Conferences

Search results

    TitleConferenceSpeaker(s)
    HotSec'12 2pm Session Q & AHotSec '12
    HotSec'12 4pm Session Q & AHotSec '12
    GANGRENE: Exploring the Mortality of Flash MemoryHotSec '12
    NoisyKey: Tolerating Keyloggers via Keystrokes HidingHotSec '12
    Potentia Est Scientia: Security and Privacy Implications of Energy-Proportional ComputingHotSec '12
    The Benefits of Understanding PasswordsHotSec '12
    How to Ask for PermissionHotSec '12
    Impeding Automated Malware Analysis with Environment-sensitive MalwareHotSec '12
    Software Diversity: Security, Entropy and Game TheoryHotSec '12
    PeerSec: Towards Peer Production and Crowdsourcing for Enhanced SecurityHotSec '12
    When Good Services Go Wild: Reassembling Web Services for Unintended PurposesHotSec '12
    Functional Privacy or Why Cookies Are Better with MilkHotSec '12
    Context-centric SecurityHotSec '12
    Using Prêt à Voter in Victoria State ElectionsEVT/WOTE '12
    Probing the Front Lines: Pollworker Perceptions of Security & PrivacyEVT/WOTE '12
    Cobra: Toward Concurrent Ballot Authorization for Internet VotingEVT/WOTE '12
    Coercion-Resistant Electronic Elections with Write-In CandidatesEVT/WOTE '12
    Software Vulnerabilities in the Brazilian Voting MachineEVT/WOTE '12
    Everything You Know About Password-Stealing Is WrongWOOT '12
    Counter to Intent: Voters' Mental Models of Alternative Counting MethodsEVT/WOTE '12
    A Hybrid Touch Interface for Prêt à VoterEVT/WOTE '12
    Operator-Assisted Tabulation of Optical Scan BallotsEVT/WOTE '12
    Cryptanalysis of a Universally Verifiable Efficient Re-encryption MixnetEVT/WOTE '12
    Improving Helios with Everlasting Privacy Towards the PublicEVT/WOTE '12
    Automated Analysis of Election Audit LogsEVT/WOTE '12

Pages