Papers

Search results

    ConferenceTitleAuthor(s)
    WORLDS '06Towards Fingerpointing in the Emulab Dynamic Distributed SystemMichael P. Kasick, Priya Narasimhan, Kevin Atkinson, Jay Lepreau
    WORLDS '06Data Management for Internet-Scale Single-Sign-OnSharon E. Perl, Margo Seltzer
    EVT '06Making Ballot Language Understandable to VotersSharon J. Laskowski, Janice (Ginny) Redish
    EVT '06A Comparison of Usability Between Voting MethodsKristen K. Greene, Michael D. Byrne, Sarah P. Everett
    EVT '06The Importance of Usability Testing of Voting SystemsPaul S. Herrnson, Richard G. Niemi, Michael J. Hanmer, Benjamin B. Bederson, Frederick G. Conrad, Michael Traugott
    EVT '06Secure Data Export and Auditing Using Data DiodesDouglas W. Jones, Tom C. Bowersox
    EVT '06Simple Verifiable ElectionsJosh Benaloh
    EVT '06Prerendered User Interfaces for Higher-Assurance Electronic VotingKa-Ping Yee, David Wagner, Marti Hearst, Steven M. Bellovin
    EVT '06Ballot Casting AssuranceBen Adida, C. Andrew Neff
    EVT '06Transparency and Access to Source Code in Electronic VotingJoseph Lorenzo Hall
    EVT '06A Critical Analysis of the Council of Europe Recommendations on E-VotingMargaret McGaley, J. Paul Gibson
    EVT '06An Examination of Vote Verification Technologies: Findings and Experiences from the Maryland StudyAlan T. Sherman, Aryya Gangopadhyay, Stephen H. Holden, George Karabatis, A. Gunes Koru, Chris M. Law, Donald F. Norris, John Pinkston, Andrew Sears, Dongsong Zhang
    USENIX Security '06Polymorphic Blending AttacksPrahlad Fogla, Monirul Sharif, Roberto Perdisci, Oleg Kolesnikov, Wenke Lee
    USENIX Security '06Dynamic Application-Layer Protocol Analysis for Network Intrusion DetectionHolger Dreger, Anja Feldmann
    USENIX Security '06Behavior-based Spyware DetectionEngin Kirda, Christopher Kruegel
    USENIX Security '06An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic DataNick L. Petroni, Jr., Timothy Fraser, AAron Walters, William A. Arbaugh
    USENIX Security '06vTPM: Virtualizing the Trusted Platform ModuleStefan Berger, Ramón Cáceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, Leendert van Doorn
    USENIX Security '06Designing Voting Machines for VerificationNaveen Sastry
    USENIX Security '06SANE: A Protection Architecture for Enterprise NetworksMartin Casado, Tal Garfinkel, Aditya Akella, Michael J. Freedman, Dan Boneh, Nick McKeown
    USENIX Security '06PHAS: A Prefix Hijack Alert SystemMohit Lad, Daniel Massey, Dan Pei, Yiguo Wu, Beichuan Zhang, Lixia Zhang
    USENIX Security '06Passive Data Link Layer 802.11 Wireless Device Driver FingerprintingJason Franklin, Damon McCoy
    USENIX Security '06Static Detection of Security Vulnerabilities in Scripting LanguagesYichen Xie, Alex Aiken
    USENIX Security '06Rule-Based Static Analysis of Network Protocol ImplementationsOctavian Udrea, Cristian Lumezanu
    USENIX Security '06Evaluating SFI for a CISC ArchitectureStephen McCamant, Greg Morrisett
    USENIX Security '06SigFree: A Signature-free Buffer Overflow Attack BlockerXinran Wang, Chi-Chun Pan

Pages