{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T09:13:52Z","timestamp":1770714832841,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,4]],"date-time":"2010-10-04T00:00:00Z","timestamp":1286150400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10,4]]},"DOI":"10.1145\/1866307.1866309","type":"proceedings-article","created":{"date-parts":[[2010,10,5]],"date-time":"2010-10-05T14:38:23Z","timestamp":1286289503000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":93,"title":["Security analysis of India's electronic voting machines"],"prefix":"10.1145","author":[{"given":"Scott","family":"Wolchok","sequence":"first","affiliation":[{"name":"The University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Eric","family":"Wustrow","sequence":"additional","affiliation":[{"name":"The University of Michigan, Ann Arbor, MI, USA"}]},{"given":"J. Alex","family":"Halderman","sequence":"additional","affiliation":[{"name":"The University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Hari K.","family":"Prasad","sequence":"additional","affiliation":[{"name":"Netindia, (P) Ltd., Hyderabad, India"}]},{"given":"Arun","family":"Kankipati","sequence":"additional","affiliation":[{"name":"Netindia, (P) Ltd., Hyderabad, India"}]},{"given":"Sai Krishna","family":"Sakhamuri","sequence":"additional","affiliation":[{"name":"Netindia, (P) Ltd., Hyderabad, India"}]},{"given":"Vasavya","family":"Yagati","sequence":"additional","affiliation":[{"name":"Netindia, (P) Ltd., Hyderabad, India"}]},{"given":"Rop","family":"Gonggrijp","sequence":"additional","affiliation":[{"name":"None, Amsterdam, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2010,10,4]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"20","volume-title":"Report of the expert committee for evaluation of the upgraded electronic voting machine (EVM)","author":"Agarwala A. K.","year":"2006","unstructured":"}} A. K. Agarwala , D. T. Shahani , and P. V. Indiresan . Report of the expert committee for evaluation of the upgraded electronic voting machine (EVM) . Sept. 2006 . http:\/\/www.scribd.com\/doc\/6794194\/ Expert-Committee-Report-on-EVM , pages 2{ 20 . }}A. K. Agarwala, D. T. Shahani, and P. V. Indiresan. Report of the expert committee for evaluation of the upgraded electronic voting machine (EVM). Sept. 2006. http:\/\/www.scribd.com\/doc\/6794194\/ Expert-Committee-Report-on-EVM, pages 2{20."},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. Second USENIX Workshop on Electronic Commerce","author":"Anderson R.","year":"1996","unstructured":"}} R. Anderson and M. Kuhn . Tamper resistance: A cautionary note . In Proc. Second USENIX Workshop on Electronic Commerce , Oakland, CA , 1996 . }}R. Anderson and M. Kuhn. Tamper resistance: A cautionary note. In Proc. Second USENIX Workshop on Electronic Commerce, Oakland, CA, 1996."},{"key":"e_1_3_2_1_3_1","volume-title":"Certification of","author":"Appel A. W.","year":"2008","unstructured":"}} A. W. Appel . Certification of December 1, 2008 . http:\/\/citp.princeton.edu\/voting\/advantage\/seals\/ appel-dec08-certif.pdf. }}A. W. Appel. Certification of December 1, 2008. http:\/\/citp.princeton.edu\/voting\/advantage\/seals\/ appel-dec08-certif.pdf."},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections (EVT\/WOTE)","author":"Appel A. W.","year":"2009","unstructured":"}} A. W. Appel , M. Ginsburg , H. Hursti , B. W. Kernighan , C. D. Richards , G. Tan , and P. Venetis . The New Jersey voting-machine lawsuit and the AVC Advantage DRE voting machine . In Proc. Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections (EVT\/WOTE) , Montreal, Canada , Aug. 2009 . }}A. W. Appel, M. Ginsburg, H. Hursti, B. W. Kernighan, C. D. Richards, G. Tan, and P. Venetis. The New Jersey voting-machine lawsuit and the AVC Advantage DRE voting machine. In Proc. Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections (EVT\/WOTE), Montreal, Canada, Aug. 2009."},{"key":"e_1_3_2_1_5_1","volume-title":"Proc. USENIX\/ACCURATE Electronic Voting Technology Workshop (EVT)","author":"Aviv A.","year":"2008","unstructured":"}} A. Aviv , P. Cerny , S. Clark , E. Cronin , G. Shah , M. Sherr , and M. Blaze . Security evaluation of ES &S voting machines and election management system . In Proc. USENIX\/ACCURATE Electronic Voting Technology Workshop (EVT) , San Jose, CA , July 2008 . }}A. Aviv, P. Cerny, S. Clark, E. Cronin, G. Shah, M. Sherr, and M. Blaze. Security evaluation of ES &S voting machines and election management system. In Proc. USENIX\/ACCURATE Electronic Voting Technology Workshop (EVT), San Jose, CA, July 2008."},{"key":"e_1_3_2_1_6_1","volume-title":"California Secretary of State","author":"Bowen D.","year":"2007","unstructured":"}} D. Bowen . \"Top-to-Bottom\" Review (TTBR) of voting machines certified for use in California . California Secretary of State , Aug. 2007 . http:\/\/sos.ca.gov\/elections\/elections vsr.htm. }}D. Bowen. \"Top-to-Bottom\" Review (TTBR) of voting machines certified for use in California. California Secretary of State, Aug. 2007. http:\/\/sos.ca.gov\/elections\/elections vsr.htm."},{"key":"e_1_3_2_1_7_1","first-page":"4512","volume-title":"Dec.","author":"Brunner J.","year":"2007","unstructured":"}} J. Brunner . Evaluation & Validation of Election-Related Equipment, Standards & Testing (EVEREST). Ohio Secretary of State , Dec. 2007 . http:\/\/www.sos.state.oh.us\/SOS\/Text.aspx?page= 4512 . }}J. Brunner. Evaluation & Validation of Election-Related Equipment, Standards & Testing (EVEREST). Ohio Secretary of State, Dec. 2007. http:\/\/www.sos.state.oh.us\/SOS\/Text.aspx?page=4512."},{"key":"e_1_3_2_1_8_1","volume-title":"official English translation","author":"C","year":"2009","unstructured":"}}Bundesverfassungsgericht (German Constitutional Court). Judgment {...} 2 Bv C 3\/07, 2 Bv C 4\/07 , official English translation . Mar. 3, 2009 . http:\/\/www.bverfg.de\/ entscheidungen\/rs20090303 2bvc000307en.html. }}Bundesverfassungsgericht (German Constitutional Court). Judgment {...} 2 BvC 3\/07, 2 BvC 4\/07, official English translation. Mar. 3, 2009. http:\/\/www.bverfg.de\/ entscheidungen\/rs20090303 2bvc000307en.html."},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. EVT","author":"Butler K.","year":"2008","unstructured":"}} K. Butler , W. Enck , H. Hursti , S. McLaughlin , P. Traynor , and P. McDaniel . Systemic issues in the Hart InterCivic and Premier voting systems: Re ections on Project EVEREST . In Proc. EVT , San Jose, CA , July 2008 . }}K. Butler, W. Enck, H. Hursti, S. McLaughlin, P. Traynor, and P. McDaniel. Systemic issues in the Hart InterCivic and Premier voting systems: Re ections on Project EVEREST. In Proc. EVT, San Jose, CA, July 2008."},{"key":"e_1_3_2_1_10_1","volume-title":"Part of California TTBR","author":"Calandrino J. A.","year":"2007","unstructured":"}} J. A. Calandrino , A. J. Feldman , J. A. Halderman , D. Wagner , H. Yu , and W. P. Zeller . Source code review of the Diebold voting system . Part of California TTBR , Aug. 2007 . }}J. A. Calandrino, A. J. Feldman, J. A. Halderman, D. Wagner, H. Yu, and W. P. Zeller. Source code review of the Diebold voting system. Part of California TTBR, Aug. 2007."