Conferences In Information Security
Conference Name | 2010 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE ’10) |
---|---|
Venue | Washington, DC |
URL | http://www.usenix.org/events/evtwote10/ cfp/evtwote10cfp.pdf |
Submission Deadline | April 16, 2010, |
Conference Date | August 9–10, 2010 |
Sponsership/Publisher | Secutity workshop of USENIX |
Aim/Scope/Research Area |
In many countries, most votes are counted and transported electronically,
but there are numerous practical and policy implications
of introducing electronic machines into the voting process. Both voting technology and its regulations are very much in flux, with open concerns including accuracy, reliability, robustness, security,
transparency, equality, privacy, usability, and accessibility.
USENIX, ACCURATE, and IAVoSS are sponsoring the 2010 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE ’10). EVT/WOTE brings together researchers from a variety of disciplines, ranging from computer science and human-computer interaction experts through political scientists, legal experts, election administrators, and voting equipment vendors. EVT/WOTE seeks to publish original research on important problems in all aspects of electronic voting. EVT/WOTE ’10 will be a two-day event, Monday, August 9, and Tuesday, August 10, 2010, co-located with the 19th USENIX Security Symposium in Washington, DC. In addition to paper presentations, the workshop may include panel discussions with substantial time devoted to questions and answers. The workshop papers will be published electronically. Attendance at the workshop will be open to the public, although talks and refereed paper presentations will be by invitation only. There will be an award for the best paper. Workshop Topics Papers are solicited in all areas related to electronic voting, including but not limited to: Accessibility• Analysis of/attacks on existing voting technologies• Auditing• Ballot integrity• Ballot secrecy• Case studies from the real world of elections• Case studies of electronic voting experiments• Design and implementation of new voting technologies• Forensics• Formal security analysis• Impact of source code disclosure or nondisclosure• Issues with and evolution of voting technology standards• Legal issues including intellectual property• Receipts and coercion resistance• Risk assessement• System testing methodologies• Usability• Verifiable election systems• Vote collection/recording• Vote tabulation• Voter authentication• Voter privacy and/or anonymity• Voter registration and pre-voting processes• Voting technology standards |