preprint

An analysis of the security and privacy issues of the Neovote online voting system

This article provides the first security and privacy analysis of the Neovote voting system, which was used for three of the five primaries in the French 2022 presidential election. We show that the demands of transparency, verifiability and …

Vision: Minimalist approaches to enforce privacy by design in surveys

Public institutions and private companies both frequently rely on user surveys for a variety of assessments (e.g. equality issues or quality of work environment). However, many such surveys struggle to garner suffi cient responses, especially when …

Boardroom Voting: Practical Verifiable Voting with Ballot Privacy Using Low-Tech Cryptography in a Single Room

A _boardroom election_ is an election that takes place in a single room --- the boardroom --- in which all voters can see and hear each other. We present the first practical protocol for boardroom elections with ballot privacy and voter verifiability …

Design ideas to improve the usability and security of mail-in ballots

Despite the renewed discussion on mail-in voting, there has been little evolution on ballot and protocol design for this specific set of protocol constraints. This paper describes multiple designs pertaining to ballots, envelopes and chain of …

Towards a framework for detecting temporary obstacles and their impact on mobility for diversely disabled users

While walking around a city, the temporary obstacles present on the sidewalk barely register in most people’s minds. The reality for people with disabilities is quite diff erent, whether it’s a scooter left in the way, crowds that refuse to budge or …

Disabled dimensionality

As humans, we are expected to interact as fully functional 3D manipulators who can observe, handle, and act in three spatial dimensions. This is how users are considered in the design of many products and spaces. Ableism often gives people the …

Visual Secrets: a human security primitive

This article presents and evaluates an idea for a non-transferable secret that can be used for security verifi cation. This new type of security primitive relies on the pre-semantic treatment of images in the human brain. By showing users an image …

Client-side hashing for efficient typo-tolerant password checkers

Credential leaks still happen with regular frequency, and show evidence that, despite decades of warnings, password hashing is still not correctly implemented in practice. The common practice today, inherited from previous but obsolete constraints, …

'Set up son? Scam set, asserts Bob': Semi-Automatic Generation of Bilingual Palindromes

We analyse the problem of composing bilingual palindromes, for which the only high-quality example known is more than 150 years old. We formalise the problem and introduce multiple partial solutions for computer-assisted palindrome composition, as …

A travelling crip’s temporal expenses

The following temporal expenses list comes exclusively from the author's experience as a crip academic based in France but travelling around the world with their mobility scooter. Everything mentioned happened in recent years and only includes the …