LZI - Schloss Dagstuhl - Talks + Materials of Seminar 11281
 Functions: 

Seminar 11281
Verifiable Elections and the Public

Michael Alvarez (CalTech - Pasadena, US), Josh Benaloh (Microsoft Corp. - Redmond, US), Alon Rosen (The Interdisciplinary Center - Herzliya, IL), Peter Y. A. Ryan (University of Luxembourg, LU),

Caveat: Due to caching problems of dynamic webpages, sometimes newly
uploaded files are not shown. Please reload the page accordingly.

 

Seminar Wide Materials
 
 


Michael Alvarez , CalTech - Pasadena
 Verification and Confidence
Slides: pptx

 

David Beirne , Federal Voting Assistance Programm, Arlington
 Obstacles to Change
Abstracts: txt

 Update on U.S. Internet Voting Demo Project, Information on UOCAVA Solutions Summit
Abstracts: txt Slides: pdf

 

Jonathan Ben-Nun , Tel Aviv University
 

Josh Benaloh , Microsoft Research - Redmond
 VeriScan
Abstracts: txt Slides: pptx

 

Sergiu Bursuc , University of Birmingham
 Revisiting individual verifiability
Abstracts: txt Slides: pdf

 

Michel Chevallier , Republique et Canton de Genève
 Put title here
Abstracts: txt Slides: pdf

 Unveiling the Geneva internet voting system
Abstracts: txt Slides: pdf

 

Veronique Cortier , INRIA - Nancy
 Attacking and fixing privacy in Helios
Abstracts: txt Slides: pdf

 

Christopher Culnane , University of Surrey
 

Stephanie Delaune , ENS - Cachan
 

Jeremy Epstein , SRI - Arlington
 CRAVE: A Challenge Response Application to Voting Electronically
Abstracts: txt Slides: pdf

 SpeakUp: Remote Unsupervised Voting
Abstracts: txt Slides: pdf

 

Paul Gibson , Telecom - Evry
 "The human factor cannot be safely neglected in planning machinery" - should e-voting machine development be driven by Murphy's Law?
Abstracts: txt Slides: pdf

 

Rop Gonggrijp , Amsterdam
 

Rolf Haenni , Bern University of Applied Sciences
 Secure Internet Voting on an Untrusted Platform
Abstracts: txt Slides: pdf

 

J. Alex Halderman , University of Michigan
 Security Problems in India's Electronic Voting System
Abstracts: txt Slides: pdf

 Panel: Internet Voting in the US
Abstracts: txt

 

James Heather , University of Surrey
 Securing Democracy: an EU Network of Excellence
Abstracts: txt Slides: pdf

 

F. Daniel Hidalgo , University of California
 Digital Democratization: Suffrage Expansion and the Decline of Political Machines in Brazil
Abstracts: txt

 

Candice Hoke , Cleveland State University
 Testing Protocols for IV (Internet voting) Systems Prior to Testing in Actual Elections -
Abstracts: txt

 Currently Used VS: Cuyahoga's Experience Transitioning to E-Voting
Abstracts: txt Slides: ppt

 Design Criteria/Attributes for US FVAP/Military IV Pilot- Discussion Outline
Abstracts: txt Slides: ppt

 

Rui Joaquim , Polytechnic Institute of Lisbon/INESC-ID - Lisboa
 An Efficient Implementation of a Highly Sound Voter Verification Technique on a Smart Card and
Abstracts: txt Slides: pdf

 

Hugo Jonker , University of Luxembourg
 Handling complex ballots: election-law compliant uses of Pret a Voter
Abstracts: txt Slides: pdf

 Ballot copying: risk or opportunity?
Abstracts: txt Slides: pdf

 

Reto Koenig , Bern University of Applied Sciences
 How to Store Some Secrets
Abstracts: txt Slides: pdf

 

Steve Kremer , ENS - Cachan
 

Robert Krimmer , OSCE - Warszaw
 New Voting Technologies and the OSCE Office for Democratic Institutions and Human Rights
Abstracts: txt Slides: pdf

 

Manuel J. Kripp , E-Voting.CC - Viennna
 1st Call for Papers EVOTE2012
Abstracts: txt Other: pdf

 

Miroslaw Kutylowski , Wroclaw University of Technology
 Verification versus Privacy: What Happens when Cryptography gets Broken?
Abstracts: txt Slides: pdf

 

Gabriele Lenzini , University of Luxembourg
 

Helger Lipmaa , Cybernetica AS
 Critical look at Estonian E-voting Protocol
Abstracts: txt Slides: pdf

 On Cryptographic Protocols for Norwegian E-voting
Abstracts: txt Slides: pdf

 

Morgan Llewellyn , IMT - Lucca
 Verification, Security, and Voter Understanding
Abstracts: txt Slides: pdf

 

Symeon Meichanetzoglou , University of Luxembourg
 

Tal Moran , Harvard University
 The Limits of Theory: Assumptions on Which We Base Voting Protocol Security
Abstracts: txt Slides: svg

 

Maina Olembo , TU Darmstadt
 

Olivier Pereira , UC Louvain-la-Neuve
 Running mixnet-based elections with Helios
Abstracts: txt Slides: pdf

 

Ben Riva , Tel Aviv University
 Wombat in the wild
Abstracts: txt Slides: pdf

 

Mark D. Ryan , University of Birmingham
 Coercion evidence
Abstracts: txt

 

Peter Y. A. Ryan , University of Luxembourg
 Pret a Voter with confirmation codes
Abstracts: txt Slides: key

 

Steve Schneider , University of Surrey
 Focus Group Views on Pret a Voter 1.0
Abstracts: txt Slides: pdf

 

Vanessa Teague , The University of Melbourne
 Some ideas about receipt-free cast-as-intended Internet voting for preferential elections
Abstracts: txt Slides: pptx Other: pdf

 

Jacques Traore , Orange Labs - Caen
 

Alexander Trechsel , European University Institute
 

Kristjan Vassil , European University Institute
 

Dan Wallach , Rice University
 What happened in Sarasota?
Abstracts: txt Slides: pdf

 

Anina Weber , Federal Chancellery - Bern
 E-Voting Overview of the Swiss Project
Abstracts: txt Slides: ppt

 

Douglas Wikstroem , KTH Stockholm
 Verificatum
Abstracts: txt Slides: pdf

 

Filip Zagorski , George Washington University
 Remotegrity
Abstracts: txt

 

Xia Zhe , University of Surrey
 

Jeroen van de Graaf , Federal University of Minas Gerais, Brazil
 Verifiable voting with everlasting privacy
Abstracts: txt Slides: pdf

 



License

Creative Commons License
This webpage and the material that is made available on this webpage is licensed under a
Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License.

The CC by-nc-nd license allows you to copy, distribute and transmit the work under the following conditions: