Discovery Logo
Sign In
Paper
Search Paper
Cancel
Pricing Sign In
  • My Feed iconMy Feed
  • Search Papers iconSearch Papers
  • Library iconLibrary
  • Explore iconExplore
  • Ask R Discovery iconAsk R Discovery Star Left icon
  • Chat PDF iconChat PDF Star Left icon
  • Citation Generator iconCitation Generator
  • Chrome Extension iconChrome Extension
    External link
  • Use on ChatGPT iconUse on ChatGPT
    External link
  • iOS App iconiOS App
    External link
  • Android App iconAndroid App
    External link
  • Contact Us iconContact Us
    External link
  • Paperpal iconPaperpal
    External link
  • Mind the Graph iconMind the Graph
    External link
  • Journal Finder iconJournal Finder
    External link
Discovery Logo menuClose menu
  • My Feed iconMy Feed
  • Search Papers iconSearch Papers
  • Library iconLibrary
  • Explore iconExplore
  • Ask R Discovery iconAsk R Discovery Star Left icon
  • Chat PDF iconChat PDF Star Left icon
  • Citation Generator iconCitation Generator
  • Chrome Extension iconChrome Extension
    External link
  • Use on ChatGPT iconUse on ChatGPT
    External link
  • iOS App iconiOS App
    External link
  • Android App iconAndroid App
    External link
  • Contact Us iconContact Us
    External link
  • Paperpal iconPaperpal
    External link
  • Mind the Graph iconMind the Graph
    External link
  • Journal Finder iconJournal Finder
    External link

Related Topics

  • Internet Voting Protocol
  • Internet Voting Protocol
  • Cryptographic Protocols
  • Cryptographic Protocols
  • Security Protocols
  • Security Protocols

Articles published on Voting Protocols

Authors
Select Authors
Journals
Select Journals
Duration
Select Duration
220 Search results
Sort by
Recency
  • Research Article
  • 10.14419/v717s146
Analyzing The Trade-Off between Anonymity and Verifiability in Electronic ‎Voting Protocols
  • Oct 25, 2025
  • International Journal of Basic and Applied Sciences
  • Teguh Nurhadi Suharsono + 5 more

E-voting, also known as electronic voting, is the practice of casting a ballot or voting using digital technology. ‎Verifiability and anonymity are two important considerations in this situation. The study aims to find the optimal balance between these two crucial concepts, specifically the method of value range area (trade-off) between anonymity and verifiability in e-voting protocols. High levels of e-voting verifiability and anonymity are combined in this value range. ‎The result should be an electronic voting system that protects voters' rights to privacy while promoting confidence in ‎and transparency surrounding election outcomes. This study evaluated several current e-voting protocols to see which ‎ones came closest to the ideal harmony between anonymity and verifiability, utilizing verifiability calculation metrics ‎and anonymity calculation metrics. The balancing area was divided into 4 areas in this investigation. The study's area ‎of balance between verifiability and anonymity can demonstrate that the e-voting protocol is in the ideal category ‎region for such a protocol. After examining numerous e-voting procedures, some issues have finally been identified. ‎The e-voting protocol is ideal because Area 2 is the area where anonymity and verifiability have ideal degree values. ‎E-voting enhancement verifiability protocols are examples of protocols that achieve the perfect balance between ‎anonymity and verifiability‎.

  • Research Article
  • 10.1287/mnsc.2023.03649
Incentivizing Information Exchange Within Groups: The Role of Voting Protocols in U.S. Food and Drug Administration Advisory Committees
  • Oct 17, 2025
  • Management Science
  • Panos Markou + 1 more

