Sciweavers

53302 search results - page 10539 / 10661
» On the design of a
Sort
View
USS
2010
13 years 7 months ago
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address and determine if a port is open or closed, or ...
Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidia...
USS
2010
13 years 7 months ago
SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics
Secure multiparty computation (MPC) allows joint privacy-preserving computations on data of multiple parties. Although MPC has been studied substantially, building solutions that ...
Martin Burkhart, Mario Strasser, Dilip Many, Xenof...
USS
2010
13 years 7 months ago
Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy
On November 3, 2009, voters in Takoma Park, Maryland, cast ballots for mayor and city council members using the ScantegrityII voting system--the first time any end-to-end (e2e) vo...
Richard Carback, David Chaum, Jeremy Clark, John C...
VRST
2010
ACM
13 years 7 months ago
Shake-your-head: revisiting walking-in-place for desktop virtual reality
The Walking-In-Place interaction technique was introduced to navigate infinitely in 3D virtual worlds by walking in place in the real world. The technique has been initially devel...
Léo Terziman, Maud Marchal, Mathieu Emily, ...
VSTTE
2010
Springer
13 years 7 months ago
Dafny Meets the Verification Benchmarks Challenge
A suite of verification benchmarks for software verification tools and techniques, presented at VSTTE 2008 [11], provides an initial catalogue of benchmark challenges for the Verif...
K. Rustan M. Leino, Rosemary Monahan
« Prev « First page 10539 / 10661 Last » Next »