https://openalex.org/keywords/secrecy","display_name":"Secrecy","score":0.6875768899917603},{"id":"https://openalex.org/keywords/voting","display_name":"Voting","score":0.6513715386390686},{"id":"https://openalex.org/keywords/electronic-voting","display_name":"Electronic voting","score":0.6496267914772034},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.6118873357772827},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5825796127319336},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.42982596158981323},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.42412570118904114},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.08898094296455383}],"concepts":[{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.8166923522949219},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7258739471435547},{"id":"https://openalex.org/C2776452267","wikidata":"https://www.wikidata.org/wiki/Q1503443","display_name":"Secrecy","level":2,"score":0.6875768899917603},{"id":"https://openalex.org/C520049643","wikidata":"https://www.wikidata.org/wiki/Q189760","display_name":"Voting","level":3,"score":0.6513715386390686},{"id":"https://openalex.org/C2780612046","wikidata":"https://www.wikidata.org/wiki/Q926161","display_name":"Electronic voting","level":4,"score":0.6496267914772034},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.6118873357772827},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5825796127319336},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.42982596158981323},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.42412570118904114},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.08898094296455383},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icitst.2013.6750173","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitst.2013.6750173","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.8100000023841858}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W34097850","https://openalex.org/W68563358","https://openalex.org/W79644167","https://openalex.org/W92805021","https://openalex.org/W118795310","https://openalex.org/W1545188469","https://openalex.org/W1637520873","https://openalex.org/W1864331615","https://openalex.org/W2042736720","https://openalex.org/W2044922360","https://openalex.org/W2050838777","https://openalex.org/W2078683621","https://openalex.org/W2093831009","https://openalex.org/W2098035803","https://openalex.org/W2100276679","https://openalex.org/W2108079590","https://openalex.org/W2108286682","https://openalex.org/W2110040537","https://openalex.org/W2110357265","https://openalex.org/W2112103082","https://openalex.org/W2120624705","https://openalex.org/W2131030156","https://openalex.org/W2136064843","https://openalex.org/W2137092694","https://openalex.org/W2150841368","https://openalex.org/W2156186849","https://openalex.org/W2159543578","https://openalex.org/W2160561608","https://openalex.org/W2165501837","https://openalex.org/W2165726932","https://openalex.org/W2170151328","https://openalex.org/W2171754584","https://openalex.org/W2267268438","https://openalex.org/W3164640352","https://openalex.org/W3213472335","https://openalex.org/W4285719527","https://openalex.org/W6601367880","https://openalex.org/W6602773955","https://openalex.org/W6603154785","https://openalex.org/W6632525656","https://openalex.org/W6636814693","https://openalex.org/W6639030126","https://openalex.org/W6693225163","https://openalex.org/W6792194058"],"related_works":["https://openalex.org/W4311463983","https://openalex.org/W3108317354","https://openalex.org/W4297573717","https://openalex.org/W1596100069","https://openalex.org/W4283692793","https://openalex.org/W4321843854","https://openalex.org/W2904818008","https://openalex.org/W157440325","https://openalex.org/W2904314268","https://openalex.org/W57958781"],"abstract_inverted_index":{"Due":[0],"to":[1,40],"the":[2,11,14,42,52,56,69,81,105],"concerns":[3],"associated":[4],"with":[5],"Direct":[6],"Recording":[7],"Electronics":[8],"(DREs)":[9],"and":[10,46,92],"limitations":[12,77],"of":[13,51,58,83],"proposed":[15],"verification":[16],"method,":[17],"such":[18],"as":[19,29],"Voter":[20],"Verified":[21],"Audit":[22],"Trails":[23],"(VVATs),":[24],"an":[25],"alternative":[26],"scheme":[27],"known":[28],"End-to-End":[30],"(E2E)":[31],"cryptographic":[32,37,72,96,106],"voting":[33,66,73,97],"was":[34],"proposed.":[35],"E2E":[36,95],"systems":[38,74],"aim":[39],"resolve":[41],"conflict":[43],"between":[44],"secrecy":[45],"accuracy,":[47],"two":[48],"fundamental":[49],"requirements":[50],"electoral":[53],"process.":[54],"Additionally,":[55],"use":[57],"cryptography":[59],"introduces":[60],"several":[61],"other":[62,70],"advantages":[63],"over":[64],"conventional":[65],"methods.":[67],"On":[68],"hand,":[71],"have":[75],"various":[76],"that":[78],"stand":[79],"in":[80],"way":[82],"their":[84,110],"adoption.":[85],"In":[86],"this":[87],"paper":[88],"we":[89,100],"will":[90,101],"discuss":[91],"analyze":[93],"common":[94],"systems,":[98],"then":[99],"suggest":[102],"improvements":[103],"on":[104],"schemes,":[107],"which":[108],"address":[109],"limitations.":[111]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