},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. EVT","author":"Calandrino J. A.","year":"2007","unstructured":"}} J. A. Calandrino , J. A. Halderman , and E. W. Felten . Machine-assisted election auditing . In Proc. EVT , Boston, MA , Aug. 2007 . }}J. A. Calandrino, J. A. Halderman, and E. W. Felten. Machine-assisted election auditing. In Proc. EVT, Boston, MA, Aug. 2007."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653711"},{"key":"e_1_3_2_1_13_1","author":"Chatterjee M.","year":"2009","unstructured":"}} M. Chatterjee . Tribal voters in Jharkhand reckon with EVM technology. In Indo-Asian News Service , Nov. 20, 2009 . }}M. Chatterjee. Tribal voters in Jharkhand reckon with EVM technology. In Indo-Asian News Service, Nov. 20, 2009.","journal-title":"Indo-Asian News Service"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1264852"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.70"},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. EVT\/WOTE","author":"Checkoway S.","year":"2009","unstructured":"}} S. Checkoway , A. J. Feldman , B. Kantor , J. A. Halderman , E. W. Felten , and H. Shacham . Can DREs provide long-lasting security? The case of return-oriented programming and the AVC Advantage . In Proc. EVT\/WOTE , Montreal, Canada , Aug. 2009 . }}S. Checkoway, A. J. Feldman, B. Kantor, J. A. Halderman, E. W. Felten, and H. Shacham. Can DREs provide long-lasting security? The case of return-oriented programming and the AVC Advantage. In Proc. EVT\/WOTE, Montreal, Canada, Aug. 2009."},{"key":"e_1_3_2_1_18_1","volume-title":"Interview with P. V. Indiresan","author":"IBN","year":"2009","unstructured":"}}CNN- IBN TV. Interview with P. V. Indiresan . July 20, 2009 . http:\/\/ibnlive.in.com\/videos\/97488\/ evms-rigged-poll-panel-challenges-doubters.html. }}CNN-IBN TV. Interview with P. V. Indiresan. July 20, 2009. http:\/\/ibnlive.in.com\/videos\/97488\/ evms-rigged-poll-panel-challenges-doubters.html."},{"key":"e_1_3_2_1_19_1","volume-title":"IDG News Service","author":"de Haes A. U.","year":"2008","unstructured":"}} A. U. de Haes . Dutch government bans electronic voting . In IDG News Service , May 19, 2008 . http:\/\/news.idg.no\/cw\/ art.cfm?id=003AE63C-17A4-0F78--31DDDC0DCFA62609. }}A. U. de Haes. Dutch government bans electronic voting. In IDG News Service, May 19, 2008. http:\/\/news.idg.no\/cw\/ art.cfm?id=003AE63C-17A4-0F78--31DDDC0DCFA62609."},{"key":"e_1_3_2_1_20_1","unstructured":"}}Election Commission of India. Election laws. http:\/\/eci.nic.in\/eci main\/ElectoralLaws\/electoral law.asp.  }}Election Commission of India. Election laws. http:\/\/eci.nic.in\/eci main\/ElectoralLaws\/electoral law.asp."},{"key":"e_1_3_2_1_21_1","volume-title":"Protocol for first level checking of EVMs before elections","author":"}}Election Commission of India.","year":"2007","unstructured":"}}Election Commission of India. Protocol for first level checking of EVMs before elections . Oct. 12, 2007 . http:\/\/eci.nic.in\/eci main\/CurrentElections\/ ECI Instructions\/ ins 121007g.pdf. }}Election Commission of India. Protocol for first level checking of EVMs before elections. Oct. 12, 2007. http:\/\/eci.nic.in\/eci main\/CurrentElections\/ ECI Instructions\/ins 121007g.pdf."},{"key":"e_1_3_2_1_22_1","volume-title":"Handbook for presiding officers","author":"}}Election Commission of India.","year":"2008","unstructured":"}}Election Commission of India. Handbook for presiding officers . 