EVT '06 | Ballot Casting Assurance | Ben Adida, C. Andrew Neff |
EVT '06 | Transparency and Access to Source Code in Electronic Voting | Joseph Lorenzo Hall |
EVT '06 | A Critical Analysis of the Council of Europe Recommendations on E-Voting | Margaret McGaley, J. Paul Gibson |
EVT '06 | An Examination of Vote Verification Technologies: Findings and Experiences from the Maryland Study | Alan T. Sherman, Aryya Gangopadhyay, Stephen H. Holden, George Karabatis, A. Gunes Koru, Chris M. Law, Donald F. Norris, John Pinkston, Andrew Sears, Dongsong Zhang |
HotSec '06 | Incentive-Centered Design for Information Security | Rick Wash, Jeffrey K. MacKie-Mason |
HotSec '06 | Password Rescue: A New Approach to Phishing Prevention | Dinei Florêncio, Cormac Herley |
HotSec '06 | Security Through Publicity | Eric Osterweil, Dan Massey, Batsukh Tsendjav, Beichuan Zhang, Lixia Zhang |
HotSec '06 | Shame on Trust in Distributed Systems | Trent Jaeger, Patrick McDaniel, Luke St. Clair, Ramón Cáceres, Reiner Sailer |
HotSec '06 | Sensor Network Security: More Interesting Than You Think | Madhukar Anand, Eric Cronin, Micah Sherr, Zachary Ives, Insup Lee |
HotSec '06 | Johnny Can Obfuscate: Beyond Mother’s Maiden Name | William Cheswick |
HotSec '06 | Secure Software Updates: Disappointments and New Challenges | Anthony Bellissimo, John Burgess, Kevin Fu |
HotSec '06 | Privacy as an Operating System Service | Sotiris Ioannidis, Stelios Sidiroglou, Angelos D. Keromytis |
HotSec '06 | Exposure Maps: Removing Reliance on Attribution During Scan Detection | David Whyte, P.C. van Oorschot, Evangelos Kranakis |
HotSec '06 | Towards Attack-Agnostic Defenses | David Brumley, Dawn Song |
HotSec '06 | Rethinking Hardware Support for Network Analysis and Intrusion Prevention | V. Paxson, K. Asanović, S. Dharmapurikar, J. Lockwood, R. Pang, R. Sommer, N. Weaver |
USENIX Security '06 | A Usability Study and Critique of Two Password Managers | Sonia Chiasson, P.C. van Oorschot, Robert Biddle |
USENIX Security '06 | On the Release of CRLs in Public Key Infrastructure | Chengyu Ma, Nan Hu, Yingjiu Li |
USENIX Security '06 | Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's Clothing | Lucas Ballard, Fabian Monrose, Daniel Lopresti |
USENIX Security '06 | How to Build a Low-Cost, Extended-Range RFID Skimmer | Ilan Kirschenbaum, Avishai Wool |
USENIX Security '06 | Keyboards and Covert Channels | Gaurav Shah, Andres Molina |
USENIX Security '06 | Lessons from the Sony CD DRM Episode | J. Alex Halderman, Edward W. Felten |
USENIX Security '06 | Milk or Wine: Does Software Security Improve with Age? | Andy Ozment, Stuart E. Schechter |
USENIX Security '06 | N-Variant Systems: A Secretless Framework for Security through Diversity | Benjamin Cox, David Evans |
USENIX Security '06 | Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks | Wei Xu, Sandeep Bhatkar, R. Sekar |
USENIX Security '06 | SANE: A Protection Architecture for Enterprise Networks | Martin Casado, Tal Garfinkel, Aditya Akella, Michael J. Freedman, Dan Boneh, Nick McKeown |