WORLDS '06 | Towards Fingerpointing in the Emulab Dynamic Distributed System | Michael P. Kasick, Priya Narasimhan, Kevin Atkinson, Jay Lepreau |
WORLDS '06 | Data Management for Internet-Scale Single-Sign-On | Sharon E. Perl, Margo Seltzer |
EVT '06 | Making Ballot Language Understandable to Voters | Sharon J. Laskowski, Janice (Ginny) Redish |
EVT '06 | A Comparison of Usability Between Voting Methods | Kristen K. Greene, Michael D. Byrne, Sarah P. Everett |
EVT '06 | The Importance of Usability Testing of Voting Systems | Paul S. Herrnson, Richard G. Niemi, Michael J. Hanmer, Benjamin B. Bederson, Frederick G. Conrad, Michael Traugott |
EVT '06 | Secure Data Export and Auditing Using Data Diodes | Douglas W. Jones, Tom C. Bowersox |
EVT '06 | Simple Verifiable Elections | Josh Benaloh |
EVT '06 | Prerendered User Interfaces for Higher-Assurance Electronic Voting | Ka-Ping Yee, David Wagner, Marti Hearst, Steven M. Bellovin |
EVT '06 | Ballot Casting Assurance | Ben Adida, C. Andrew Neff |
EVT '06 | Transparency and Access to Source Code in Electronic Voting | Joseph Lorenzo Hall |
EVT '06 | A Critical Analysis of the Council of Europe Recommendations on E-Voting | Margaret McGaley, J. Paul Gibson |
EVT '06 | An Examination of Vote Verification Technologies: Findings and Experiences from the Maryland Study | Alan T. Sherman, Aryya Gangopadhyay, Stephen H. Holden, George Karabatis, A. Gunes Koru, Chris M. Law, Donald F. Norris, John Pinkston, Andrew Sears, Dongsong Zhang |
USENIX Security '06 | Polymorphic Blending Attacks | Prahlad Fogla, Monirul Sharif, Roberto Perdisci, Oleg Kolesnikov, Wenke Lee |
USENIX Security '06 | Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection | Holger Dreger, Anja Feldmann |
USENIX Security '06 | Behavior-based Spyware Detection | Engin Kirda, Christopher Kruegel |
USENIX Security '06 | An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data | Nick L. Petroni, Jr., Timothy Fraser, AAron Walters, William A. Arbaugh |
USENIX Security '06 | vTPM: Virtualizing the Trusted Platform Module | Stefan Berger, Ramón Cáceres, Kenneth A. Goldman, Ronald Perez, Reiner Sailer, Leendert van Doorn |
USENIX Security '06 | Designing Voting Machines for Verification | Naveen Sastry |
USENIX Security '06 | SANE: A Protection Architecture for Enterprise Networks | Martin Casado, Tal Garfinkel, Aditya Akella, Michael J. Freedman, Dan Boneh, Nick McKeown |
USENIX Security '06 | PHAS: A Prefix Hijack Alert System | Mohit Lad, Daniel Massey, Dan Pei, Yiguo Wu, Beichuan Zhang, Lixia Zhang |
USENIX Security '06 | Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting | Jason Franklin, Damon McCoy |
USENIX Security '06 | Static Detection of Security Vulnerabilities in Scripting Languages | Yichen Xie, Alex Aiken |
USENIX Security '06 | Rule-Based Static Analysis of Network Protocol Implementations | Octavian Udrea, Cristian Lumezanu |
USENIX Security '06 | Evaluating SFI for a CISC Architecture | Stephen McCamant, Greg Morrisett |
USENIX Security '06 | SigFree: A Signature-free Buffer Overflow Attack Blocker | Xinran Wang, Chi-Chun Pan |