Sciweavers

IEEESP
2008
45views more  IEEESP 2008»
13 years 5 months ago
Risking Communications Security: Potential Hazards of the Protect America Act
Steven M. Bellovin, Matt Blaze, Whitfield Diffie, ...
IEEESP
2008
41views more  IEEESP 2008»
13 years 5 months ago
Information Assurance Technology Forecast 2008
Steven M. Bellovin, Terry V. Benzel, Bob Blakley, ...
IEEESP
2008
89views more  IEEESP 2008»
13 years 5 months ago
Virtual Machine Introspection: Observation or Interference?
hardware, eliminating an abstraction layer and often improving efficiency as a result. Examples of type 1 systems include VMware ESX,3 Xen (www. xensource.com/xen/xen/nfamily/virtu...
Kara L. Nance, Matt Bishop, Brian Hay
IEEESP
2008
36views more  IEEESP 2008»
13 years 5 months ago
The Dynamics of Counting and Recounting Votes
Alec Yasinsac, Matt Bishop
IEEESP
2008
67views more  IEEESP 2008»
13 years 5 months ago
Cryptographic Test Correction
Abstract. Multiple choice questionnaires (mcqs) are a widely-used assessment procedure where examinees are asked to select one or more choices from a list. This invited talk1 explo...
Éric Levieil, David Naccache