← Back to Archives

EVT/WOTE 2009 Program Available

elections

(I'm traveling this week in California for meetings and the Privacy Law Scholar's Conference, so Mike and Eric beat me to this announcement...)

I'm delighted to announce that the Program for the Electronic Voting Technology Workshop/Workshop on Trustworthy Elections 2009 (EVT/WOTE '09) is now available:

http://www.usenix.org/event/evtwote09/tech/tech.html

The workshop will be in Montreal, Canada from 10-11 August co-located with USENIX Security. As one of three co-chairs---David Jefferson of Lawrence Livermore National Laboratory and Tal Moran of Harvard being the other two---I am very excited about this year's line-up.

Our keynote address will be delivered by the Brennan Center's Larry Norden. Papers include submissions on usability, forensics, security, cryptography, end-to-end systems and auditing. We will also have a "rump" session (more from Eric) for informal presentations (works in progress, humor, etc.) and a demo session where developers and vendors can bounce their systems off of a technical crowd.

(Note for those unfamiliar: All major publishing in computer science and related fields is done at conferences... that is, if you want to get tenure or a promotion as an academic in these fields, you'd better be publishing in these venues, journals be damned. :) USENIX Security is one of three of the most prestigious venues for computer security. We've "co-located" EVT with USENIX Security for the past four years... which makes it a bit difficult to attract people from other disciplines that don't value this particular venue. Anyway, we've worked hard to make EVT and now EVT/WOTE (we combined with another workshop) a multidisciplinary venue that is rigorously peer-reviewed.)

Here are the paper titles, for your browsing:

  • Now Do Voters Notice Review Screen Anomalies? A Look at Voting System Usability
  • Style guide for voting system documentation: Why user-centered documentation matters to voting security
  • E-Voting and Forensics: Complement or Contradiction?
  • Detecting Voter Fraud in an Electronic Voting Context: An Analysis of the Unlimited Reelection Vote in Venezuela
  • The New Jersey Voting-machine Lawsuit and the AVC Advantage DRE Voting
  • Can DREs Provide Everlasting Security? The Case of Return-Oriented Programming and the AVC Advantage
  • Understanding the Security Properties of Ballot-Based Verification Techniques
  • VoteBox Nano: A Smaller, Stronger FPGA-based Voting Machine
  • Some Consequences of Paper Fingerprinting for Elections
  • Electing a University President using Open-Audit Voting: Analysis of real-world use of Helios
  • Efficient Receipt-Free Ballot Casting Resistant to Covert Channels
  • On Subliminal Channels in Encrypt-on-Cast Voting Systems
  • Permutations in Pret a Voter with Paillier Encryption
  • Weight, Weight, Don't Tell Me: Using Scales to Select Ballots for Auditing
  • Automating Voting Terminal Event Log Analysis
  • On the Security of Election Audits with Low Entropy Randomness
  • Interstate Voter Registration Database Matching: The Oregon-Washington 2008 Pilot Project
  • Software Support for Software-Independent Auditing
  • Implementing Risk-Limiting Audits in California