{"id":366,"date":"2016-02-15T10:39:48","date_gmt":"2016-02-15T10:39:48","guid":{"rendered":"https:\/\/blogs.ncl.ac.uk\/security\/?p=366"},"modified":"2016-02-17T22:51:43","modified_gmt":"2016-02-17T22:51:43","slug":"real-world-electronic-voting-design-analysis-and-deployment","status":"publish","type":"post","link":"https:\/\/blogs.ncl.ac.uk\/security\/2016\/02\/15\/real-world-electronic-voting-design-analysis-and-deployment\/","title":{"rendered":"Real-world Electronic Voting: Design, Analysis and Deployment"},"content":{"rendered":"<p>We are pleased to announce the completion of a new book &#8220;Real-world Electronic Voting: Design, Analysis and Deployment&#8221;, which is due to be published by the <a href=\"https:\/\/www.crcpress.com\/Real-world-Electronic-Voting-Design-Analysis-and-Deployment\/Hao-Ryan\/9781498714693\">CRC Press<\/a>. It&#8217;s still in press, but you can pre-order it from <a href=\"http:\/\/www.amazon.co.uk\/Real-world-Electronic-Voting-Analysis-Deployment\/dp\/1498714692\/ref=sr_1_1?ie=UTF8&amp;qid=1455404733&amp;sr=8-1&amp;keywords=real-world+e-voting\">Amazon <\/a>(the book will be freely available in the open-access domain two years from its publication).<\/p>\n<p>This book is co-edited by Peter Ryan and myself. It aims to capture all major developments in electronic voting since 2003 in <strong>a real-world setting<\/strong>. It covers three broad categories: e-voting protocols, attacks reported on e-voting, and new developments on the use of e-voting.<\/p>\n<p>Table of contents [<a href=\"http:\/\/homepages.cs.ncl.ac.uk\/feng.hao\/files\/Book-ToC.pdf\">PDF<\/a>]<\/p>\n<p>Foreword (<strong><em>Josh Benaloh<\/em><\/strong>) [<a href=\"http:\/\/homepages.cs.ncl.ac.uk\/feng.hao\/files\/Book-Foreword.pdf\">PDF<\/a>]<\/p>\n<p>Preface (<strong><em>Feng Hao<\/em><\/strong> and <strong><em>Peter Ryan<\/em><\/strong>) [<a href=\"http:\/\/homepages.cs.ncl.ac.uk\/feng.hao\/files\/Book-Preface.pdf\">PDF<\/a>]<\/p>\n<p>Part 1: Setting the scheme<\/p>\n<ul>\n<li>Chapter 1: Software Independence Revisited (<strong><em>Ronald L. Rivest<\/em> <\/strong>and <strong><em>Madars Virza<\/em><\/strong>)<\/li>\n<li>Chapter 2: Guidelines for Trialling E-voting in National Elections (<strong><em>Ben Goldsmith<\/em><\/strong>)<\/li>\n<\/ul>\n<p>Part II: Real-world e-voting in national elections<\/p>\n<ul>\n<li>Chapter 3: Overview of Current State of E-voting World-wide (<strong><em>Carlos Vegas<\/em><\/strong> and <strong><em>Jordi Barrat<\/em><\/strong>)<\/li>\n<li>Chapter 4: Electoral Systems Used around the World (<strong><em>Siamak F. Shahandashti<\/em><\/strong>)<\/li>\n<li>Chapter 5: E-voting in Norway (<strong><em>Kristian Gj\u00f8steen<\/em><\/strong>)<\/li>\n<li>Chapter 6: E-voting in Estonia (<strong><em>Dylan Clarke<\/em><\/strong> and <strong><em>Tarvi Martens<\/em><\/strong>)<\/li>\n<li>Chapter 7: Practical Attacks on Real-world E-voting (<strong><em>J. Alex Halderman<\/em><\/strong>)<\/li>\n<\/ul>\n<p>Part III: E2E verifiable protocols and real-world applications<\/p>\n<ul>\n<li>Chapter 8: An Overview of End-to-End Verifiable Voting Systems (<strong><em>Syed Taha Ali<\/em> <\/strong>and <strong><em>Judy Murray<\/em><\/strong>)<\/li>\n<li>Chapter 9: Theoretical Attacks on E2E Voting Systems (<strong><em>Peter Hyun-Jeen Lee<\/em><\/strong> and <strong><em>Siamak