-
1
-
-
85092119325
-
How to shuffle in public
-
(February), Lecture Notes in Computer Science, Springer-Verlag, 555â
-
ADIDA, B., AND WIKSTR¨OM, D. How to shuffle in public. In Theory of Cryptography, Proceedings of TCC 2007 (February 2007), Lecture Notes in Computer Science, Springer-Verlag, pp. 555–574.
-
(2007)
Theory of Cryptography, Proceedings of TCC 2007
-
-
ADIDA, B.1
WIKSTR¨OM, D.2
-
2
-
-
0030672130
-
A secure and reliable bootstrap architecture
-
(Oakland, CA, May)
-
ARBAUGH, W. A., FARBER, D. J., AND SMITH, J. M. A secure and reliable bootstrap architecture. In Proceedings of the 1997 IEEE Symposium on Security and Privacy (Oakland, CA, May 1997).
-
(1997)
Proceedings of the 1997 IEEE Symposium on Security and Privacy
-
-
ARBAUGH, W. A.1
FARBER, D. J.2
SMITH, J. M.3
-
3
-
-
0034771832
-
Practical multi-candidate election system
-
(Newport, RI)
-
BAUDRON, O., FOUQUE, P.-A., POINTCHEVAL, D., STERN, J., AND POUPARD, G. Practical multi-candidate election system. In PODC ’01: Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing (Newport, RI, 2001), pp. 274–283.
-
(2001)
PODC ’01: Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing
, pp. 274â-283
-
-
BAUDRON, O.1
FOUQUE, P.-A.2
POINTCHEVAL, D.3
STERN, J.4
POUPARD, G.5
-
4
-
-
85088182727
-
Electronic voting system usability issues
-
(Ft. Lauderdale, FL)
-
BEDERSON, B. B., LEE, B., SHERMAN, R. M., HERRNSON, P. S., AND NIEMI, R. G. Electronic voting system usability issues. In CHI ’03: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Ft. Lauderdale, FL, 2003), pp. 145–152.
-
(2003)
CHI ’03: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 145â-152
-
-
BEDERSON, B. B.1
LEE, B.2
SHERMAN, R. M.3
HERRNSON, P. S.4
NIEMI, R. G.5
-
5
-
-
0038223020
-
-
Tech. rep., UC at San Diego, Dept. of Computer Science and Engineering, Nov
-
BELLARE, M., AND YEE, B. Forward integrity for secure audit logs. Tech. rep., UC at San Diego, Dept. of Computer Science and Engineering, Nov. 1997.
-
(1997)
Forward integrity for secure audit logs
-
-
BELLARE, M.1
YEE, B.2
-
7
-
-
84883938043
-
Distributing the power of a government to enhance the privacy of voters
-
(Calgary, Alberta, Canada), 52–62
-
BENALOH, J., AND YUNG, M. Distributing the power of a government to enhance the privacy of voters. In 5th ACM Symposium on Principles of Distributed Computing (PODC) (Calgary, Alberta, Canada, 1986), pp. 52–62.
-
(1986)
5th ACM Symposium on Principles of Distributed Computing (PODC)
-
-
BENALOH, J.1
YUNG, M.2
-
8
-
-
85180542603
-
Cryptographic methods for storing ballots on a voting machine
-
(San Diego, CA, Feb)
-
BETHENCOURT, J., BONEH, D., ANDWATERS, B. Cryptographic methods for storing ballots on a voting machine. In 14th Network and Distributed System Security Symposium (NDSS) (San Diego, CA, Feb. 2007).
-
(2007)
14th Network and Distributed System Security Symposium (NDSS)
-
-
BETHENCOURT, J.1
BONEH, D.2
ANDWATERS, B.3
-
11
-
-
35649018867
-
-
BRENNAN CENTER TASK FORCE ON VOTING SYSTEM SECURITY. June [12] CHAUM, D. Untraceable electronic mail, return addresses and digital pseudo-nyms. Communications of the ACM 24, 2 (1981), 84–88
-
BRENNAN CENTER TASK FORCE ON VOTING SYSTEM SECURITY. The Machinery of Democracy: Protecting Elections in an Electronic World, June 2006. http://www.brennancenter.org/dynamic/subpages/download file 36343.pdf. [12] CHAUM, D. Untraceable electronic mail, return addresses and digital pseudo-nyms. Communications of the ACM 24, 2 (1981), 84–88.
