Conferences

Search results

    TitleConferenceSpeaker(s)
    Frankenstein: Stitching Malware from Benign BinariesWOOT '12
    SMT Solvers in Software SecurityWOOT '12
    Web-based Attacks on Host-Proof Encrypted StorageWOOT '12
    The Future of HTTPSWOOT '12
    iOS and the Rising Cost of Reliable ExploitationWOOT '12
    Using Prêt à Voter in Victoria State ElectionsEVT/WOTE '12
    Probing the Front Lines: Pollworker Perceptions of Security & PrivacyEVT/WOTE '12
    Cobra: Toward Concurrent Ballot Authorization for Internet VotingEVT/WOTE '12
    Coercion-Resistant Electronic Elections with Write-In CandidatesEVT/WOTE '12
    Software Vulnerabilities in the Brazilian Voting MachineEVT/WOTE '12
    Everything You Know About Password-Stealing Is WrongWOOT '12
    Counter to Intent: Voters' Mental Models of Alternative Counting MethodsEVT/WOTE '12
    A Hybrid Touch Interface for Prêt à VoterEVT/WOTE '12
    Operator-Assisted Tabulation of Optical Scan BallotsEVT/WOTE '12
    Cryptanalysis of a Universally Verifiable Efficient Re-encryption MixnetEVT/WOTE '12
    Improving Helios with Everlasting Privacy Towards the PublicEVT/WOTE '12
    Automated Analysis of Election Audit LogsEVT/WOTE '12
    A Systematic Process-Model-based Approach for Synthesizing Attacks and Evaluating ThemEVT/WOTE '12
    A Bayesian Method for Auditing ElectionsEVT/WOTE '12
    BRAVO: Ballot-polling Risk-limiting Audits to Verify OutcomesEVT/WOTE '12
    Keynote AddressEVT/WOTE '12
    Lightning DebatesEVT/WOTE '12
    Read It Twice! A Mass-Storage-Based TOCTTOU AttackWOOT '12
    Why We Built BOSH, a Release Engineering and Service Deployment Tool-ChainWOOT '12
    Case Study: The Haiti Rural Broadband InitiativeNSDR '12Eric Blantz, Bruce Baike

Pages