2008 . http:\/\/eci.nic.in\/eci main\/ElectoralLaws\/ HandBooks\/Handbook for Presiding Officers .pdf. }}Election Commission of India. Handbook for presiding officers. 2008. http:\/\/eci.nic.in\/eci main\/ElectoralLaws\/ HandBooks\/Handbook for Presiding Officers.pdf."},{"key":"e_1_3_2_1_23_1","volume-title":"Handbook for candidates","author":"}}Election Commission of India.","year":"2009","unstructured":"}}Election Commission of India. Handbook for candidates . 2009 . http:\/\/eci.nic.in\/eci main\/ElectoralLaws\/HandBooks\/ Handbook for Candidates .pdf. }}Election Commission of India. Handbook for candidates. 2009. http:\/\/eci.nic.in\/eci main\/ElectoralLaws\/HandBooks\/ Handbook for Candidates.pdf."},{"key":"e_1_3_2_1_24_1","volume-title":"Handbook for returning officers","author":"}}Election Commission of India.","year":"2009","unstructured":"}}Election Commission of India. Handbook for returning officers . 2009 . http:\/\/eci.nic.in\/eci main\/ElectoralLaws\/ HandBooks\/Handbook for Returning Officers .pdf. }}Election Commission of India. Handbook for returning officers. 2009. http:\/\/eci.nic.in\/eci main\/ElectoralLaws\/ HandBooks\/Handbook for Returning Officers.pdf."},{"key":"e_1_3_2_1_25_1","volume-title":"Schedule for general elections","author":"}}Election Commission of India.","year":"2009","unstructured":"}}Election Commission of India. Schedule for general elections , 2009 . Mar. 2009. http:\/\/www.elections.tn.nic.in\/forms\/pn020309.pdf. }}Election Commission of India. Schedule for general elections, 2009. Mar. 2009. http:\/\/www.elections.tn.nic.in\/forms\/pn020309.pdf."},{"key":"e_1_3_2_1_26_1","volume-title":"Information under RTI on EVMs","author":"}}Election Commission of India.","year":"2009","unstructured":"}}Election Commission of India. Information under RTI on EVMs . July 2009 . No. RTI\/ 2009-EMS\/39. }}Election Commission of India. Information under RTI on EVMs. July 2009. No. RTI\/2009-EMS\/39."},{"key":"e_1_3_2_1_27_1","first-page":"2009","author":"}}Election Commission of India. Electronic voting machines.","year":"2009","unstructured":"}}Election Commission of India. Electronic voting machines. Regarding. Aug. 8, 2009 . No. PN\/ECI\/41\/ 2009 . }}Election Commission of India. Electronic voting machines. Regarding. Aug. 8, 2009. No. PN\/ECI\/41\/2009.","journal-title":"Regarding."},{"key":"e_1_3_2_1_28_1","volume-title":"The Commission's reply to Sh. V. V. Rao","author":"}}Election Commission of India.","year":"2010","unstructured":"}}Election Commission of India. The Commission's reply to Sh. V. V. Rao . Mar. 29, 2010 . http:\/\/eci.nic.in\/eci main\/recent\/reply sh.VVRao.pdf. }}Election Commission of India. The Commission's reply to Sh. V. V. Rao. Mar. 29, 2010. http:\/\/eci.nic.in\/eci main\/recent\/reply sh.VVRao.pdf."},{"key":"e_1_3_2_1_29_1","volume-title":"Proc. EVT","author":"Feldman A. J.","year":"2007","unstructured":"}} A. J. Feldman , J. A. Halderman , and E. W. Felten . Security analysis of the Diebold AccuVote-TS voting machine . In Proc. EVT , Boston, MA , Aug. 2007 . }}A. J. Feldman, J. A. Halderman, and E. W. Felten. Security analysis of the Diebold AccuVote-TS voting machine. In Proc. EVT, Boston, MA, Aug. 2007."},{"key":"e_1_3_2_1_30_1","volume-title":"Proc. EVT","author":"Gonggrijp R.","year":"2007","unstructured":"}} R. Gonggrijp and W.-J. Hengeveld . Studying the Nedap\/Groenendaal ES3B voting computer: A computer security perspective . In Proc. EVT , Boston, MA , Aug. 2007 . }}R. Gonggrijp and W.