A whole new look is coming
Check back again soon!
Menu
Toggle menu visibility
About
Conferences
Upcoming
By Name
Calls for Papers
Grants
Sponsorship
Best Papers
Test of Time Awards
Multimedia
Conference FAQ
Conference Policies
Code of Conduct
Publications
Membership
Students
Search
Donate Today
Sign In
Search
About
USENIX Board
Staff
Good Works
Blog
Governance and Financials
USENIX Awards
USENIX Supporters
2024 Board Election
Board Meeting Minutes
Donate
Conferences
Upcoming
By Name
Calls for Papers
Grants
Sponsorship
Best Papers
Test of Time Awards
Multimedia
Conference FAQ
Conference Policies
Code of Conduct
Publications
Proceedings
Author Resources
;login: Online
Writing for ;login: Online
;login: Archive
Membership
Students
Conference Fees
Student Grant Program
Search
Donate Today
Conferences
Multimedia
Conferences
Donate Today
Enter terms
Retain current filters
Search results
Title
Conference
Speaker(s)
Microgadgets: Size Does Matter in Turing-Complete Return-Oriented Programming
WOOT '12
Frankenstein: Stitching Malware from Benign Binaries
WOOT '12
SMT Solvers in Software Security
WOOT '12
Web-based Attacks on Host-Proof Encrypted Storage
WOOT '12
The Future of HTTPS
WOOT '12
iOS and the Rising Cost of Reliable Exploitation
WOOT '12
Everything You Know About Password-Stealing Is Wrong
WOOT '12
Read It Twice! A Mass-Storage-Based TOCTTOU Attack
WOOT '12
Using Prêt à Voter in Victoria State Elections
EVT/WOTE '12
Probing the Front Lines: Pollworker Perceptions of Security & Privacy
EVT/WOTE '12
Cobra: Toward Concurrent Ballot Authorization for Internet Voting
EVT/WOTE '12
Coercion-Resistant Electronic Elections with Write-In Candidates
EVT/WOTE '12
Software Vulnerabilities in the Brazilian Voting Machine
EVT/WOTE '12
Counter to Intent: Voters' Mental Models of Alternative Counting Methods
EVT/WOTE '12
A Hybrid Touch Interface for Prêt à Voter
EVT/WOTE '12
Operator-Assisted Tabulation of Optical Scan Ballots
EVT/WOTE '12
Cryptanalysis of a Universally Verifiable Efficient Re-encryption Mixnet
EVT/WOTE '12
Improving Helios with Everlasting Privacy Towards the Public
EVT/WOTE '12
Automated Analysis of Election Audit Logs
EVT/WOTE '12
A Systematic Process-Model-based Approach for Synthesizing Attacks and Evaluating Them
EVT/WOTE '12
A Bayesian Method for Auditing Elections
EVT/WOTE '12
BRAVO: Ballot-polling Risk-limiting Audits to Verify Outcomes
EVT/WOTE '12
Keynote Address
EVT/WOTE '12
Lightning Debates
EVT/WOTE '12
GANGRENE: Exploring the Mortality of Flash Memory
HotSec '12
Pages
« first
‹ previous
…
327
328
329
330
331
332
333
334
335
…
next ›
last »