Cryptography Reference
In-Depth Information
8 Epilogue
1. http://politicalticker.blogs.cnn.com/2010/08/04/cnnopinion-research-poll
-obama-birth (accessed June 15, 2011).
2. John Crowley, “Uses and Abuses of the Secret Ballot in the American Age of
Reform,” in Cultures of Voting: The Hidden History of the Secret Ballot , ed. Romain
Bertrand, Jean-Louis Briquet, and Peter Pels (London: Hurst & Co., 2007), 54.
3. Chaum, “Untraceable Electronic Mail, Return Addresses, and Digital
Pseudonyms.”
4. CalTech MIT Voting Technology Project, Voting: What Is, What Could Be (2001),
22, http://www.vote.caltech.edu/drupal/node/10 (accessed June 23, 2011).
5. David Jefferson, Aviel D. Rubin, Barbara Simons, and David Wagner, “Analyzing
Internet Voting Security,” Communications of the ACM 47, no. 10 (October 2004):
64.
6. Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, and Dan S. Wallach, “Anal-
ysis of An Electronic Voting System,” in 2004 IEEE Symposium on Security & Privacy
(Berkeley, May 9-12, 2004), 27. Indeed, Roberta Mercuri, a computer scientist, had
come to this very conclusion in her 2000 PhD thesis see Roberta Mercuri, “A Better
Ballot Box?” IEEE Spectrum 39, no. 10 (2002): 46-50.
7. See, for example, David Chaum et al., eds., Towards Trustworthy Elections: New
Directions in Electronic Voting (Berlin: Springer, 2010). Specific proposals include
“PunchScan,” see David Chaum, “Secret-Ballot Receipts: True Voter-Verifiable Elec-
tions,” IEEE Security & Privacy 2, no. 1 (2004): 38-47; “Prêt à Voter,” see Peter Y. A.
Ryan, “The Computer Ate My Vote,” in Formal Methods: State of the Art and New
Directions , ed. Paul Boca, Jonathan P. Bowen, and Jawed Siddiqi (Berlin: Springer,
2010), 147-184; “Scratch and Vote,” see Ben Adida and Ron L. Rivest, “Scratch and
Vote: Self-Contained Paper-Based Cryptographic Voting,” in Proceedings of the 5th
ACM Workshop on Privacy in Electronic Society , ed. Ben Adida and Ron L. Rivest (New
York: ACM Press, 2006), 29-40; “ThreeBallot,” see Ron L. Rivest and Warren D.
Smith, “Three Voting Protocols: Threeballot, VAV, and Twin,” in Proceedings of the
USENIX Workshop on Accurate Electronic Voting Technology (Berkeley: USENIX Associa-
tion, 2007), 16-16; and “Scantegrity I” and “Scantegrity II,” see David Chaum et al.,
“Scantegrity II: End-to-End Verifiability by Voters of Optical Scan Elections through
Confirmation Codes,” IEEE Transactions on Information Forensics and Security 4, no.
4 (December 2009): 611-627.
8. Goldreich, “On Post-Modern Cryptography,” 8.
9. Even defining the functionality of material artifacts is far from a simple task see
Beth Preston, “Why Is a Wing Like a Spoon? A Pluralist Theory of Function,” The
Search WWH ::




Custom Search