Sciweavers

494 search results - page 3 / 99
» Ballot mark detection
Sort
View
ISSRE
2003
IEEE
13 years 11 months ago
A Framework for Tamper Detection Marking of Mobile Applications
Today’s applications are highly mobile; we download software from the Internet, machine executable code arrives attached to electronic mail, and Java applets increase the functi...
Mike Jochen, Lisa M. Marvel, Lori L. Pollock
WOTE
2010
13 years 4 months ago
Attacking Paper-Based E2E Voting Systems
Abstract. In this paper, we develop methods for constructing votebuying/coercion attacks on end-to-end voting systems, and describe votebuying/coercion attacks on three proposed en...
John Kelsey, Andrew Regenscheid, Tal Moran, David ...
INFOCOM
1995
IEEE
13 years 9 months ago
Document Marking and Identification Using Both Line and Word Shifting
We continue our study of document marking to deter illicit dissemination. A n experiment we performed reveals that the distortion on the photocopy of a document is very different ...
Steven H. Low, Nicholas F. Maxemchuk, Jack Brassil...
KES
2005
Springer
13 years 11 months ago
An Intelligent Approach of Packet Marking at Edge Router for IP Traceback
Abstract. With the help of real source identity in packets, network security system can intelligently protect and counteract the attacks. Packet marking is an important method of s...
Dae Sun Kim, Choong Seon Hong, Yu Xiang
NETWORKING
2004
13 years 7 months ago
An Efficient Probabilistic Packet Marking Scheme for IP Traceback
Abstract. Denial of Service (DoS) attacks represent a major threat to the availability of Internet services. Identifying the sources of these attacks is considered an important ste...
Basheer Al-Duwairi, Anirban Chakrabarti, Govindara...