IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Authentication Mechanisms for E-Voting

Authentication Mechanisms for E-Voting
View Sample PDF
Author(s): Emad Abu-Shanab (Yarmouk University, Jordan), Rawan Khasawneh (Yarmouk University, Jordan)and Izzat Alsmadi (Yarmouk University, Jordan)
Copyright: 2015
Pages: 16
Source title: Public Affairs and Administration: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-4666-8358-7.ch037

Purchase

View Authentication Mechanisms for E-Voting on the publisher's website for pricing and purchasing information.

Abstract

The e-government paradigm became an essential path for governments to reach citizens and businesses and to improve service and public performance. One of the important tools used in political and administrative venues is e-voting, where ICT tools are used to facilitate the process of voting for electing representatives and making decisions. The integrity and image of such applications won't be maintained unless strict measures on security and authenticity are applied. This chapter explores the e-voting process, reviews the authentication techniques and methods that are used in this process and proposed in the literature, and demonstrates few cases of applying e-voting systems from different countries in the world. Conclusions and proposed future work are stated at the end of the chapter.

Related Content

. © 2023.
. © 2023.
. © 2023.
. © 2023.
. © 2023.
. © 2023.
. © 2023.
Body Bottom