<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2007-3607</journal-id>
<journal-title><![CDATA[PAAKAT: revista de tecnología y sociedad]]></journal-title>
<abbrev-journal-title><![CDATA[PAAKAT: rev. tecnol. soc.]]></abbrev-journal-title>
<issn>2007-3607</issn>
<publisher>
<publisher-name><![CDATA[Universidad de Guadalajara, Sistema de Universidad Virtual]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2007-36072018000200001</article-id>
<article-id pub-id-type="doi">10.32870/pk.a8n14.325</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Mecanismo de auditoría para detección de manipulación de votos en sistemas de votación electrónica]]></article-title>
<article-title xml:lang="en"><![CDATA[Audit Mechanism for Detecting Voting Manipulation in Electronic Voting Systems]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Morales Rocha]]></surname>
<given-names><![CDATA[Víctor]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Ruiz Hernández]]></surname>
<given-names><![CDATA[Óscar]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Fernández Martínez]]></surname>
<given-names><![CDATA[Luis Felipe]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad Autónoma de Ciudad Juárez  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad Autónoma de Ciudad Juárez  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af3">
<institution><![CDATA[,Universidad Autónoma de Ciudad Juárez  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>00</month>
<year>2018</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>00</month>
<year>2018</year>
</pub-date>
<volume>8</volume>
<numero>14</numero>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S2007-36072018000200001&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S2007-36072018000200001&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S2007-36072018000200001&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[Resumen: Los sistemas de voto electrónico son propensos a fallas, errores y ataques intencionales. Un riesgo de estos sistemas es la adición o eliminación de votos directamente en el medio de almacenamiento, usualmente una base de datos. Existen diversos mecanismos diseñados para prevenir, detectar o mitigar las amenazas que pudieran atentar contra la integridad de los resultados de una elección que hace uso de medios electrónicos. Este trabajo presenta una revisión de los diversos mecanismos de auditoría para sistemas de voto electrónico. Además, se presenta una propuesta de generación y protección de logs en sistemas de voto electrónico remoto, con el fin de detectar manipulaciones en los votos almacenados.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[Abstract: Electronic voting systems are prone to faults, errors and intentional attacks. One risk is the addition of fake votes (stuffing) that can be carried out by an external or internal entity. There are several audit mechanisms intended to prevent, detect and / or mitigate any threats that could undermine the election results. This paper presents a review and evaluation of the different mechanisms used to conduct an election auditfor electronic voting systems. Also, an audit mechanism to detect ballot stuffing or any other manipulation on votes is presented.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[Voto electrónico]]></kwd>
<kwd lng="es"><![CDATA[seguridad en voto electrónico]]></kwd>
<kwd lng="es"><![CDATA[manipulación de votos]]></kwd>
<kwd lng="es"><![CDATA[logs]]></kwd>
<kwd lng="es"><![CDATA[auditoría]]></kwd>
<kwd lng="en"><![CDATA[Electronic voting]]></kwd>
<kwd lng="en"><![CDATA[electronic voting security]]></kwd>
<kwd lng="en"><![CDATA[ballot manipulation]]></kwd>
<kwd lng="en"><![CDATA[logs]]></kwd>
<kwd lng="en"><![CDATA[audit]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Adida]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<source><![CDATA[Helios: Web-based Open-Audit Voting]]></source>
<year>2006</year>
<conf-name><![CDATA[ 17th USENIX Security Simposium]]></conf-name>
<conf-loc>Vancouver, Canada </conf-loc>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Alcaraz]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Aragon]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Brienen]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Fiallo]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[Friguls]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Gomez]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[Final report of the Miami Dade County grand jury: Report 2012]]></source>
<year>2012</year>
<publisher-loc><![CDATA[Miami, USA ]]></publisher-loc>
<publisher-name><![CDATA[Miami Dade County grand jury]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chaum]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Essex]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Carback]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Clark]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Popuveniuc]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Sherman]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Vora]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Scantegrity: End-to-End Voter-Verifiable Optical- Scan Voting]]></article-title>
<source><![CDATA[IEEE Transactions on Information Forensics and Security]]></source>
<year>2009</year>
<volume>4</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>611-27</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Fan]]></surname>
<given-names><![CDATA[Chun-I]]></given-names>
</name>
<name>
<surname><![CDATA[Sun]]></surname>
<given-names><![CDATA[Wei-Zhe]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An efficient multi-receipt mechanism for uncoercible anonymous electronic voting]]></article-title>
<source><![CDATA[Mathematical and Computer Modelling]]></source>
<year>2008</year>
<volume>48</volume>
<page-range>1611-27</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bellare]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Yee]]></surname>
<given-names><![CDATA[B]]></given-names>
</name>
</person-group>
<source><![CDATA[Forward integrity for secure audit logs]]></source>
<year>1997</year>
<publisher-loc><![CDATA[University of California at San Diego ]]></publisher-loc>