Complex and important decisions are often made with advice from a committee of experts. But how do a committee’s “rules of engagement” affect the way individuals discuss, how they vote, and ultimately the quality of their collective recommendation? Compiling verbatim transcripts from U.S. Food and Drug Administration advisory committee meetings, we study how a 2007 switch from sequential to simultaneous voting procedures changed discussions, information exchange, and decision making. Consistent with past findings, we show that, compared with a sequential voting protocol, simultaneous voting led to a reduction in the likelihood of unanimous votes. Importantly, we show novel evidence that the majority of this reduction in unanimity was mediated by changes in discussion patterns—specifically, by the increased diversity of information surfaced during discussions. We also find evidence of behavioral and linguistic changes that support our theory that voting protocols changed the incentives for members to elicit more diverse information from each other: under simultaneous voting, members exhibited greater equality in talking time, directed a greater proportion of questions to each other, and adopted language that was more positive, authentic, and equal in projecting status and confidence. Finally, we show that recommendations under simultaneous voting were more likely to be accurate, as drugs recommended and approved were less likely to encounter safety-related postmarket events. In sum, voting protocols affect the incentives for individuals to engage in robust discussions, leading to marked improvements in how information is exchanged between individuals, and in the process by which groups of experts arrive at joint recommendations. This paper was accepted by Sridhar Tayur, entrepreneurship and innovation. Supplemental Material: The online appendix and data files are available at https://doi.org/10.1287/mnsc.2023.03649 .

  • Research Article
  • 10.56553/popets-2025-0101
Vote&Check: Secure Postal Voting with Reduced Trust Assumptions
  • Jul 1, 2025
  • Proceedings on Privacy Enhancing Technologies
  • Véronique Cortier + 3 more

Postal voting is a frequently used alternative to on-site voting.Traditionally, its security relies on organizational measures, andvoters have to trust many entities.In the recent years, several schemes have been proposed to addverifiability properties to postal voting, while preserving vote privacy. Postal voting comes with specific constraints. We conduct a systematic analysis of this setting and we identify a list of generic attacks, highlighting that some attacks seem unavoidable. This study is applied to existing systems of the literature. We then propose Vote&Check, a postal voting protocol which provides a high level of security, with a reduced number of authorities. Furthermore, it requires only basic cryptographic primitives, namely hash functions and signatures. The security properties are proven in a symbolic model, with the help of the ProVerif tool.

  • Research Article
  • 10.5817/mujlt2025-1-4
Evoting at the German Social Elections – Lessons Learnt
  • Jun 29, 2025
  • Masaryk University Journal of Law and Technology
  • Domenica Bagnato + 3 more

With an electorate of 52m the German Social Elections (Sozialwahl) is arguably one of the largest single elections in the European Union. It elects representatives of all people under social security and has been conducted through postal voting only for decades. In 2023 eVoting was introduced as an additional voting channel for the first time. This paper focuses specifically on the eVoting part, particularly the technical requirements and the voting protocol used. It analyses them against general voting principles and the relevant Recommendation of the Council of Europe.

  • Research Article
  • 10.62311/nesx/rphcrcscrbc2
Zero-Knowledge Proofs for Secure and Private Voting Systems
  • Jun 26, 2025
  • International Journal of Academic and Industrial Research Innovations(IJAIRI)
  • Murali Krishna Pasupuleti

As democratic processes increasingly transition to digital environments, safeguarding voter privacy and maintaining electoral integrity have become paramount. This study investigates the application of Zero-Knowledge Proofs (ZKPs) as a cryptographic framework for developing secure and private electronic voting systems. A comparative performance evaluation was conducted between ZKP-based voting protocols and traditional systems, focusing on key metrics such as validation time, privacy leakage index, and memory usage. Quantitative data analysis, supported by statistical methods including mean comparisons and standard deviation assessments, highlights the superiority of ZKP-based systems in minimizing information leakage while maintaining verifiability. Although ZKP protocols introduce higher memory consumption, the trade-off results in substantially enhanced voter anonymity and reduced validation latency. The findings suggest that ZKPs provide a scalable and efficient solution to the dual challenge of transparency and privacy in digital voting infrastructures. This research contributes to the growing body of work on cryptographic voting technologies and underscores the importance of balancing security with performance in the design of future e-voting systems. Keywords: Zero-Knowledge Proofs, E-voting, Cryptography, Privacy, Secure Voting Systems, Digital Democracy, Voter Anonymity, Cryptographic Protocols, Electoral Integrity, Privacy-Preserving Computation