F. Shahandashti<\/em><\/strong>)<\/li>\n<li>Chapter 10: The Scantegrity Voting System and its Use in the Takoma Park Elections (<strong><em>Richard T. Carback<\/em><\/strong>, <strong><em>David Chaum<\/em><\/strong>, <strong><em>Jeremy Clark<\/em><\/strong>, <strong><em>Aleksander Essex<\/em><\/strong>, <strong><em>Travis Mayberry<\/em><\/strong>, <strong><em>Stefan Popoveniuc<\/em><\/strong>, <strong><em>Ronald L. Rivest<\/em><\/strong>, <strong><em>Emily Shen<\/em><\/strong>, <strong><em>Alan T.<\/em><\/strong><br \/>\n<strong> <em>Sherman<\/em><\/strong>, <strong><em>Poorvi L. Vora<\/em><\/strong>, <strong><em>John Wittrock<\/em><\/strong>, and <strong><em>Filip Zag\u00f3rski<\/em><\/strong>)<\/li>\n<li>Chapter 11: Internet voting with Helios (<strong><em>Olivier Pereira<\/em><\/strong>)<\/li>\n<li>Chapter 12: Pr\u00eat \u00e0 Voter &#8211; the Evolution of the Species (<strong><em>Peter Y A Ryan<\/em><\/strong>, <strong><em>Steve Schneider<\/em><\/strong>, and<strong><em> Vanessa Teague<\/em><\/strong>)<\/li>\n<li>Chapter 13: DRE-i and Self-Enforcing E-Voting (<strong><em>Feng Hao<\/em><\/strong>)<\/li>\n<li>Chapter 14: STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System (<strong><em>Susan Bell<\/em><\/strong>, <strong><em>Josh Benaloh<\/em><\/strong>, <strong><em>Michael D. Byrne<\/em><\/strong>, <strong><em>Dana DeBeauvoir<\/em><\/strong>, <strong><em>Bryce Eakin<\/em><\/strong>, <strong><em>Gail Fisher<\/em><\/strong>, <strong><em>Philip Kortum<\/em><\/strong>, <strong><em>Neal McBurnett<\/em><\/strong>, <strong><em>Julian Montoya<\/em><\/strong>, <strong><em>Michelle<\/em> <em>Parker<\/em><\/strong>, <strong><em>Olivier Pereira<\/em><\/strong>, <strong><em>Philip B. Stark<\/em><\/strong>, <strong><em>Dan S. Wallach<\/em><\/strong>, and <strong><em>Michael Winn<\/em><\/strong>)<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>We are pleased to announce the completion of a new book &#8220;Real-world Electronic Voting: Design, Analysis and Deployment&#8221;, which is due to be published by the CRC Press. It&#8217;s still in press, but you can pre-order it from Amazon (the &hellip; <a href=\"https:\/\/blogs.ncl.ac.uk\/security\/2016\/02\/15\/real-world-electronic-voting-design-analysis-and-deployment\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4854,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9,6,17],"tags":[],"class_list":["post-366","post","type-post","status-publish","format-standard","hentry","category-announcement","category-applied-security","category-news"],"_links":{"self":[{"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/posts\/366","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/users\/4854"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/comments?post=366"}],"version-history":[{"count":12,"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/posts\/366\/revisions"}],"predecessor-version":[{"id":379,"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/posts\/366\/revisions\/379"}],"wp:attachment":[{"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/media?parent=366"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/categories?post=366"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.ncl.ac.uk\/security\/wp-json\/wp\/v2\/tags?post=366"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}