
Jurlind BudurushiQatar University · Department of Computer Science and Engineering
Jurlind Budurushi
Dr.-Ing.
About
31
Publications
12,427
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
183
Citations
Citations since 2017
Publications
Publications (31)
Trust in an election system has been commonly recognized as a crucial factor in the adoption of the system and in ensuring that voters as well as participating parties accept the election outcome as legitimate. Ensuring and maintaining such trust, however, can be challenging , particularly in systems that involve advanced technologies-thus, technol...
Seit Beginn der Pandemie stehen viele Institutionen (inkl. Vereinen, Unternehmen und Behörden) vor der Frage, wie sie ihre Wahlen und geheimen Abstimmungen organisieren sollen – ohne die Gesundheit der Wähler*innen und Wahlhelfer*innen zu gefährden. Einige Wahlverantwortliche haben sich für die Durchführung von Online-Wahlen bzw. digitalen Abstimmu...
Risk-limiting audits (RLAs), an ingredient in evidence-based elections, are increasingly common. They are a rigorous statistical means of ensuring that electoral results are correct, usually without having to perform an expensive full recount—at the cost of some controlled probability of error. A recently developed approach for conducting RLAs, SHA...
Risk-limiting audits (RLAs), an ingredient in evidence-based elections, are increasingly common. They are a rigorous statistical means of ensuring that electoral results are correct, usually without having to perform an expensive full recount -- at the cost of some controlled probability of error. A recently developed approach for conducting RLAs,...
This paper describes the introduction of electronic voter identification, voting and tallying in the parliamentary elections on April 25, 2021 in Albania. First, we outline the legal framework regarding the use of technology in elections. Further, we describe, in a chronological order, the most relevant steps that paved the way towards the use of e...
A widely discussed issue in Internet voting is the secure platform problem: ensuring vote secrecy and/or vote integrity in the presence of compromised voting devices. A well-known approach to address this issue is code voting. Code voting systems differ regarding their security level: some ensure either vote secrecy or vote integrity, while others...
In general, most elections follow the principle of equality, or as it came to be known, the principle of “one person – one vote”. However, this principle might pose difficulties for voters, who are not well informed regarding the particular matter that is voted on. In order to address this issue, a new form of voting has been proposed, namely proxy...
Code voting systems differ in security: some ensure either vote secrecy or vote integrity, while others ensure both. However, these systems potentially impair usability, which might negatively affect voters' attitude toward Internet voting. To determine the tradeoff between usability and security in these systems, the authors conduct a pilot user s...
Voting over the Internet is subject to a number of security requirements. Each voting scheme has its own bespoke set of assumptions to ensure these security requirements. The criticality of these assumptions depends on the election setting (e.g., how trustworthy the voting servers or the voting devices are). The consequence of this is that the secu...
In general, most elections follow the principle of equality, or as it came to be known, the principle of ``one man -- one vote''. However, this principle might pose difficulties for voters, who are not well informed regarding the particular matter that is voted on. In order to address this issue, a new form of voting has been proposed, namely proxy...
Das Projekt „E-Mail made in Germany“ wurde als Reaktion auf die Enthüllungen von Edward Snowden initiiert. Es ist das erklärte Ziel, den E-Mail-Nutzern in Deutschland einen hohen Sicherheits- und Datenschutzstandard anzubieten. Das Produkt wurde mit einer breit angelegten Werbekampagne beworben. Im Mittelpunkt der Kampagne stand ein 30sekündiger TV...
Many studies on electronic voting evaluate their usability in the context of simple elections. Complex elections, which take place in many European countries, also merit attention. The complexity of the voting process, as well as that of the tallying and verification of the ballots, makes usability even more crucial in this context. Complex electio...
Efficiency is the bottleneck of many cryptographic protocols towards their practical application in different contexts. This holds true also in the context of electronic voting, where cryptographic protocols are used to ensure a diversity of security requirements, e.g. secrecy and integrity of cast votes. A new and promising application area of ele...
This study explored the attitudes of a broad sample of politically interested Swedish voters towards Internet voting. A total of 5683 participants completed a web-based survey concerning participation and security aspects of Internet voting. Attitudes towards Internet voting were positive on the whole and the acceptance of participation in democrat...
The German federal constitutional court ruled, in 2009, that elections had to have a public nature. EasyVote, a promising hybrid electronic voting system for conducting elections with complex voting rules and huge ballots, meets this requirement. Two assumptions need to hold, however. The first is that voters will verify the human-readable part of...
Advances in information technology have simplified many processes in our lives. However, in many cases trust issues arise when new technology is introduced, and voting is one prominent example. To increase voters’ trust, current e-voting systems provide paper audit trails (PATs) which enable automatic tally and/or manual audit of the election resul...
In 2009 the German Federal Constitutional Court introduced the principle of “public nature of elections” (Federal Constitutional Court of Germany, March 2009). This principle requires that when using electronic voting systems it must be possible for the citizen to verify the essential steps in the election process and in the ascertainment of the re...
Internet voting continues to raise interest. A large number of Internet voting schemes are available, both in use, as well as in research literature. While these schemes are all based on different security models, most of these models are not adequate for high-stake elections. Furthermore, it is not known how to evaluate the understandability of th...
In our society a rising number of people change their residence regularly. Insofar, mobility seems to be necessary even on Election Day, which is the reason why an increasing number of eligible voters use the opportunity of postal voting. Thereby, the abidance by the election principles, especially the freedom and secrecy of elections, is automatic...
Recently, the interest in electronic voting has increased as more and more states have started to implement such systems. At the same time, classical national ID cards are often being replaced by national electronic ID cards which enable citizens to securely identify and authenticate themselves over the Internet. Despite their popularity, the possi...
Election systems making use of eVoting machines are becoming more prevalent. However, security issues do exist within current products and proposed systems. One of these issues is the occurrence of implementation-specific information leakage, otherwise known as side-channel leakage. These have serious implications for voter secrecy. An attack based...
Some ballots such as those for local elections in Germany contain more than 500 candidates, allow for more than 70 votes and the system allows voters to perform cumulative voting, vote splitting and crossing out of candidates which results in huge ballot papers containing only one race. As none of the existing electronic voting systems seem to be f...
Projects
Projects (2)
Trust in the security of election systems, particularly in their ability to prevent vote manipulation, is crucial for elections in a democratic society. Such trust can be fragile, especially in presence of deliberate disinformation efforts, and is particularly hard to ensure for systems that rely on technologies that are difficult to understand for lay people. There is therefore a need for methods for effective trust communication, aimed at different stakeholders involved in elections and taking into account their mental models of election security risks.
In this project, we aim to develop such methods using human-centered security by design approach, integrating quantitative and qualitative empirical studies together with technical security analysis of election systems. We propose ways to build systems so that their trust can be effectively communicated, and furthermore take into account the social aspect of elections.