  • Research Article
  • 10.52710/cfs.606
Quantum-Resistant Zero-Knowledge Proof Blockchain Electronic Voting System
  • Apr 4, 2025
  • Computer Fraud and Security
  • Pengsen Yu

Quantum-Resistant Zero-Knowledge Proof Blockchain Electronic Voting System

  • Research Article
  • Cite Count Icon 1
  • 10.1109/jiot.2024.3478231
Building Efficient and Flexible Voting Protocols: An Approach to Fairness and Anonymity
  • Feb 1, 2025
  • IEEE Internet of Things Journal
  • Yijie Shi + 6 more

Building Efficient and Flexible Voting Protocols: An Approach to Fairness and Anonymity

  • Research Article
  • 10.1007/s11128-025-04663-3
Novel quantum voting protocol for four-particle entangled states based on superdense coding
  • Jan 29, 2025
  • Quantum Information Processing
  • Hao-Wen Zhang + 2 more

Novel quantum voting protocol for four-particle entangled states based on superdense coding

  • Research Article
  • 10.54660/ijmfd.2025.6.2.71-79
Designing a Post-Quantum Blockchain Voting Protocol with Zero-Knowledge Proofs for Tamper-Resilient Electoral Infrastructure
  • Jan 1, 2025
  • International Journal of Multidisciplinary Futuristic Development
  • Funmi Eko Ezeh + 4 more

The growing threat posed by quantum computing to traditional cryptographic systems demands a radical redesign of digital voting architectures. This review explores the development of a post-quantum blockchain voting protocol, emphasizing the integration of zero-knowledge proofs (ZKPs) to ensure data privacy, voter anonymity, and verifiable election integrity. The study synthesizes advancements in lattice-based and hash-based cryptographic algorithms capable of withstanding quantum attacks and evaluates their applicability within decentralized ledger frameworks. Particular attention is paid to the role of ZKPs—such as zk-SNARKs and zk-STARKs—in constructing tamper-resilient, end-to-end verifiable voting systems without compromising performance or transparency. Through critical analysis of recent protocols, consensus mechanisms, and deployment models, this paper identifies key design principles for scalable, secure, and inclusive e-voting infrastructures. The review concludes with strategic recommendations for transitioning from prototype systems to robust electoral frameworks in anticipation of the quantum era.

  • Research Article
  • 10.31857/s0201708324010066
The Permeability of the “Cordon Sanitaire” against Eurosceptics in the European Parliament
  • Dec 15, 2024
  • Sovremennaâ Evropa
  • A O Domanov

Based on voting protocols and debate minutes for the Carbon border adjustment mechanism (CBAM) hearings in the European Parliament in 2022–2023 the cases where positions of MEPs from political groups “Identity and Democracy” and “European Conservatives and Reformists” coincided with those of parliamentarians from other parties (particularly opponents from “The Left” and “The Greens”) were analysed. These actions bypassing the “sanitary cordon” were explored together with the content of the CBAM, which made possible to identify the main motivations of MEPs’ voting. Such cases of solidary vote allowed to evaluate the strength of this barrier, the applicability of theories of two-dimensional nature of ideological space and the prospects of coordinated actions of selected parties after the European parliament elections 2024. These ad hoc coalitions were facilitated by the differences in attitudes to amendments. Among significant factors ensured Eurosceptic MEPs to express the same views were reluctanсe to transfer additional competences to the EU bodies and willingness to support the European industry. Supranationality and deindustrialisation are considered to be more imminent threats than climate change. The article explores a two-dimensional structure of ideological space of the given activity. Close relations between left-wing and right-wing parties could be explained by similarity of political views (i. e Euroscepticism in attributed not only to far-right politicians).

