added
authorChristian Urban <christian dot urban at kcl dot ac dot uk>
Tue, 01 Oct 2013 12:59:31 +0100
changeset 107 a399727e1600
parent 106 9feafc9bbe9f
child 108 c3b8432718ed
added
slides/slides02.pdf
slides/slides02.tex
Binary file slides/slides02.pdf has changed
--- a/slides/slides02.tex	Tue Oct 01 00:13:40 2013 +0100
+++ b/slides/slides02.tex	Tue Oct 01 12:59:31 2013 +0100
@@ -474,6 +474,23 @@
 \end{frame}}
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
 
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
+\mode<presentation>{
+\begin{frame}[c]
+
+Which security requirements do paper ballots satisfy better than voice voting?\bigskip
+
+\begin{itemize}
+\item Integrity
+\item Enfranchisement
+\item Ballot secrecy
+\item Voter authentication
+\item Availability
+\end{itemize}
+
+\end{frame}}
+
+
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 \mode<presentation>{
 \begin{frame}[t]
@@ -508,21 +525,6 @@
 \end{frame}}
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
 
-%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
-\mode<presentation>{
-\begin{frame}[c]
-
-Which security requirements do paper ballots satisfy better than voice voting?\bigskip
-
-\begin{itemize}
-\item Integrity
-\item Enfranchisement
-\item Ballot secrecy
-\item Voter authentication
-\item Availability
-\end{itemize}
-
-\end{frame}}
 
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
@@ -610,7 +612,7 @@
 
 \begin{itemize}
 \item acquired a machine from an anonymous source\medskip
-\item the source code running the machine was tried to be kept secret\medskip\pause
+\item they try to keep secret the source code running the machine\medskip\pause
 
 \item first reversed-engineered the machine (extremely tedious)
 \item could completely reboot the machine and even install a virus that infects other Diebold machines
@@ -653,7 +655,7 @@
 \end{center}\pause
 
 You still have to solve problems about
-voter registration, voter authentification, guarding against tampering
+voter registration, voter authentication, guarding against tampering
 
 \end{frame}}
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
@@ -686,7 +688,8 @@
 \begin{itemize}
 \item keep a paper trail and design your system to keep this secure\medskip
 \item make the software open source (avoid security-by-obscurity)\\
-{\small\mbox{}\hfill source code for Estonian vote \textcolor{blue}{\url{http://goo.gl/oRMHAI}}}\medskip
+{\small\mbox{}\hfill source code for Estonian e-vote included\\ 
+\mbox{}\hfill\textcolor{blue}{\url{http://goo.gl/oRMHAI}}}\medskip
 \item have a simple design in order to minimise the attack surface
 \end{itemize}
 
@@ -710,6 +713,21 @@
 \end{frame}}
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%   
 
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+\mode<presentation>{
+\begin{frame}[c]
+\frametitle{Online Banking vs.~E-Voting}
+
+\begin{itemize}
+\item online banking: if fraud occurred you try to identify who did what (somebody's account got zero)\bigskip
+\item e-voting: some parts can be done electronically, but not the actual voting (final year project: online voting)
+\end{itemize}
+
+
+\end{frame}}
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%  
+
+
 
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 \mode<presentation>{