EVT/WOTE '14 | Faster Print on Demand for Prêt à Voter | Chris Culnane, James Heather, Rui Joaquim, Peter Y.A. Ryan, Steve Schneider, Vanessa Teague |
EVT/WOTE '14 | Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting | Feng Hao, Matthew N. Kreeger, Brian Randell, Dylan Clarke, Siamak F. Shahandashti, Peter Hyun-Jeen Lee |
EVT/WOTE '14 | Do Voters and Poll Workers Differ in their Attitudes Toward E-voting? Evidence from the First E-election in Salta, Argentina | Julia Pomares, Ines Levin, R. Michael Alvarez |
EVT/WOTE '14 | Making Voting Accessible: Designing Digital Ballot Marking for People with Low Literacy and Mild Cognitive Disabilities | Kathryn Summers, Dana Chisnell, Drew Davies, Noel Alton, Megan McKeever |
EVT/WOTE '14 | Do New Voting Technologies Prevent Fraud? Evidence from Russia | Max Bader |
EVT/WOTE '14 | A Systematic Approach to Analyzing Voting Terminal Event Logs | Laurent D. Michel, Alexander A. Shvartsman, Nikolaj Volgushev |
EVT/WOTE '14 | Usability of Voter Verifiable, End-to-end Voting Systems: Baseline Data for Helios, Prêt à Voter, and Scantegrity II | Claudia Z. Acemyan, Philip Kortum, Michael D. Byrne, Dan S. Wallach |
EVT/WOTE '13 | An Analysis of Long Lines in Richland County, South Carolina | Duncan A. Buell |
EVT/WOTE '13 | How to Build an Undervoting Machine: Lessons from an Alternative Ballot Design | Kristen K. Greene, Michael D. Byrne, Stephen N. Goggin |
EVT/WOTE '13 | Testing Voters' Understanding of a Security Mechanism Used in Verifiable Voting | Morgan Llewellyn, Steve Schneider, Zhe Xia, Chris Culnane, James Heather, Peter Y.A. Ryan, Sriram Srinivasan |
EVT/WOTE '13 | Proving Prêt à Voter Receipt Free Using Computational Security Models | Dalia Khader, Qiang Tang, Peter Y.A. Ryan |
EVT/WOTE '13 | Improved Support for Machine-assisted Ballot-level Audits | Eric Kim, Nicholas Carlini, Andrew Chang, George Yiu, Kai Wang, David Wagner |
EVT/WOTE '12 | Using Prêt à Voter in Victoria State Elections | |
EVT/WOTE '12 | Probing the Front Lines: Pollworker Perceptions of Security & Privacy | |
EVT/WOTE '12 | Cobra: Toward Concurrent Ballot Authorization for Internet Voting | |
EVT/WOTE '12 | Coercion-Resistant Electronic Elections with Write-In Candidates | |
EVT/WOTE '12 | A Hybrid Touch Interface for Prêt à Voter | |
EVT/WOTE '12 | Operator-Assisted Tabulation of Optical Scan Ballots | |
EVT/WOTE '12 | Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet | |
EVT/WOTE '12 | Improving Helios with Everlasting Privacy Towards the Public | |
EVT/WOTE '12 | Automated Analysis of Election Audit Logs | |
EVT/WOTE '12 | A Systematic Process-Model-based Approach for Synthesizing Attacks and Evaluating Them | |
EVT/WOTE '12 | A Bayesian Method for Auditing Elections | |
EVT/WOTE '12 | BRAVO: Ballot-polling Risk-limiting Audits to Verify Outcomes | |
EVT/WOTE '11 | Accessible Polling Places for the Visually Impaired: A Compilation of Survey Results | Gillian E. Piner, Michael D. Byrne |