  • Research Article
  • 10.1007/s11128-024-04604-6
Semi-quantum voting protocol with decentralization of vote verification and traceability
  • Dec 12, 2024
  • Quantum Information Processing
  • Shujing Qiu + 4 more

Semi-quantum voting protocol with decentralization of vote verification and traceability

  • Open Access Icon
  • Research Article
  • 10.1049/qtc2.12117
Quantum anonymous one vote veto protocol based on entanglement swapping
  • Dec 1, 2024
  • IET Quantum Communication
  • Yanmeng Wang + 3 more

Abstract As a special voting method, one‐vote veto voting also has a wide range of applications. A veto means that when the voting council puts forward a proposal, it cannot pass unless all the voters agree to it. If there is a no vote, the proposal will be rejected, but no one will know how anyone else votes. In most existing quantum anonymous one‐vote veto voting protocols, an absolutely honest third party is generally required to assist the voting. However, it is difficult to find a fully trusted third party in reality. In addition, the existing quantum anonymous one‐vote veto protocol does not consider the attack from the insider voters. Therefore, based on the characteristics of entanglement swapping between the Cat state and Bell state, the authors propose a new quantum anonymous one‐vote veto protocol, which can not only calculate the voting result quickly and effectively but also demonstrate higher security.

  • Research Article
  • Cite Count Icon 1
  • 10.1007/s00354-024-00275-0
Extended Addition Protocol and Efficient Voting Protocols Using Regular Polygon Cards
  • Aug 20, 2024
  • New Generation Computing
  • Yoshihiro Takahashi + 1 more

Card-based cryptography is a research field for realizing cryptographic protocols using a deck of physical cards. Shinagawa et al. proposed a regular n-sided polygon card, which can hold a value from 0 to n-1\\documentclass[12pt]{minimal} \\usepackage{amsmath} \\usepackage{wasysym} \\usepackage{amsfonts} \\usepackage{amssymb} \\usepackage{amsbsy} \\usepackage{mathrsfs} \\usepackage{upgreek} \\setlength{\\oddsidemargin}{-69pt} \\begin{document}$$n-1$$\\end{document}, and constructed an addition protocol over Z/nZ\\documentclass[12pt]{minimal} \\usepackage{amsmath} \\usepackage{wasysym} \\usepackage{amsfonts} \\usepackage{amssymb} \\usepackage{amsbsy} \\usepackage{mathrsfs} \\usepackage{upgreek} \\setlength{\\oddsidemargin}{-69pt} \\begin{document}$$\\mathbb {Z}/n\\mathbb {Z}$$\\end{document} and a voting protocol with v voters and c candidates when v<n\\documentclass[12pt]{minimal} \\usepackage{amsmath} \\usepackage{wasysym} \\usepackage{amsfonts} \\usepackage{amssymb} \\usepackage{amsbsy} \\usepackage{mathrsfs} \\usepackage{upgreek} \\setlength{\\oddsidemargin}{-69pt} \\begin{document}$$v<n$$\\end{document}. In this paper, we propose an addition protocol over Z/mnZ\\documentclass[12pt]{minimal} \\usepackage{amsmath} \\usepackage{wasysym} \\usepackage{amsfonts} \\usepackage{amssymb} \\usepackage{amsbsy} \\usepackage{mathrsfs} \\usepackage{upgreek} \\setlength{\\oddsidemargin}{-69pt} \\begin{document}$$\\mathbb {Z}/mn\\mathbb {Z}$$\\end{document} using regular n-sided polygon cards. Technically, we introduce a cyclic integer encoding and a rot-and-shift shuffle to extend the modulus from n to mn. In addition, we construct two voting protocols with v voters and c candidates using regular n-sided polygon cards. Our first voting protocol requires c(⌈v+1n⌉+v+1)\\documentclass[12pt]{minimal} \\usepackage{amsmath} \\usepackage{wasysym} \\usepackage{amsfonts} \\usepackage{amssymb} \\usepackage{amsbsy} \\usepackage{mathrsfs} \\usepackage{upgreek} \\setlength{\\oddsidemargin}{-69pt} \\begin{document}$$c(\\lceil \\frac{v+1}{n} \\rceil + v + 1)$$\\end{document} cards and v+1\\documentclass[12pt]{minimal} \\usepackage{amsmath} \\usepackage{wasysym} \\usepackage{amsfonts} \\usepackage{amssymb} \\usepackage{amsbsy} \\usepackage{mathrsfs} \\usepackage{upgreek} \\setlength{\\oddsidemargin}{-69pt} \\begin{document}$$v+1$$\\end{document} shuffles without restriction. Our second voting protocol reduces the number of cards to ⌈v+1n⌉n+v+1\\documentclass[12pt]{minimal} \\usepackage{amsmath} \\usepackage{wasysym} \\usepackage{amsfonts} \\usepackage{amssymb} \\usepackage{amsbsy} \\usepackage{mathrsfs} \\usepackage{upgreek} \\setlength{\\oddsidemargin}{-69pt} \\begin{document}$$\\lceil \\frac{v+1}{n} \\rceil n + v + 1$$\\end{document} when v<n\\documentclass[12pt]{minimal} \\usepackage{amsmath} \\usepackage{wasysym} \\usepackage{amsfonts} \\usepackage{amssymb} \\usepackage{amsbsy} \\usepackage{mathrsfs} \\usepackage{upgreek} \\setlength{\\oddsidemargin}{-69pt} \\begin{document}$$v < n$$\\end{document} and c≤n\\documentclass[12pt]{minimal} \\usepackage{amsmath} \\usepackage{wasysym} \\usepackage{amsfonts} \\usepackage{amssymb} \\usepackage{amsbsy} \\usepackage{mathrsfs} \\usepackage{upgreek} \\setlength{\\oddsidemargin}{-69pt} \\begin{document}$$c\\le n$$\\end{document}.

