-
1
-
-
0004072686
-
-
Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA
-
Alfred V. Aho, Ravi Sethi, and Jeffrey D. Ullman. Compilers: Principles, Techniques, and Tools. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1986.
-
(1986)
Compilers: Principles, Techniques, and Tools
-
-
Aho, Alfred V.1
Sethi, Ravi2
Ullman, Jeffrey D.3
-
3
-
-
85052567215
-
-
October Online
-
Andrew W. Appel, Maia Ginsburg, Harri Hursti, Brian W. Kernighan, Christopher D. Richards, and Gang Tan. Insecurities and inaccuracies of the Sequoia AVC Advantage 9.00H DRE voting machine, October 2008. Online: http://citp.princeton.edu/voting/advantage/ advantage-insecurities-redacted.pdf.
-
(2008)
Insecurities and inaccuracies of the Sequoia AVC Advantage 9.00H DRE voting machine
-
-
Appel, Andrew W.1
Ginsburg, Maia2
Hursti, Harri3
Kernighan, Brian W.4
Richards, Christopher D.5
Tan, Gang6
-
4
-
-
78650007982
-
The New Jersey voting-machine lawsuit and the AVC Advantage DRE voting machine
-
David Jefferson, Joseph Lorenzo Hall, and Tal Moran, editors, August
-
Andrew W. Appel, Maia Ginsburg, Harri Hursti, Brian W. Kernighan, Christopher D. Richards, Gang Tan, and Penny Venetis. The New Jersey voting-machine lawsuit and the AVC Advantage DRE voting machine. In David Jefferson, Joseph Lorenzo Hall, and Tal Moran, editors, Proceedings of EVT/WOTE 2009. USENIX/ACCURATE/IAVoSS, August 2009.
-
(2009)
Proceedings of EVT/WOTE 2009. USENIX/ACCURATE/IAVoSS
-
-
Appel, Andrew W.1
Ginsburg, Maia2
Hursti, Harri3
Kernighan, Brian W.4
Richards, Christopher D.5
Tan, Gang6
Venetis, Penny7
-
5
-
-
0036612020
-
Everlasting security in the bounded storage model
-
June
-
Yonatan Aumann, Yan Zong Ding, and Michael Rabin. Everlasting security in the bounded storage model. IEEE Trans. Info. Theory, 48(6):1668-80, June 2002.
-
(2002)
IEEE Trans. Info. Theory
, vol.48
, Issue.6
, pp. 1668-1680
-
-
Aumann, Yonatan1
Ding, Yan Zong2
Rabin, Michael3
-
6
-
-
85021005900
-
-
California Secretary of State Debra Bowen. Technical report, California Secretary of State
-
California Secretary of State Debra Bowen. “Top-to-Bottom” Review of voting machines certified for use in California. Technical report, California Secretary of State, 2007. http://sos.ca.gov/elections/elections.vsr.htm.
-
(2007)
Top-to-Bottom” Review of voting machines certified for use in California
-
-
-
7
-
-
85092075439
-
-
Ohio Secretary of State Jennifer Brunner. Technical report, Ohio Secretary of State
-
Ohio Secretary of State Jennifer Brunner. Evaluation & Validation of Election-Related Equipment, Standards & Testing. Technical report, Ohio Secretary of State, 2007. http://www.sos.state.oh.us/SOS/Text.aspx?page=4512.
-
(2007)
Evaluation & Validation of Election-Related Equipment, Standards & Testing
-
-
-
8
-
-
70349267779
-
When good instructions go bad: Generalizing return-oriented programming to RISC
-
Paul Syverson and Somesh Jha, editors, pages ACM Press, October
-
Erik Buchanan, Ryan Roemer, Hovav Shacham, and Stefan Savage. When good instructions go bad: Generalizing return-oriented programming to RISC. In Paul Syverson and Somesh Jha, editors, Proceedings of CCS 2008, pages 27-38. ACM Press, October 2008.
-
(2008)
Proceedings of CCS 2008
, pp. 27-38
-
-
Buchanan, Erik1
Roemer, Ryan2
Shacham, Hovav3
Savage, Stefan4
-
10
-
-
84983492441
-
Pre-election testing and post-election audit of optical scan voting terminal memory cards
-
David Dill and Tadayoshi Kohno, editors, July
-
Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, Laurent Michel, Nicolas Nicolaou, Alexander Russell, Andrew See, Narasimha Shashidhar, and Alexander A. Shvartsman. Pre-election testing and post-election audit of optical scan voting terminal memory cards. In David Dill and Tadayoshi Kohno, editors, Proceedings of EVT 2008. USENIX/ACCURATE, July 2008.
