{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:02:05Z","timestamp":1761580925248,"version":"3.41.0"},"reference-count":17,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2011,9,1]],"date-time":"2011-09-01T00:00:00Z","timestamp":1314835200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst. Secur."],"published-print":{"date-parts":[[2011,9]]},"abstract":"<jats:p>Tamper-evident seals are used by many states\u2019 election officials on voting machines and ballot boxes, either to protect the computer and software from fraudulent modification or to protect paper ballots from fraudulent substitution or stuffing. Physical tamper-indicating seals can usually be easily defeated, given they way they are typically made and used; and the effectiveness of seals depends on the protocol for their application and inspection. The legitimacy of our elections may therefore depend on whether a particular state\u2019s use of seals is effective to prevent, deter, or detect election fraud. This paper is a case study of the use of seals on voting machines by the State of New Jersey. I conclude that New Jersey\u2019s protocols for the use of tamper-evident seals have been not at all effective. I conclude with a discussion of the more general problem of seals in democratic elections.<\/jats:p>","DOI":"10.1145\/2019599.2019603","type":"journal-article","created":{"date-parts":[[2011,10,4]],"date-time":"2011-10-04T13:24:18Z","timestamp":1317734658000},"page":"1-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Security Seals on Voting Machines"],"prefix":"10.1145","volume":"14","author":[{"given":"Andrew W.","family":"Appel","sequence":"first","affiliation":[{"name":"Princeton University"}]}],"member":"320","published-online":{"date-parts":[[2011,9]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Appel A. W. Ginsburg M. Hursti H. Kernighan B. W. Richards C. D. and Tan G. 2008. Insecurities and inaccuracies of the Sequoia AVC Advantage 9.00H DRE voting machine. http:\/\/citp.princeton.edu\/voting\/advantage. Appel A. W. Ginsburg M. Hursti H. Kernighan B. W. Richards C. D. and Tan G. 2008. Insecurities and inaccuracies of the Sequoia AVC Advantage 9.00H DRE voting machine. http:\/\/citp.princeton.edu\/voting\/advantage."},{"volume-title":"Proceedings of the Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections (EVT\/WOTE\u201909)","author":"Appel A. W.","key":"e_1_2_1_2_1"},{"key":"e_1_2_1_3_1","unstructured":"Argonne Vulnerability Assessment Team. 2009. Electronic vote tampering. Video rep. APT #64451. Argonne National Laboratory. Argonne Vulnerability Assessment Team . 2009. Electronic vote tampering. Video rep. APT #64451. Argonne National Laboratory."},{"key":"e_1_2_1_4_1","unstructured":"Brooks. 2007. Strap & Plastic Security Seals E. J. Brooks Co. http:\/\/www.brooksseals.com\/images\/product\/pdfs\/Plastic_Strap_Seal_Brochure_04202007.pdf. Brooks. 2007. Strap & Plastic Security Seals E. J. Brooks Co. http:\/\/www.brooksseals.com\/images\/product\/pdfs\/Plastic_Strap_Seal_Brochure_04202007.pdf."},{"key":"e_1_2_1_5_1","unstructured":"Brooks. 2008. Tamper Indicative Labels Tapes and Anti-Counterfeit Products E. J. Brooks Co. http:\/\/www.brooksseals.com\/images\/product\/pdfs\/Tapes_and_Labels_Brochure.pdf. Brooks. 2008. Tamper Indicative Labels Tapes and Anti-Counterfeit Products E. J. Brooks Co. http:\/\/www.brooksseals.com\/images\/product\/pdfs\/Tapes_and_Labels_Brochure.pdf."},{"volume-title":"Proceedings of the Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections (EVT\/WOTE\u201909)","author":"Checkoway S.","key":"e_1_2_1_6_1"},{"key":"e_1_2_1_7_1","first-page":"93","article-title":"The real deal on seals","volume":"41","author":"Johnston R. G.","year":"1997","journal-title":"Security Manag."},{"volume-title":"Proceedings of the 7th Security Seals Symposium. http:\/\/pearl1.lanl.gov\/seals\/images\/choosing_seals.pdf.","year":"2006","author":"Johnston R. G.","key":"e_1_2_1_8_1"},{"key":"e_1_2_1_9_1","unstructured":"Johnston R. G. 2010. Insecurity of New Jersey\u2019s seal protocols for voting machines. http:\/\/www.cs.princeton.edu\/~appel\/voting\/Johnston-AnalysisOfNJSeals.pdf. Johnston R. G. 2010. Insecurity of New Jersey\u2019s seal protocols for voting machines. http:\/\/www.cs.princeton.edu\/~appel\/voting\/Johnston-AnalysisOfNJSeals.pdf."