First Page | Document Content | |
---|---|---|
![]() Date: 2014-12-09 18:46:52Election fraud Cyberwarfare Computer network security Information society Software testing Voter-verified paper audit trail Vulnerability Voting machine Security through obscurity Electronic voting Politics Computer security | Add to Reading List |
![]() | R. Michael Alvarez Jehoshua Bruck Jonathan Katz D. Roderick Kiewiet Thomas R. PalfreyDocID: 1qI8M - View Document |
![]() | Our goal is to simplify your Vote by Mail process Confidence and tracking through automation Voter fileDocID: 1qjug - View Document |
![]() | AccessibleVoterVerifiability.pdfDocID: 1q5PT - View Document |
![]() | G: ctions er Outreach A ing Equipment Selection Commitee cutive Summary.wpdDocID: 1pThW - View Document |
![]() | Scantegrity III: Automatic Trustworthy Receipts, Highlighting Over/Under Votes, and Full Voter Verifiability Alan T. Sherman UMBC CDL Russell A. FinkDocID: 1oB3D - View Document |