-J. Hengeveld. Studying the Nedap\/Groenendaal ES3B voting computer: A computer security perspective. In Proc. EVT, Boston, MA, Aug. 2007."},{"key":"e_1_3_2_1_31_1","volume-title":"The New York Times","author":"Goodnough A.","year":"2007","unstructured":"}} A. Goodnough and C. Drew . Florida to shift voting system with paper trail . In The New York Times , Feb. 2, 2007 . }}A. Goodnough and C. Drew. Florida to shift voting system with paper trail. In The New York Times, Feb. 2, 2007."},{"key":"e_1_3_2_1_32_1","unstructured":"}}The IDA Pro disassembler and debugger. http:\/\/www.hex-rays.com\/idapro\/.  }}The IDA Pro disassembler and debugger. http:\/\/www.hex-rays.com\/idapro\/."},{"key":"e_1_3_2_1_33_1","volume-title":"Minister Gormley announces Government decision to end electronic voting and counting project","author":"}}Irish Department of the Environment, Heritage & Local Government.","year":"2009","unstructured":"}}Irish Department of the Environment, Heritage & Local Government. Minister Gormley announces Government decision to end electronic voting and counting project . Apr. 23, 2009 . http:\/\/www.environ.ie\/en\/LocalGovernment\/Voting\/News\/MainBody,20056,en.htm. }}Irish Department of the Environment, Heritage & Local Government. Minister Gormley announces Government decision to end electronic voting and counting project. Apr. 23, 2009. http:\/\/www.environ.ie\/en\/LocalGovernment\/Voting\/News\/MainBody,20056,en.htm."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1511\/2006.62.1008"},{"key":"e_1_3_2_1_35_1","first-page":"21","volume-title":"Report of the expert committee for the technical evaluation of the electronic voting machine","author":"Kasarbada C. R.","year":"1990","unstructured":"}} C. R. Kasarbada , P. V. Indiresan , and S. Sampath . Report of the expert committee for the technical evaluation of the electronic voting machine . Apr. 1990 . http:\/\/www.scribd.com\/doc\/6794194\/ Expert-Committee-Report-on-EVM , pages 21 -- 37 . }}C. R. Kasarbada, P. V. Indiresan, and S. Sampath. Report of the expert committee for the technical evaluation of the electronic voting machine. Apr. 1990. http:\/\/www.scribd.com\/doc\/6794194\/ Expert-Committee-Report-on-EVM, pages 21--37."},{"key":"e_1_3_2_1_36_1","first-page":"5","volume":"9","author":"A.","year":"1883","unstructured":"}} A. Kerckho s. La cryptographie militaire. In Journal des Sciences Militaires , 9 : 5 {38, Jan. 1883 , :161--191, Feb. 1883. }}A. Kerckho s. La cryptographie militaire. In Journal des Sciences Militaires, 9:5{38, Jan. 1883, :161--191, Feb. 1883.","journal-title":"Journal des Sciences Militaires"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/1387709.1387714"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301313"},{"key":"e_1_3_2_1_39_1","volume-title":"The Hindu","author":"Kumar R. K.","year":"2004","unstructured":"}} R. K. Kumar . The business of 'black-marking' voters . In The Hindu , Mar. 17, 2004 . http:\/\/www.hindu.com\/2004\/03\/17\/ stories\/2004031700571300.htm. }}R. K. Kumar. The business of 'black-marking' voters. In The Hindu, Mar. 17, 2004. http:\/\/www.hindu.com\/2004\/03\/17\/ stories\/2004031700571300.htm."},{"key":"e_1_3_2_1_40_1","volume-title":"The Daily Star","author":"Liton S.","year":"2010","unstructured":"}} S. Liton . E-voting in DCC polls . In The Daily Star , Apr. 14, 2010 . http:\/\/www.thedailystar.net\/newDesign\/ news-details.php?nid=134325. }}S. Liton. E-voting in DCC polls. In The Daily Star, Apr. 14, 2010. http:\/\/www.thedailystar.net\/newDesign\/ news-details.php?nid=134325."