},{"key":"e_1_2_1_10_1","first-page":"15","article-title":"Vulnerability assessment of security seals","volume":"20","author":"Johnston R. G.","year":"1997","journal-title":"J. Sec. Admin."},{"key":"e_1_2_1_11_1","unstructured":"Felten E. W. 2006. Unattended voting machines already showing up. Freedom to Tinker. http:\/\/freedom-to-tinker.com\/blog\/felten\/unattended-voting-machines-already-showing. Felten E. W. 2006. Unattended voting machines already showing up. Freedom to Tinker. http:\/\/freedom-to-tinker.com\/blog\/felten\/unattended-voting-machines-already-showing."},{"key":"e_1_2_1_12_1","unstructured":"Felten E. W. 2008a. Unattended voting machines as usual. Freedom to Tinker. http:\/\/freedom-to-tinker.com\/blog\/felten\/unattended-voting-machines-usual. Felten E. W. 2008a. Unattended voting machines as usual. Freedom to Tinker. http:\/\/freedom-to-tinker.com\/blog\/felten\/unattended-voting-machines-usual."},{"key":"e_1_2_1_13_1","unstructured":"Felten E. W. 2008b. NJ election day voting machine status. Freedom to Tinker. http:\/\/freedom-to-tinker.com\/blog\/felten\/nj-election-day-voting-machine-status. Felten E. W. 2008b. NJ election day voting machine status. Freedom to Tinker. http:\/\/freedom-to-tinker.com\/blog\/felten\/nj-election-day-voting-machine-status."},{"key":"e_1_2_1_14_1","unstructured":"Felten E. W. 2009. Trial testimony in Gusciora v. Corzine 2\/09. Felten E. W. 2009. Trial testimony in Gusciora v. Corzine 2\/09."},{"key":"e_1_2_1_15_1","unstructured":"Opinion. 2010. Superior Court of New Jersey Opinion in Gusciora v. Corzine Docket No. MER-L-2691-04 Decided by Linda Feinberg A.J.S.C. 2\/10. http:\/\/www.cs.princeton.edu\/~appel\/voting\/election_case100201.pdf. Opinion . 2010. Superior Court of New Jersey Opinion in Gusciora v. Corzine Docket No. MER-L-2691-04 Decided by Linda Feinberg A.J.S.C. 2\/10. http:\/\/www.cs.princeton.edu\/~appel\/voting\/election_case100201.pdf."},{"key":"e_1_2_1_16_1","unstructured":"Prnewswire. 2009. New Jersey Division of Elections selects Allied Security Innovations products to secure voting machines PR Newswire 8\/11. http:\/\/sev.prnewswire.com\/homeland-security\/20090811\/NE5891011082009-1.html. Prnewswire. 2009. New Jersey Division of Elections selects Allied Security Innovations products to secure voting machines PR Newswire 8\/11. http:\/\/sev.prnewswire.com\/homeland-security\/20090811\/NE5891011082009-1.html."},{"key":"e_1_2_1_17_1","unstructured":"Sequoia. 2008. Response from Sequoia Voting Systems to the report of Andrew W. Appel http:\/\/www.sequoiavote.com\/documents\/SVS_Response_to_Appel_ report_NJ.pdf. Sequoia. 2008. Response from Sequoia Voting Systems to the report of Andrew W. Appel http:\/\/www.sequoiavote.com\/documents\/SVS_Response_to_Appel_ report_NJ.pdf."}],"container-title":["ACM Transactions on Information and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2019599.2019603","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2019599.2019603","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:07:42Z","timestamp":1750273662000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2019599.2019603"}},"subtitle":["A Case Study"],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":17,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2011,9]]}},"alternative-id":["10.1145\/2019599.2019603"],"URL":"https:\/\/doi.org\/10.1145\/2019599.2019603","relation":{},"ISSN":["1094-9224","1557-7406"],"issn-type":[{"type":"print","value":"1094-9224"},{"type":"electronic","value":"1557-7406"}],"subject":[],"published":{"date-parts":[[2011,9]]},"assertion":[{"value":"2010-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2011-03-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2011-09-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}