-
(2006)
The Machinery of Democracy: Protecting Elections in an Electronic World
-
-
-
12
-
-
2342617507
-
Secret-ballot receipts: True voter-verifiable elections
-
(Jan), “47
-
CHAUM, D. Secret-ballot receipts: True voter-verifiable elections. IEEE Security & Privacy 2, 1 (Jan. 2004), 38–47.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.1
, pp. 38â
-
-
CHAUM, D.1
-
13
-
-
33646028830
-
A practical, voter-verifiable election scheme
-
(Milan, Italy), €“139
-
CHAUM, D., RYAN, P. Y. A., AND SCHNEIDER, S. A. A practical, voter-verifiable election scheme. In ESORICS ’05 (Milan, Italy, 2005), pp. 118–139.
-
(2005)
ESORICS ’05
, pp. 118â
-
-
CHAUM, D.1
RYAN, P. Y. A.2
SCHNEIDER, S. A.3
-
14
-
-
0022188127
-
A robust and verifiable cryptographically secure election scheme
-
(Portland, OR)
-
COHEN (BENALOH), J., AND FISCHER, M. A robust and verifiable cryptographically secure election scheme. In 28th IEEE Symposium on Foundations of Computer Science (FOCS) (Portland, OR, 1985), pp. 372–382.
-
(1985)
28th IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 372â-382
-
-
COHEN (BENALOH), J.1
FISCHER, M.2
-
16
-
-
44349131016
-
Measuring the usability of paper ballots: Efficiency, effectiveness, and satisfaction
-
(Santa Monica, CA)
-
EVERETT, S. P., BYRNE, M. D., AND GREENE, K. K. Measuring the usability of paper ballots: Efficiency, effectiveness, and satisfaction. In Proceedings of the Human Factors and Ergonomics Society 50th Annual Meeting (Santa Monica, CA, 2006).
-
(2006)
Proceedings of the Human Factors and Ergonomics Society 50th Annual Meeting
-
-
EVERETT, S. P.1
BYRNE, M. D.2
GREENE, K. K.3
-
17
-
-
85078509877
-
Security analysis of the Diebold AccuVote-TS voting machine
-
(Boston, MA, Aug)
-
FELDMAN, A. J., HALDERMAN, J. A., AND FELTEN, E. W. Security analysis of the Diebold AccuVote-TS voting machine. In Proceedings of the 2nd USENIX/ACCURATE Electronic Voting Technology Workshop (Boston, MA, Aug. 2007).
-
(2007)
Proceedings of the 2nd USENIX/ACCURATE Electronic Voting Technology Workshop
-
-
FELDMAN, A. J.1
HALDERMAN, J. A.2
FELTEN, E. W.3
-
19
-
-
85060328250
-
A comparison of usability between voting methods
-
(Vancouver, B.C., Canada)
-
GREENE, K. K., BYRNE, M. D., AND EVERETT, S. P. A comparison of usability between voting methods. In USENIX/ACCURATE Electronic Voting Technology Workshop (Vancouver, B.C., Canada, 2006).
-
(2006)
USENIX/ACCURATE Electronic Voting Technology Workshop
-
-
GREENE, K. K.1
BYRNE, M. D.2
EVERETT, S. P.3
-
21
-
-
3543102147
-
Analysis of an electronic voting system
-
(Oakland, CA)
-
KOHNO, T., STUBBLEFIELD, A., RUBIN, A. D., AND WALLACH, D. S. Analysis of an electronic voting system. In Proc. of IEEE Symposium on Security & Privacy (Oakland, CA, 2004).
-
(2004)
Proc. of IEEE Symposium on Security & Privacy
-
-
KOHNO, T.1
STUBBLEFIELD, A.2
RUBIN, A. D.3
WALLACH, D. S.4
-
22
-
-
0017996760
-
Time, clocks, and the ordering of events in a distributed system
-
565
-
LAMPORT, L. Time, clocks, and the ordering of events in a distributed system. Commun. ACM 21, 7 (1978), 558–565.
