By Topic

Security and Elections

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Bishop, M. ; Dept. of Comput. Sci., Univ. of California, Davis, Davis, CA, USA ; Peisert, S.

Elections are common to almost all societies. Periodically, groups of people determine their representatives, leaders, neighborhood spokespersons, corporate executives, or union representatives by casting ballots and counting votes using a variety of schemes. Those who don't participate see others around them doing so. And stories abound about rigged elections or results considered compromised by accident or poor communication. US-based elections follow a general pattern of voter registration, determining items to vote on, generating ballots, distributing election materials to the polling places, voting, counting the votes, declaring winners, and auditing the results. The details differ among jurisdictions, but each step requires considerable care to ensure the election's integrity. So, elections are an ideal mechanism for teaching about security. At the University of California, Davis, we teach numerous computer security classes for undergraduate majors and nonmajors and for graduate students. This column presents some of our experiences using elections and e-voting systems as lecture material and as a class project done with the Yolo County Elections Office.

Published in:

Security & Privacy, IEEE  (Volume:10 ,  Issue: 5 )