24 results on '"Mercuri, Rebecca T."'
Search Results
2. Verification for Electronic Balloting Systems
3. The risks of election believability (or lack thereof)
4. Scoping identity theft
5. Trusting in Transparency
6. The many colors of multimedia security
7. The code of elections
8. The HIPAA-potamus in Health Care Data Security
9. Superscaled security
10. Standards insecurity
11. Analyzing security costs: quantification tools, if applied prudently, can assist in the anticipation, budgeting, and control of direct and indirect computer security costs
12. Computer security: quality rather than quantity: the challenge of applying protection to systems, software, and networks with intrinsic vulnerabilities is a lofty, but ultimately realizable, one
13. The Risks of Self-Auditing Systems.
14. Analyzing Security Costs.
15. On Auditing Audit Trails.
16. System Integrity Revisited
17. COTS and other electronic voting backdoors
18. Security by obscurity
19. Computer security
20. Inside risks: system integrity revisited
21. Providing assurances in a multimedia interactive environment
22. Election Auditing and Verifiability.
23. Why Count Lines of Code?
24. Computers and Consciousness.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.