The Community for Technology Leaders
Green Image
Issue No. 05 - Sept.-Oct. (vol. 10)
ISSN: 1540-7993
From the Editors

Are Things Getting Worse? (HTML)

Robin Bloomfield , City University London
pp. 3
News Briefs
10th Anniversary Exclusive

Privacy: Front and Center (Abstract)

Ann Cavoukian , Province of Ontario, Canada
Alan Davidson , Massachusetts Institute of Technology
Ed Felton , US Federal Trade Commission
Marit Hansen , Land Schleswig-Holstein, Germany
Anna Slomovic , Equifax
pp. 10-15
Guest Editors' Introduction

Realities of E-voting Security (HTML)

Michael Shamos , Carnegie Mellon University
Alec Yasinsac , University of South Alabama
pp. 16-17
E-voting Security

Hover: Trustworthy Elections with Hash-Only Verification (Abstract)

Aleksander Essex , Chidlren's Hospital of Eastern Ontario Research Institute
Urs Hengartner , University of Waterloo, Canada
pp. 18-24

The Future of E-voting in Australia (Abstract)

Richard Buckland , University of New South Wales
Roland Wen , University of New South Wales
pp. 25-32

Evidence-Based Elections (Abstract)

Philip B. Stark , University of California, Berkeley
David Wagner , University of California, Berkeley
pp. 33-41

A Gentle Introduction to Risk-Limiting Audits (Abstract)

Philip B. Stark , University of California, Berkeley
pp. 42-49

Electronic Voting Security 10 Years after the Help America Vote Act (Abstract)

Merle S. King , Kennesaw State University
Brian Hancock , US Election Assistance Commission
pp. 50-52
Database Search

Usable, Secure, Private Search (Abstract)

Mariana Raykova , IBM Research
Ang Cui , Columbia University
Binh Vo , Columbia University
Bin Liu , Columbia University
Tal Malkin , Columbia University
Steven M. Bellovin , Columbia University
Salvatore J. Stolfo , Columbia University
pp. 53-60
It All Depends

Security and Interoperable-Medical-Device Systems, Part 1 (Abstract)

Krishna K. Venkatasubramanian , Worcester Polytechnic Institute
Eugene Y. Vasserman , Kansas State University
Oleg Sokolsky , University of Pennsylvania
Insup Lee , University of Pennsylvania
pp. 61-63

Security and Elections (Abstract)

Matt Bishop , University of California, Davis
Sean Peisert , University of California, Davis
pp. 64-67
On the Horizon

The State of Embedded-Device Security (Spoiler Alert: It's Bad) (Abstract)

John Viega , Perimeter E-Security
Hugh Thompson , People Security
pp. 68-70
Basic Training

Filling Your Cyber Operations Training Toolbox (Abstract)

Josh Pauli , Dakota State University
Patrick Engebretson , Dakota State University
pp. 71-74
Secure Systems
Security & Privacy Economics

The Price of Privacy (Abstract)

Michael Lesk , Rutgers University
pp. 79-81
Building Security In
For Good Measure

Risk Aversion (Abstract)

pp. 86-87
78 ms
(Ver 3.3 (11022016))