-
(2008)
Proceedings of EVT 2008. USENIX/ACCURATE
-
-
Davtyan, Seda1
Kentros, Sotiris2
Kiayias, Aggelos3
Michel, Laurent4
Nicolaou, Nicolas5
Russell, Alexander6
See, Andrew7
Shashidhar, Narasimha8
Shvartsman, Alexander A.9
-
11
-
-
85078509877
-
Security analysis of the Diebold AccuVote-TS voting machine
-
Ray Martinez and David Wagner, editors, August
-
Ariel J. Feldman, J. Alex Halderman, and Edward W. Felten. Security analysis of the Diebold AccuVote-TS voting machine. In Ray Martinez and David Wagner, editors, Proceedings of EVT 2007. USENIX/ACCURATE, August 2007. http://itpolicy.princeton.edu/voting/ts-paper.pdf.
-
(2007)
Proceedings of EVT 2007. USENIX/ACCURATE
-
-
Feldman, Ariel J.1
Alex Halderman, J.2
Felten, Edward W.3
-
13
-
-
70349278622
-
Code injection attacks on Harvard-architecture devices
-
Paul Syverson and Somesh Jha, editors, pages ACM Press, October
-
Aurélien Francillon and Claude Castelluccia. Code injection attacks on Harvard-architecture devices. In Paul Syverson and Somesh Jha, editors, Proceedings of CCS 2008, pages 15-26. ACM Press, October 2008.
-
(2008)
Proceedings of CCS 2008
, pp. 15-26
-
-
Francillon, Aurélien1
Castelluccia, Claude2
-
14
-
-
85092084913
-
-
Technical Report TR-816-08, Department of Computer Science, Princeton University, Princeton, New Jersey, March
-
J. Alex Halderman and Ariel J. Feldman. AVC Advantage: Hardware functional specifications. Technical Report TR-816-08, Department of Computer Science, Princeton University, Princeton, New Jersey, March 2008.
-
(2008)
AVC Advantage: Hardware functional specifications
-
-
Alex Halderman, J.1
Feldman, Ariel J.2
-
16
-
-
85029681162
-
Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms
-
Fabian Monrose, editor, USENIX, August To appear
-
Ralf Hund, Thorsten Holz, and Felix Freiling. Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms. In Fabian Monrose, editor, Proceedings of Usenix Security 2009. USENIX, August 2009. To appear.
-
(2009)
Proceedings of Usenix Security 2009
-
-
Hund, Ralf1
Holz, Thorsten2
Freiling, Felix3
-
18
-
-
3543102147
-
Analysis of an electronic voting system
-
David A. Wagner and Michael Waidner, editors, pages IEEE Computer Society, May
-
Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, and Dan S. Wallach. Analysis of an electronic voting system. In David A. Wagner and Michael Waidner, editors, Proceedings of Security and Privacy (“Oakland”) 2004, pages 27-40. IEEE Computer Society, May 2004.
-
(2004)
Proceedings of Security and Privacy (“Oakland”) 2004
, pp. 27-40
-
-
Kohno, Tadayoshi1
Stubblefield, Adam2
Rubin, Aviel D.3
Wallach, Dan S.4
-
20
-
-
33749582253
-
Receipt-free universally-verifiable voting with everlasting privacy
-
Cynthia Dwork, editor, pages Springer-Verlag, September
-
Tal Moran and Moni Naor. Receipt-free universally-verifiable voting with everlasting privacy. In Cynthia Dwork, editor, Proceedings of Crypto 2006, volume 4117 of LNCS, pages 373-92. Springer-Verlag, September 2006.
-
(2006)
Proceedings of Crypto 2006, volume 4117 of LNCS
, pp. 373-392
-
-
Moran, Tal1
Naor, Moni2
-
23
-
-
85092077194
-
-
Sequoia Voting Systems
-
Sequoia Voting Systems. AVC Advantage. http://www.verifiedvotingfoundation.org/downloads/AVCAdvantage.pdf.
-
AVC Advantage
-
-
-
24
-
-
77952351839
-
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
-
Sabrina De Capitani di Vimercati and Paul Syverson, editors, pages ACM Press, October
-
Hovav Shacham. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In Sabrina De Capitani di Vimercati and Paul Syverson, editors, Proceedings of CCS 2007, pages 552-61. ACM Press, October 2007.
-
(2007)
Proceedings of CCS 2007
, pp. 552-561
-
-
Shacham, Hovav1
-
28
-
-
84866706771
-
-
ZiLOG Inc., San Jose, CA, USA
-
ZiLOG Inc., San Jose, CA, USA. Z80 Family CPU User Manual, 2004.
-
(2004)
Z80 Family CPU User Manual
-
-
|