<publisher-name><![CDATA[Dept. of Computer Science &amp; Engineering]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bernhard]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Benaloh]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Halderman]]></surname>
<given-names><![CDATA[J. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Rivest]]></surname>
<given-names><![CDATA[R. L.]]></given-names>
</name>
<name>
<surname><![CDATA[A. Ryan]]></surname>
<given-names><![CDATA[P. Y.]]></given-names>
</name>
<name>
<surname><![CDATA[Stark]]></surname>
<given-names><![CDATA[P. B.]]></given-names>
</name>
<name>
<surname><![CDATA[Wallach]]></surname>
<given-names><![CDATA[D. S.]]></given-names>
</name>
</person-group>
<source><![CDATA[Public Evidence from Secret Ballots]]></source>
<year>2017</year>
<conf-name><![CDATA[ 2nd Joint International Conference on Electronic Voting E-VOTE-ID 2017]]></conf-name>
<conf-loc>Lochau/Bregenz </conf-loc>
<page-range>419</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bretschneider]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Flaherty]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Goodman]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Halvorson]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Jinston]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Linderman]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Risk-Limiting Post-Election Audits: Why and How]]></source>
<year>2012</year>
<publisher-loc><![CDATA[California, USA ]]></publisher-loc>
<publisher-name><![CDATA[Risk-Limiting Audits Working Group]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Morales]]></surname>
<given-names><![CDATA[V]]></given-names>
</name>
</person-group>
<source><![CDATA[Seguridad en los Procesos de Voto Electrónico Remoto]]></source>
<year>2009</year>
<publisher-loc><![CDATA[Barcelona, España ]]></publisher-loc>
<publisher-name><![CDATA[Universidad Politecnica de Cataluña]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mus]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Sabir Kiraz]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Cenk]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Sertkaya]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Estonian Voting Verification Mechanism Revisited]]></article-title>
<source><![CDATA[CoRR, abs/1612.00668]]></source>
<year>2016</year>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Riera]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Puiggali]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Pnyx Software Requirements Document]]></source>
<year>2004</year>
<publisher-name><![CDATA[Scytl]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rivest]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<source><![CDATA[Audit On Estimating the Size of a Statistical.]]></source>
<year>2006</year>
<publisher-name><![CDATA[MIT Computer Science &amp; Artificial Intelligence Lab]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rivest]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<source><![CDATA[ClipAudit: A Simple Risk-Limiting Post-Election Audit]]></source>
<year>2017</year>
<publisher-name><![CDATA[MIT Computer Science &amp; Artificial Intelligence Lab]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Schneier]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Kelsey]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[Cryptographic Support for Secure Logs on Untrusted Machines.]]></source>
<year>1998</year>
<conf-name><![CDATA[ 7th Conference on USENIX Security Simposium]]></conf-name>
<conf-loc>San Antonio, TX, USA </conf-loc>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sandler]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Derr]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Crosby]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Wallach]]></surname>
<given-names><![CDATA[D]]></given-names>
</name>
</person-group>
<source><![CDATA[Finding the Evidence in Tamper-evident Logs]]></source>
<year>2008</year>
<conf-name><![CDATA[ 3rd International Workshop on Systematic Approaches to Digital Forensics Engineering]]></conf-name>
<conf-loc> </conf-loc>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stanislevic]]></surname>
<given-names><![CDATA[H]]></given-names>
</name>
</person-group>
<source><![CDATA[Random auditing of e-voting systems: How much is enough?]]></source>
<year>2006</year>
<publisher-name><![CDATA[National Coalition for Election Integrity]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stark]]></surname>
<given-names><![CDATA[P. B.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Conservative Statistical Post-Election Audits]]></article-title>
<source><![CDATA[The Annals of Applied Statistics]]></source>
<year>2008</year>
<volume>2</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>550-81</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stark]]></surname>
<given-names><![CDATA[P. B]]></given-names>
</name>
</person-group>
<source><![CDATA[Why small audit batches are more efficient: two heuristic explanations]]></source>
<year>2010</year>
<publisher-name><![CDATA[University of California, Berkeley - Department of Statistics]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Stark]]></surname>
<given-names><![CDATA[P. B]]></given-names>
</name>
</person-group>
<source><![CDATA[Tools for comparison risk-limiting election audits]]></source>
<year>2015</year>
<publisher-name><![CDATA[Recuperado de University of California]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="book">
<collab>Verified Voting</collab>
<source><![CDATA[State Audit Laws Searchable Database]]></source>
<year>2017</year>
<publisher-name><![CDATA[State Audit Laws Searchable Database]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="book">
<collab>VVSG</collab>
<source><![CDATA[Election Assistance Commision.]]></source>
<year>2005</year>
<publisher-name><![CDATA[Election Assistance Commision]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Yasinsac]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Bishop]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The Dynamics of Counting and Recounting Votes]]></article-title>
<source><![CDATA[IEEE Security and Privacy]]></source>
<year>2008</year>
<volume>6</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>22-9</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