},{"key":"e_1_3_2_1_41_1","volume-title":"http:\/\/rahulmehta.com\/evm1.pdf","author":"Mehta R.","year":"2009","unstructured":"}} R. Mehta . How 100,00 0 EVMs can be tampered by just 10{12 people at top. http:\/\/rahulmehta.com\/evm1.pdf , 2009 . }}R. Mehta. How 100,000 EVMs can be tampered by just 10{12 people at top. http:\/\/rahulmehta.com\/evm1.pdf, 2009."},{"key":"e_1_3_2_1_43_1","volume-title":"Practical high-certainty intent verification for encrypted votes","author":"Ne C. A.","year":"2004","unstructured":"}} C. A. Ne . Practical high-certainty intent verification for encrypted votes . Oct. 2004 . http:\/\/votehere.com\/old\/vhti\/ documentation\/vsv-2.0.3638.pdf. }}C. A. Ne . Practical high-certainty intent verification for encrypted votes. Oct. 2004. http:\/\/votehere.com\/old\/vhti\/ documentation\/vsv-2.0.3638.pdf."},{"key":"e_1_3_2_1_44_1","volume-title":"Proc. 17th USENIX Security Symposium","author":"Nohl K.","year":"2008","unstructured":"}} K. Nohl and D. Evans . Reverse-engineering a cryptographic RFID tag . In Proc. 17th USENIX Security Symposium , San Jose, CA , July 2008 . }}K. Nohl and D. Evans. Reverse-engineering a cryptographic RFID tag. In Proc. 17th USENIX Security Symposium, San Jose, CA, July 2008."},{"key":"e_1_3_2_1_45_1","unstructured":"}}Office of Chief Electoral Officer Delhi. Documentary on preparation of EVM at R.O. level. http:\/\/www.youtube.com\/watch?v=wRJQTTrumNI.  }}Office of Chief Electoral Officer Delhi. Documentary on preparation of EVM at R.O. level. http:\/\/www.youtube.com\/watch?v=wRJQTTrumNI."},{"key":"e_1_3_2_1_46_1","volume-title":"Proc. IAVoSS Workshop on Trustworthy Elections (WOTE)","author":"Popoveniuc S.","year":"2006","unstructured":"}} S. Popoveniuc and B. Hosp . An introduction to Punchscan . In Proc. IAVoSS Workshop on Trustworthy Elections (WOTE) , Cambridge, UK , Oct. 2006 . }}S. Popoveniuc and B. Hosp. An introduction to Punchscan. In Proc. IAVoSS Workshop on Trustworthy Elections (WOTE), Cambridge, UK, Oct. 2006."},{"key":"e_1_3_2_1_47_1","volume-title":"South Africa approach BEL for EVMs","year":"2009","unstructured":"}}Press Trust of India. Singapore, Malaysia , South Africa approach BEL for EVMs . Apr. 12, 2009 . http:\/\/www.hindu.com\/thehindu\/holnus\/002200904121051.htm. }}Press Trust of India. Singapore, Malaysia, South Africa approach BEL for EVMs. Apr. 12, 2009. http:\/\/www.hindu.com\/thehindu\/holnus\/002200904121051.htm."},{"key":"e_1_3_2_1_48_1","volume-title":"Compulsory voting not practical, says CEC","year":"2010","unstructured":"}}Press Trust of India. Compulsory voting not practical, says CEC . Apr. 26, 2010 . http:\/\/news.redi .com\/report\/2010\/ apr\/26\/compulsory-voting-not-practical-says-cec.htm. }}Press Trust of India. Compulsory voting not practical, says CEC. Apr. 26, 2010. http:\/\/news.redi .com\/report\/2010\/ apr\/26\/compulsory-voting-not-practical-says-cec.htm."},{"key":"e_1_3_2_1_49_1","volume-title":"Trusted agent report: Diebold AccuVote-TS voting system","author":"Innovative Solution Cell RABA","year":"2004","unstructured":"}} RABA Innovative Solution Cell . Trusted agent report: Diebold AccuVote-TS voting system . Jan. 2004 . }}RABA Innovative Solution Cell. Trusted agent report: Diebold AccuVote-TS voting system. Jan. 2004."