-
(1978)
Commun. ACM
, vol.21
, Issue.7
, pp. 558â
-
-
LAMPORT, L.1
-
24
-
-
21644470487
-
-
Tech. Rep. TR2003-476, Department of Computer Science, Dartmouth College, Dec
-
MARCHESINI, J., SMITH, S., WILD, O., AND MACDONALD, R. Experimenting with TCPA/TCG Hardware, Or: How I Learned to Stop Worrying and Love The Bear. Tech. Rep. TR2003-476, Department of Computer Science, Dartmouth College, Dec. 2003.
-
(2003)
Experimenting with TCPA/TCG Hardware, Or: How I Learned to Stop Worrying and Love The Bear
-
-
MARCHESINI, J.1
SMITH, S.2
WILD, O.3
MACDONALD, R.4
-
25
-
-
33751038992
-
Tamperevident, history-independent, subliminal-free data structures on PROM storage -or- How to store ballots on a voting machine (extended abstract)
-
(Oakland, CA, May)
-
MOLNAR, D., KOHNO, T., SASTRY, N., AND WAGNER, D. Tamperevident, history-independent, subliminal-free data structures on PROM storage -or- How to store ballots on a voting machine (extended abstract). In IEEE Symposium on Security and Privacy (Oakland, CA, May 2006).
-
(2006)
IEEE Symposium on Security and Privacy
-
-
MOLNAR, D.1
KOHNO, T.2
SASTRY, N.3
WAGNER, D.4
-
30
-
-
85048559101
-
On New Voting Machine, the Same Old Fraud
-
(April 27)
-
ROHDE, D. On New Voting Machine, the Same Old Fraud. The New York Times (April 27, 2004). http://www.nytimes.com/2004/04/27/international/asia/27indi.html.
-
(2004)
The New York Times
-
-
ROHDE, D.1
-
31
-
-
84955615815
-
Secure voting using partially compatible homomorphisms
-
(London, UK), Springer-Verlag, 411â
-
SAKO, K., AND KILIAN, J. Secure voting using partially compatible homomorphisms. In CRYPTO ’94: Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology (London, UK, 1994), Springer-Verlag, pp. 411–424.
-
(1994)
CRYPTO ’94: Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
-
-
SAKO, K.1
KILIAN, J.2
-
32
-
-
84926201668
-
Designing voting machines for verification
-
(Vancouver, B.C., Canada, Aug)
-
SASTRY, N., KOHNO, T., AND WAGNER, D. Designing voting machines for verification. In Proceedings of the 15th USENIX Security Symposium (Vancouver, B.C., Canada, Aug. 2006).
-
(2006)
Proceedings of the 15th USENIX Security Symposium
-
-
SASTRY, N.1
KOHNO, T.2
WAGNER, D.3
-
34
-
-
85084161255
-
Cryptographic support for secure logs on untrusted machines
-
(San Antonio, TX, Jan)
-
SCHNEIER, B., AND KELSEY, J. Cryptographic support for secure logs on untrusted machines. In USENIX Security Symposium (San Antonio, TX, Jan. 1998), pp. 53–62.
-
(1998)
USENIX Security Symposium
, pp. 53â-62
-
-
SCHNEIER, B.1
KELSEY, J.2
-
35
-
-
33748550267
-
Externally verifiable code execution
-
(Sept)
-
SESHADRI, A., LUK, M., PERRIG, A., VAN DOORN, L., AND KHOSLA, P. Externally verifiable code execution. Communications of the ACM 49, 9 (Sept. 2006), 45–49.
-
(2006)
Communications of the ACM
, vol.49
, Issue.9
, pp. 45â-49
-
-
SESHADRI, A.1
LUK, M.2
PERRIG, A.3
VAN DOORN, L.4
KHOSLA, P.5
-
36
-
-
84885617227
-
Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems
-
(Brighton, U.K., Dec)
-
SESHADRI, A., LUK, M., SHI, E., PERRIG, A., VAN DOORN, L., AND KHOSLA, P. Pioneer: Verifying code integrity and enforcing untampered code execution on legacy systems. In ACM Symposium on Operating Systems Principles (SOSP 2005) (Brighton, U.K., Dec. 2005).
