iVotronic Software Verification Protocol

نویسنده

  • Collin Lynch
چکیده

Existing tests employed by the county including version number examination and parallel testing may be circumvented by malicious software. Any virus-infected PC still makes the same start-up chime and any compromised voting machine can still print “9.1.4.1.” Similarly, a skilled virus can detect a predefined pattern of voting, be signaled by inside actors, or use a variety of other methods to distinguish testing from a real election.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Stones Unturned: Gaps in the Investigation of Sarasota’s Disputed Congressional Election

The November 2006 race for Florida’s 13th Congressional District resulted in a 369 vote margin of victory for the winning candidate with more than 18,000 undervotes recorded on the ES&S iVotronic touch-screen voting machines used in Sarasota County. Since then, the losing candidate and a coalition of local voters have filed suit against the state and local election officials (among other defend...

متن کامل

A NEW PROTOCOL MODEL FOR VERIFICATION OF PAYMENT ORDER INFORMATION INTEGRITY IN ONLINE E-PAYMENT SYSTEM USING ELLIPTIC CURVE DIFFIE-HELLMAN KEY AGREEMENT PROTOCOL

Two parties that conduct a business transaction through the internet do not see each other personally nor do they exchange any document neither any money hand-to-hand currency. Electronic payment is a way by which the two parties transfer the money through the internet. Therefore integrity of payment and order information of online purchase is an important concern. With online purchase the cust...

متن کامل

Integrating Verification, Testing, and Learning for Cryptographic Protocols

The verification of cryptographic protocol specifications is an active research topic and has received much attention from the formal verification community. By contrast, the black-box testing of actual implementations of protocols, which is, arguably, as important as verification for ensuring the correct functioning of protocols in the “real” world, is little studied. We propose an approach fo...

متن کامل

An Environment for the Specification and Verification of Time-dependent Security Protocols

The use of formal methods in software engineering for the specification and the verification is suitable when developing complex systems. The distributed nature, the subtle time dependence and the strict requirements of time sensitive security protocols increase the inherent complexity of their validation. Using the TESLA authentication protocol as a case study, we shall discuss what are the fu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008