},{"key":"e_1_3_2_1_50_1","volume-title":"Transparency & Accountability in Elections","author":"Rao V.L. N.","year":"2010","unstructured":"}}G. V.L. N. Rao . Democracy at Risk! Citizens for Verifiability , Transparency & Accountability in Elections , New Delhi , 2010 . http:\/\/indianevm.com\/book.php. }}G.V.L. N. Rao. Democracy at Risk! Citizens for Verifiability, Transparency & Accountability in Elections, New Delhi, 2010. http:\/\/indianevm.com\/book.php."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015047.1015049"},{"key":"e_1_3_2_1_52_1","unstructured":"}}R. L. Rivest and J. P. Wack. On the notion of \"software independence\" in voting systems. http:\/\/vote.nist.gov\/SI-in-voting.pdf 2006.  }}R. L. Rivest and J. P. Wack. On the notion of \"software independence\" in voting systems. http:\/\/vote.nist.gov\/SI-in-voting.pdf 2006."},{"key":"e_1_3_2_1_53_1","volume-title":"Proc. 15th USENIX Security Symposium","author":"Sastry N.","year":"2006","unstructured":"}} N. Sastry , T. Kohno , and D. Wagner . Designing voting machines for verification . In Proc. 15th USENIX Security Symposium , Vancouver, Canada , July 2006 . }}N. Sastry, T. Kohno, and D. Wagner. Designing voting machines for verification. In Proc. 15th USENIX Security Symposium, Vancouver, Canada, July 2006."},{"key":"e_1_3_2_1_54_1","volume-title":"Risk assessment report: Diebold AccuVote-TS voting system and processes","author":"}}Science Applications International Corporation","year":"2003","unstructured":"}}Science Applications International Corporation . Risk assessment report: Diebold AccuVote-TS voting system and processes . Sept. 2003 . }}Science Applications International Corporation. Risk assessment report: Diebold AccuVote-TS voting system and processes. Sept. 2003."},{"key":"e_1_3_2_1_55_1","volume-title":"Proc. 15th USENIX Security Symposium","author":"Shah G.","year":"2006","unstructured":"}} G. Shah , A. Molina , and M. Blaze . Keyboards and covert channels . In Proc. 15th USENIX Security Symposium , Vancouver, Canada , July 2006 . }}G. Shah, A. Molina, and M. Blaze. Keyboards and covert channels. In Proc. 15th USENIX Security Symposium, Vancouver, Canada, July 2006."},{"key":"e_1_3_2_1_56_1","unstructured":"}}UNICEF. India statistics. http:\/\/www.unicef.org\/infobycountry\/india statistics.html  }}UNICEF. India statistics. http:\/\/www.unicef.org\/infobycountry\/india statistics.html"},{"key":"e_1_3_2_1_57_1","unstructured":"}}Wikipedia. Results of the 2009 Indian general election by parliamentary constituency. http:\/\/en.wikipedia.org\/w\/ index.php?title=Results of the 2009 Indian general election by parliamentary constituency &oldid=347683199  }}Wikipedia. Results of the 2009 Indian general election by parliamentary constituency. http:\/\/en.wikipedia.org\/w\/ index.php?title=Results of the 2009 Indian general election by parliamentary constituency &oldid=347683199"}],"event":{"name":"CCS '10: 17th ACM Conference on Computer and Communications Security 2010","location":"Chicago Illinois USA","acronym":"CCS '10","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 17th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1866307.1866309","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1866307.1866309","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:09:06Z","timestamp":1750248546000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1866307.1866309"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10,4]]},"references-count":55,"alternative-id":["10.1145\/1866307.1866309","10.1145\/1866307"],"URL":"https:\/\/doi.org\/10.1145\/1866307.1866309","relation":{},"subject":[],"published":{"date-parts":[[2010,10,4]]},"assertion":[{"value":"2010-10-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}