![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
21st USENIX Security Symposium 2012: Bellevue, WA, USA - EVT/WOTE
- J. Alex Halderman, Olivier Pereira:
2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, EVT/WOTE '12, Bellevue, WA, USA, August 6-7, 2012. USENIX Association 2012
Experience from Practice
- Craig Burton, Chris Culnane, James Heather, Thea Peacock, Peter Y. A. Ryan, Steve A. Schneider, Vanessa Teague, Roland Wen, Zhe Xia, Sriramkrishnan Srinivasan:
Using Prêt à Voter in Victoria State Elections. - Joseph Lorenzo Hall, Emily Barabas, Gregory Shapiro, Deirdre K. Mulligan, Coye Cheshire:
Probing the Front Lines: Pollworker Perceptions of Security & Privacy.
Coercion-Resistant Elections
- Aleksander Essex, Jeremy Clark, Urs Hengartner:
Cobra: Toward Concurrent Ballot Authorization for Internet Voting. - Carmen Kempka:
Coercion-Resistant Electronic Elections with Write-In Candidates.
New Interfaces
- Kai Wang, Nicholas Carlini, Eric Kim, Ivan Motyashov, Daniel Nguyen, David A. Wagner:
Operator-Assisted Tabulation of Optical Scan Ballots. - Chris Culnane:
A Hybrid Touch Interface for Prêt à Voter.
Vote Privacy
- Shahram Khazaei, Björn Terelius, Douglas Wikström:
Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet. - Denise Demirel, Jeroen van de Graaf, Roberto Samarone dos Santos Araújo:
Improving Helios with Everlasting Privacy Towards the Public.
What Could Go Wrong?
- Patrick Baxter, Anne Edmundson, Keishla Ortiz, Ana Maria Quevedo, Samuel Rodríguez, Cynthia Sturton, David A. Wagner:
Automated Analysis of Election Audit Logs. - Huong Phan, George S. Avrunin, Matt Bishop, Lori A. Clarke, Leon J. Osterweil:
A Systematic Process-Model-based Approach for Synthesizing Attacks and Evaluating Them.
Election Auditing
- Ronald L. Rivest, Emily Shen:
A Bayesian Method for Auditing Elections. - Mark Lindeman, Philip B. Stark, Vincent S. Yates:
BRAVO: Ballot-polling Risk-limiting Audits to Verify Outcomes.
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.