  • Research Article
  • Cite Count Icon 1
  • 10.32890/jcia2024.3.2.5
DECENTRALIZED ELECTRONIC VOTING WITH ETHEREUM BLOCKCHAIN IN DEMOCRATIC AND POLITICAL ELECTIONS
  • Aug 15, 2024
  • Journal of Computational Innovation and Analytics (JCIA)
  • Stephanie Kew Yen Nee + 1 more

The Ethereum blockchain-based electronic voting (e-voting) systems can emerge as a viable strategy in this era of contemporary democracies to revolutionize political elections and augment the efficacy of the electoral process. There are myriad advantages that the Ethereum blockchain has to offer, from fairness to increased voting rates. Unlike traditional voting protocols, the Ethereum blockchain can assure substantial cost savings and eliminate the necessity for electoral intermediaries. The use of the Ethereum blockchain in political contexts also ensures that elections are held with integrity while preserving the voters’ privacy. Due to its popularity, provision of smart contracts logic, and various promising advantages, this systematic review aims to examine the potential deployment of decentralized e-voting systems integrated with Ethereum blockchain technology for democratic political elections. A systematic literature review (SLR) and the PICO approach, which stands for population, intervention, control, and outcomes, were adopted in this study to systematically analyze the existing literature. Key technological approaches identified in the voting system include the hybrid blockchain and privacy-preserving score voting. Among the noteworthy findings are the following: while adoption and complexity remain challenges across numerous e-voting frameworks, scalability, end-to-end security, enhanced efficiency, and effectiveness are key benefits. An exploration into the prospective future innovations, such as the integration of artificial intelligence and big data analytics into the Ethereum blockchain, was also included to further improve the reliability of the e-voting systems. It is believed that the Ethereum blockchain has a promising transformative impact on electoral politics and democratic processes, presenting a ray of hope for future elections.

