Security and Reliability of Webb County’s ES&S Voting System and the March ’06 Primary Election
نویسنده
چکیده
(Data presented in this report was obtained, in part, by the attorneys of Campero & Becerra, and in part by myself and my graduate student, Dan Sandler, when we were allowed to directly observe and copy data from Webb County’s voting systems, impounded as part of an ongoing investigation into the election results. My discussion includes some analysis prepared earlier by David Dill (a computer scientist at Stanford who, along with myself, studies the security issues with computers in voting systems). Dan Sandler and I wrote the software we used to analyze the election results.)
منابع مشابه
Written Testimony of David Wagner, Ph.d. Computer Science Division University of California, Berkeley before the Committee on House Administration, Elections
Chairwoman Millender-McDonald, Ranking Member Ehlers, committee members, thank you for the opportunity to testify today. My name is David Wagner. I am an associate professor of computer science at U.C. Berkeley. My area of expertise is in computer security and the security of electronic voting. I have an A.B. (1995, Mathematics) from Princeton University and a Ph.D. (2000, Computer Science) fro...
متن کاملSecurity Evaluation of ES&S Voting Machines and Election Management System
This paper summarizes a security analysis of the DRE and optical scan voting systems manufactured by Election Systems and Software (ES&S), as used in Ohio (and many other jurisdictions inside and outside the US). We found numerous exploitable vulnerabilities in nearly every component of the ES&S system. These vulnerabilities enable attacks that could alter or forge precinct results, install cor...
متن کاملA Flexible Implementation of a Web-based Election System for Educational Organizations
Web-based on-line voting and on-line election systems provide benefits of usability, manageability and security. A particular workflow in any phase of on-line election process can be modeled and implemented securely by employing basic security applications readily provided by well established cryptographic technologies. By analyzing data-flow between different phases in the workflow, secure pro...
متن کاملDouble voter perceptible blind signature based electronic voting protocol
Mu et al. have proposed an electronic voting protocol and claimed that it protects anonymity of voters, detects double voting and authenticates eligible voters. It has been shown that it does not protect voter's privacy and prevent double voting. After that, several schemes have been presented to fulfill these properties. However, many of them suffer from the same weaknesses. In this p...
متن کاملImproving voting systems ’ user - friendliness , reliability , & security
About half of Americans have limited confidence that their vote will be properly counted. These fears have focused attention on voting system reliability, security, and usability. Over the last decade, substantial research on voting systems has demonstrated that many systems are less usable and secure than they should be. Producing truly reliable voting systems demands more than just following ...
متن کامل