Abstract is missing.
- Applying a Reusable Election Threat Model at the County LevelEric Lazarus, David L. Dill, Jeremy Epstein. [doi]
- Computing the Margin of Victory in IRV ElectionsThomas R. Magrino, Ronald L. Rivest, Emily Shen. [doi]
- SOBA: Secrecy-preserving Observable Ballot-level AuditJosh Benaloh, Douglas W. Jones, Eric Lazarus, Mark Lindeman, Philip B. Stark. [doi]
- Secure Internet Voting on Limited Devices with Anonymized DSA Public KeysRolf Haenni, Oliver Spycher. [doi]
- Auditing a DRE-Based Election in South CarolinaDuncan A. Buell, Eleanor Hare, Frank Heindel, Chip Moore, Barbara Zia. [doi]
- Running Mixnet-Based Elections with HeliosPhilippe Bulens, Damien Giry, Olivier Pereira. [doi]
- Scantegrity III: Automatic Trustworthy Receipts, Highlighting Over/Under Votes, and Full Voter VerifiabilityAlan T. Sherman, Russell A. Fink, Richard Carback, David Chaum. [doi]
- Prêt à Voter with Confirmation CodesPeter Y. A. Ryan. [doi]
- Authentication CodesChris Culnane, David Bismark, James Heather, Steve Schneider, Sriramkrishnan Srinivasan, Zhe Xia. [doi]
- Usability Analysis of Helios - An Open Source Verifiable Remote Electronic Voting SystemFatih Karayumak, Maina M. Olembo, Michaela Kauer, Melanie Volkamer. [doi]
- Estimating the Margin of Victory for Instant-Runoff VotingDavid Cary. [doi]
- An Analysis of Write-in Marks on Optical Scan BallotsTheron Ji, Eric Kim, Raji Srikantan, Alan Tsai, Arel Cordero, David Wagner. [doi]
- Accessible Polling Places for the Visually Impaired: A Compilation of Survey ResultsGillian E. Piner, Michael D. Byrne. [doi]