209 results on '"Dan S. Wallach"'
Search Results
2. ElectionGuard: a Cryptographic Toolkit to Enable Verifiable Elections.
3. Ballot Tabulation Using Deep Learning.
4. Summative Usability Assessments of STAR-Vote: A Cryptographically Secure e2e Voting System That Has Been Empirically Proven to Be Easy to Use.
5. VAULT-Style Risk-Limiting Audits and the Inyo County Pilot.
6. Bad Tools Hurt: Lessons for teaching computer security skills to undergraduates.
7. Scaling Up Anonymous Communication with Efficient Nanopayment Channels.
8. Machine Learning for Measuring and Analyzing Online Social Communications.
9. An Historical Analysis of the SEAndroid Policy Evolution.
10. Clash Attacks and the STAR-Vote System.
11. Public Evidence from Secret Ballots.
12. Present but Unreachable: Reducing Persistentlatent Secrets in HotSpot JVM.
13. Verification of STAR-Vote and Evaluation of FDR and ProVerif.
14. Total Recall: Persistence of Passwords in Android.
15. The Design and Implementation of a Verified File System with End-to-End Data Integrity.
16. How Human Factors Can Help Preserve Democracy in the Age of Pandemics.
17. Removing Secrets from Android's TLS.
18. Picking up the trash: Exploiting generational GC for memory analysis.
19. Investigating the effectiveness of web adblockers.
20. On the security of ballot marking devices.
21. Known Unknowns: An Analysis of Twitter Censorship in Turkey.
22. Performance and Energy Consumption Analysis of a Delay-Tolerant Network for Censorship-Resistant Communication.
23. Users' Mental Models for Three End-to-End Voting Systems: Helios, Prêt à Voter, and Scantegrity II.
24. The Decline of Social Media Censorship and the Rise of Self-Censorship after the 2016 Failed Turkish Coup.
25. On the Usability of HTTPS Deployment.
26. ACM TechBrief: Election Security: Risk Limiting Audits
27. Accountable wiretapping - or - I know they can hear you now.
28. Aggregate Characterization of User Behavior in Twitter and Analysis of the Retweet Graph.
29. The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities.
30. The Velocity of Censorship: High-Fidelity Detection of Microblog Post Deletions.
31. A case of collusion: a study of the interface between ad libraries and their apps.
32. Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the Web.
33. AdSplit: Separating Smartphone Advertising from Applications.
34. Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching.
35. Strengthening user authentication through opportunistic cryptographic identity assertions.
36. Language without words: A pointillist model for natural language processing.
37. VAULT-Style Risk-Limiting Audits and the Inyo County Pilot
38. Using predictable mobility patterns to support scalable and secure MANETs of handheld devices.
39. Building Incentives into Tor.
40. Public Evidence from Secret Ballots.
41. Efficient Data Structures For Tamper-Evident Logging.
42. Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries.
43. Robust and Reverse-Engineering Resilient PUF Authentication and Key-Exchange by Substring Matching.
44. Sub-Linear Privacy-Preserving Near-Neighbor Search.
45. VoteBox: A Tamper-evident, Verifiable Electronic Voting System.
46. Finding the Evidence in Tamper-Evident Logs.
47. Electronic voting machines versus traditional methods: improved preference, similar performance.
48. A Taxonomy of Rational Attacks.
49. Scrivener: Providing Incentives in Cooperative Content Distribution Systems.
50. Practical robust localization over large-scale 802.11 wireless networks.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.