- Full text PDF available (0)
- This year (1)
- Last five years (5)
In order for an election system to be trusted, it needs to be verifiable. Methods must exist to check that the votes are cast as intended by the voters. There must be strong evidence that the machines function as they are supposed to function. Voters should feel confident that the election is conducted fairly and accurately. This paper first outlines the… (More)
We introduce a receipt election algorithm, the WAVE algorithm (Watch, Audit, Verify Elections) and audit trail. Based on set theory, the WAVE election algorithm is deliberately straightforward and intends to increase trust in elections and election transparency while maintaining voter privacy.
In election systems, there are many opportunities to incorporate forensic techniques and gather forensic evidence that can lead to determining the root cause of an anomaly. Although much has been written about security and forensic techniques in election systems, very little research has focused on measuring the forensic capabilities of election systems and… (More)
Can students contribute to HFOSS projects as part of their computing curriculum? How and at what level can HFOSS be integrated? What are the success stories and challenges? This BOF will be led by a diverse group of faculty who have incorporated HFOSS into their classes. They will lead a discussion on the various approaches, successes and challenges they… (More)
This paper reports on a study of student opinion of the impact of participation in Humanitarian Free and Open Source Software (HFOSS) on motivation, computing learning, and major/career direction. The study builds on an existing body of work in student participation in HFOSS. Six institutions with a variety of profiles are involved in the study and the… (More)