  • Research Article
  • 10.1017/s0020589324000150
VOTING PROTOCOLS AS INFORMAL JUDICIAL INSTITUTIONS: THE POLITICS OF ENFORCEABILITY AND STRATEGIC BREACHING
  • Jul 1, 2024
  • International and Comparative Law Quarterly
  • Mauro Arturo Rivera León

Abstract Constitutional courts operate under a framework of formal and informal rules. While formal rules have been extensively studied, our understanding of informal rules remains limited. Courts often rely on internal practices, traditions and unwritten customs developed over time, posing a significant challenge due to their hidden nature. Numerous constitutional courts lack detailed voting protocols in their statutes and internal regulations, leaving essential aspects to the court's discretion, such as, inter alia, the voting order, deliberation style, outcome versus issue voting and tie-breaking protocols. By employing a case study of strategic breaching of informal voting protocols in the Mexican Supreme Court, this article highlights the complexity of enforcing informal voting rules given that external actors may be unaware of them, along with other factors. Even when informal rules are broadly known, certain circumstances may diminish the efficacy of informal sanctions addressing their breach. Thus, key judicial players, such as chief justices or judge-rapporteurs, may take advantage of the informal rules of voting protocols to advance their policy preferences.

  • Open Access Icon
  • PDF Download Icon
  • Research Article
  • Cite Count Icon 2
  • 10.1007/s00354-024-00269-y
Card-based Cryptography with a Standard Deck of Cards, Revisited: Efficient Protocols in the Private Model
  • Jun 21, 2024
  • New Generation Computing
  • Takeshi Nakai + 5 more

Card-based cryptography is a secure computation protocol realized by using physical cards. There are two models on card-based cryptography: public and private models. We adopt private one that allows players to handle cards privately. While much of the existing works for card-based cryptography use two-colored cards, it is also a vital task to construct an efficient protocol with playing cards. In the public model, 2n cards are necessary for any n-bit input protocol since at least two cards are required to express a Boolean value. It holds true for both two-colored and playing-card settings. On the other hand, the private model enables us to construct a protocol with fewer than 2n cards. However, all existing protocols that achieve such properties are only in the two-colored setting. This paper shows that the private model enables us to construct a protocol with fewer than 2n cards using the playing cards. We first show two-bit input protocols with fewer than four cards for logical operations, AND, OR, and XOR. Furthermore, we show a three-input majority voting protocol using only three cards, which is constructed by combining our AND and OR protocols. Notably, our proposed protocols require no randomness. All operations are deterministic and depend only on players’ private inputs.

  • Open Access Icon
  • PDF Download Icon
  • Research Article
  • 10.3390/app14083502
A P2P Scheme for Debating and Voting with Unconditional Flexibility
  • Apr 21, 2024
  • Applied Sciences
  • Diego Antonio López-García + 3 more

Most e-voting schemes make use of central servers. Users are obliged to trust these servers, which represent a vulnerability of the scheme. In the last few years, a very small group of schemes has been published that overcomes this handicap by using a peer-to-peer (P2P) approach. These are known as boardroom e-voting schemes, whereby users take the role of the servers. They act as managers of the process: they cast votes, keep a record of them, and verify the cryptographic operations made by others. Nevertheless, ballots must fulfill certain constraints which conflict with the possibilities of recent debate tools. These tools allow users to decide what to vote on, thus enabling the ballot frame to remain unknown before the voting process. The scheme presented here is a new boardroom voting protocol. It provides privacy, eligibility, and verifiability among other relevant features. The key advantage of this system is its high degree of flexibility, due to the absence of a need to impose any constraint on the ballots. This paper includes experimental results with two debate groups.

