Papers

Search results

    ConferenceTitleAuthor(s)
    EVT '06Ballot Casting AssuranceBen Adida, C. Andrew Neff
    EVT '06Transparency and Access to Source Code in Electronic VotingJoseph Lorenzo Hall
    EVT '06A Critical Analysis of the Council of Europe Recommendations on E-VotingMargaret McGaley, J. Paul Gibson
    EVT '06An Examination of Vote Verification Technologies: Findings and Experiences from the Maryland StudyAlan T. Sherman, Aryya Gangopadhyay, Stephen H. Holden, George Karabatis, A. Gunes Koru, Chris M. Law, Donald F. Norris, John Pinkston, Andrew Sears, Dongsong Zhang
    HotSec '06Incentive-Centered Design for Information Security Rick Wash, Jeffrey K. MacKie-Mason
    HotSec '06Password Rescue: A New Approach to Phishing Prevention Dinei Florêncio, Cormac Herley
    HotSec '06Security Through Publicity Eric Osterweil, Dan Massey, Batsukh Tsendjav, Beichuan Zhang, Lixia Zhang
    HotSec '06Shame on Trust in Distributed SystemsTrent Jaeger, Patrick McDaniel, Luke St. Clair, Ramón Cáceres, Reiner Sailer
    HotSec '06Sensor Network Security: More Interesting Than You Think Madhukar Anand, Eric Cronin, Micah Sherr, Zachary Ives, Insup Lee
    HotSec '06Johnny Can Obfuscate: Beyond Mother’s Maiden Name William Cheswick
    HotSec '06Secure Software Updates: Disappointments and New Challenges Anthony Bellissimo, John Burgess, Kevin Fu
    HotSec '06Privacy as an Operating System Service Sotiris Ioannidis, Stelios Sidiroglou, Angelos D. Keromytis
    HotSec '06Exposure Maps: Removing Reliance on Attribution During Scan Detection David Whyte, P.C. van Oorschot, Evangelos Kranakis
    HotSec '06Towards Attack-Agnostic Defenses David Brumley, Dawn Song
    HotSec '06Rethinking Hardware Support for Network Analysis and Intrusion Prevention V. Paxson, K. Asanović, S. Dharmapurikar, J. Lockwood, R. Pang, R. Sommer, N. Weaver
    USENIX Security '06A Usability Study and Critique of Two Password Managers Sonia Chiasson, P.C. van Oorschot, Robert Biddle
    USENIX Security '06On the Release of CRLs in Public Key InfrastructureChengyu Ma, Nan Hu, Yingjiu Li
    USENIX Security '06Biometric Authentication Revisited: Understanding the Impact of Wolves in Sheep's ClothingLucas Ballard, Fabian Monrose, Daniel Lopresti
    USENIX Security '06How to Build a Low-Cost, Extended-Range RFID SkimmerIlan Kirschenbaum, Avishai Wool
    USENIX Security '06Keyboards and Covert ChannelsGaurav Shah, Andres Molina
    USENIX Security '06Lessons from the Sony CD DRM EpisodeJ. Alex Halderman, Edward W. Felten
    USENIX Security '06Milk or Wine: Does Software Security Improve with Age?Andy Ozment, Stuart E. Schechter
    USENIX Security '06N-Variant Systems: A Secretless Framework for Security through DiversityBenjamin Cox, David Evans
    USENIX Security '06Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of AttacksWei Xu, Sandeep Bhatkar, R. Sekar
    USENIX Security '06SANE: A Protection Architecture for Enterprise NetworksMartin Casado, Tal Garfinkel, Aditya Akella, Michael J. Freedman, Dan Boneh, Nick McKeown

Pages