Conferences In Information Security

Conference Name 2010 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE ’10)
Venue Washington, DC
URL http://www.usenix.org/events/evtwote10/ cfp/evtwote10cfp.pdf
Submission Deadline April 16, 2010,
Conference Date August 9–10, 2010
Sponsership/Publisher Secutity workshop of USENIX
Aim/Scope/Research Area In many countries, most votes are counted and transported electronically, but there are numerous practical and policy implications of introducing electronic machines into the voting process. Both voting technology and its regulations are very much in flux, with open concerns including accuracy, reliability, robustness, security, transparency, equality, privacy, usability, and accessibility.
USENIX, ACCURATE, and IAVoSS are sponsoring the 2010 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE ’10). EVT/WOTE brings together researchers from a variety of disciplines, ranging from computer science and human-computer interaction experts through political scientists, legal experts, election administrators, and voting equipment vendors. EVT/WOTE seeks to publish original research on important problems in all aspects of electronic voting.

EVT/WOTE ’10 will be a two-day event, Monday, August 9, and Tuesday, August 10, 2010, co-located with the 19th USENIX Security Symposium in Washington, DC. In addition to paper presentations, the workshop may include panel discussions with substantial time devoted to questions and answers. The workshop
papers will be published electronically. Attendance at the workshop will be open to the public, although talks and refereed paper presentations will be by invitation only. There will be an award for the best paper.

Workshop Topics
Papers are solicited in all areas related to electronic voting, including but not limited to:
Accessibility•
Analysis of/attacks on existing voting technologies•
Auditing•
Ballot integrity•
Ballot secrecy•
Case studies from the real world of elections•
Case studies of electronic voting experiments•
Design and implementation of new voting technologies•
Forensics•
Formal security analysis•
Impact of source code disclosure or nondisclosure•
Issues with and evolution of voting technology standards•
Legal issues including intellectual property•
Receipts and coercion resistance•
Risk assessement•
System testing methodologies•
Usability•
Verifiable election systems•
Vote collection/recording•
Vote tabulation•
Voter authentication•
Voter privacy and/or anonymity•
Voter registration and pre-voting processes•
Voting technology standards

Back To Conferences List

Database Sections