-
(2005)
ACM Symposium on Operating Systems Principles (SOSP 2005)
-
-
SESHADRI, A.1
LUK, M.2
SHI, E.3
PERRIG, A.4
VAN DOORN, L.5
KHOSLA, P.6
-
37
-
-
0018545449
-
How to share a secret
-
612–613
-
SHAMIR, A. How to share a secret. Communications of the ACM 22, 11 (1979), 612–613.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
-
-
SHAMIR, A.1
-
39
-
-
34547205365
-
-
TRUSTED COMPUTING GROUP. Oct
-
TRUSTED COMPUTING GROUP. TPM v1.2 Specification Changes, Oct. 2003. https://www.trustedcomputinggroup.org/downloads/ TPM 1 2 Changes final.pdf.
-
(2003)
TPM v1.2 Specification Changes
-
-
-
40
-
-
77954394047
-
-
California Secretary of State’s Voting Systems Technology Assessment Advisory Board (VSTAAB), Feb
-
WAGNER, D., JEFFERSON, D., BISHOP, M., KARLOF, C., AND SASTRY, N. Security analysis of the Diebold AccuBasic interpreter. California Secretary of State’s Voting Systems Technology Assessment Advisory Board (VSTAAB), Feb. 2006. http://www.ss.ca.gov/elections/voting systems/security analysis of the diebold accubasic interpreter.pdf.
-
(2006)
Security analysis of the Diebold AccuBasic interpreter
-
-
WAGNER, D.1
JEFFERSON, D.2
BISHOP, M.3
KARLOF, C.4
SASTRY, N.5
-
42
-
-
77950853175
-
-
Florida State University, Tallahassee, FL, Feb
-
YASINSAC, A.,WAGNER, D., BISHOP, M., BAKER, T., DEMEDEIROS, B., TYSON, G., SHAMOS, M., AND BURMESTER, M. Software Review and Security Analysis of the ES&S iVotronic 8.0.1.2 Voting Machine Firmware. Florida State University, Tallahassee, FL, Feb. 2007. http://election.dos.state.fl.us/pdf/FinalAudRepSAIT.pdf.
-
(2007)
Software Review and Security Analysis of the ES&S iVotronic 8.0.1.2 Voting Machine Firmware
-
-
YASINSAC, A.1
WAGNER, D.2
BISHOP, M.3
BAKER, T.4
DEMEDEIROS, B.5
TYSON, G.6
SHAMOS, M.7
BURMESTER, M.8
-
43
-
-
38849110322
-
Prerendered user interfaces for higher-assurance electronic voting
-
(Vancouver, B.C., Canada)
-
YEE, K.-P., WAGNER, D., HEARST, M., AND BELLOVIN, S. M. Prerendered user interfaces for higher-assurance electronic voting. In USENIX/ACCURATE Electronic Voting Technology Workshop (Vancouver, B.C., Canada, 2006).
-
(2006)
USENIX/ACCURATE Electronic Voting Technology Workshop
-
-
YEE, K.-P.1
WAGNER, D.2
HEARST, M.3
BELLOVIN, S. M.4
-
44
-
-
84885684056
-
Strong accountability for network storage
-
(San Jose, CA, Feb), 77—92
-
YUMEREFENDI, A. R., AND CHASE, J. S. Strong accountability for network storage. In Proceedings of the 5th USENIX Conference on File and Storage Technologies (FAST ’07) (San Jose, CA, Feb. 2007), pp. 77—92.
-
(2007)
Proceedings of the 5th USENIX Conference on File and Storage Technologies (FAST ’07)
-
-
YUMEREFENDI, A. R.1
CHASE, J. S.2
-
45
-
-
85080649770
-
E-voting undermined by sloppiness
-
(Dec. 17)
-
ZETTER, K. E-voting undermined by sloppiness. Wired News (Dec. 17, 2003). http://wired.com/news/politics/evote/0,61637-0. html.
-
(2003)
Wired News
-
-
ZETTER, K.1
|