  • Research Article
  • 10.1016/j.sysarc.2024.103144
An SGX-based online voting protocol with maximum voter privacy
  • Apr 12, 2024
  • Journal of Systems Architecture
  • Qingdi Han + 4 more

An SGX-based online voting protocol with maximum voter privacy

  • Research Article
  • Cite Count Icon 4
  • 10.1007/s10773-024-05618-7
Security Analysis and Improvements on a Semi-Quantum Electronic Voting Protocol
  • Mar 23, 2024
  • International Journal of Theoretical Physics
  • Qiu Shujing + 4 more

Security Analysis and Improvements on a Semi-Quantum Electronic Voting Protocol

  • Research Article
  • Cite Count Icon 3
  • 10.1109/tnse.2023.3336516
New Blockchain-Based Publicly Traceable Self-Tallying Voting Protocol
  • Mar 1, 2024
  • IEEE Transactions on Network Science and Engineering
  • Meixia Miao + 3 more

New Blockchain-Based Publicly Traceable Self-Tallying Voting Protocol

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • .
  • .
  • .
  • 10
  • 1
  • 2
  • 3
  • 4
  • 5

Popular topics

  • Latest Artificial Intelligence papers
  • Latest Nursing papers
  • Latest Psychology Research papers
  • Latest Sociology Research papers
  • Latest Business Research papers
  • Latest Marketing Research papers
  • Latest Social Research papers
  • Latest Education Research papers
  • Latest Accounting Research papers
  • Latest Mental Health papers
  • Latest Economics papers
  • Latest Education Research papers
  • Latest Climate Change Research papers
  • Latest Mathematics Research papers

Most cited papers

  • Most cited Artificial Intelligence papers
  • Most cited Nursing papers
  • Most cited Psychology Research papers
  • Most cited Sociology Research papers
  • Most cited Business Research papers
  • Most cited Marketing Research papers
  • Most cited Social Research papers
  • Most cited Education Research papers
  • Most cited Accounting Research papers
  • Most cited Mental Health papers
  • Most cited Economics papers
  • Most cited Education Research papers
  • Most cited Climate Change Research papers
  • Most cited Mathematics Research papers

Latest papers from journals

  • Scientific Reports latest papers
  • PLOS ONE latest papers
  • Journal of Clinical Oncology latest papers
  • Nature Communications latest papers
  • BMC Geriatrics latest papers
  • Science of The Total Environment latest papers
  • Medical Physics latest papers
  • Cureus latest papers
  • Cancer Research latest papers
  • Chemosphere latest papers
  • International Journal of Advanced Research in Science latest papers
  • Communication and Technology latest papers

Latest papers from institutions

  • Latest research from French National Centre for Scientific Research
  • Latest research from Chinese Academy of Sciences
  • Latest research from Harvard University
  • Latest research from University of Toronto
  • Latest research from University of Michigan
  • Latest research from University College London
  • Latest research from Stanford University
  • Latest research from The University of Tokyo
  • Latest research from Johns Hopkins University
  • Latest research from University of Washington
  • Latest research from University of Oxford
  • Latest research from University of Cambridge

Popular Collections

  • Research on Reduced Inequalities
  • Research on No Poverty
  • Research on Gender Equality
  • Research on Peace Justice & Strong Institutions
  • Research on Affordable & Clean Energy
  • Research on Quality Education
  • Research on Clean Water & Sanitation
  • Research on COVID-19
  • Research on Monkeypox
  • Research on Medical Specialties
  • Research on Climate Justice
Discovery logo
FacebookTwitterLinkedinInstagram

Download the FREE App

  • Play store Link
  • App store Link
  • Scan QR code to download FREE App

    Scan to download FREE App

  • Google PlayApp Store
FacebookTwitterTwitterInstagram
  • Universities & Institutions
  • Publishers
  • R Discovery PrimeNew
  • Ask R Discovery
  • Blog
  • Accessibility
  • Topics
  • Journals
  • Open Access Papers
  • Year-wise Publications
  • Recently published papers
  • Pre prints
  • Questions
  • FAQs
  • Contact us
Lead the way for us

Your insights are needed to transform us into a better research content provider for researchers.

Share your feedback here.

FacebookTwitterLinkedinInstagram
Cactus Communications logo

Copyright 2026 Cactus Communications. All rights reserved.

Privacy PolicyCookies PolicyTerms of UseCareers