Sciweavers

IEEESP
2008
45views more  IEEESP 2008»
13 years 11 months ago
Risking Communications Security: Potential Hazards of the Protect America Act
Steven M. Bellovin, Matt Blaze, Whitfield Diffie, ...
IEEESP
2008
41views more  IEEESP 2008»
13 years 11 months ago
Information Assurance Technology Forecast 2008
Steven M. Bellovin, Terry V. Benzel, Bob Blakley, ...
IEEESP
2008
89views more  IEEESP 2008»
13 years 11 months ago
Virtual Machine Introspection: Observation or Interference?
hardware, eliminating an abstraction layer and often improving efficiency as a result. Examples of type 1 systems include VMware ESX,3 Xen (www. xensource.com/xen/xen/nfamily/virtu...
Kara L. Nance, Matt Bishop, Brian Hay
IEEESP
2008
36views more  IEEESP 2008»
13 years 11 months ago
The Dynamics of Counting and Recounting Votes
Alec Yasinsac, Matt Bishop
IEEESP
2008
67views more  IEEESP 2008»
13 years 11 months ago
Cryptographic Test Correction
Abstract. Multiple choice questionnaires (mcqs) are a widely-used assessment procedure where examinees are asked to select one or more choices from a list. This invited talk1 explo...
Éric Levieil, David Naccache