Sciweavers

786 search results - page 67 / 158
» A Software System for Secure Computer Aided Exams
Sort
View
IEEEIAS
2009
IEEE
15 years 6 months ago
Implementation of an Electronic Voting System with Contactless IC Cards for Small-Scale Voting
—There have been several studies on using computer technologies to improve elections and these studies lead to widespread adoption of “direct recording electronic” (DRE) voti...
Chung-Huang Yang, Shih-Yi Tu, Pei-Hua Yen
CASCON
2006
131views Education» more  CASCON 2006»
15 years 1 months ago
STAC: software tuning panels for autonomic control
One aspect of autonomic computing is the ability to identify, separate and automatically tune parameters related to performance, security, robustness and other properties of a sof...
Elizabeth Dancy, James R. Cordy
STORAGESS
2005
ACM
15 years 5 months ago
Toward a threat model for storage systems
The growing number of storage security breaches as well as the need to adhere to government regulations is driving the need for greater storage protection. However, there is the l...
Ragib Hasan, Suvda Myagmar, Adam J. Lee, William Y...
ACSAC
2010
IEEE
14 years 10 months ago
Fast and practical instruction-set randomization for commodity systems
Instruction-set randomization (ISR) is a technique based on randomizing the "language" understood by a system to protect it from code-injection attacks. Such attacks wer...
Georgios Portokalidis, Angelos D. Keromytis
ASPLOS
2006
ACM
15 years 5 months ago
Manitou: a layer-below approach to fighting malware
Unbeknownst to many computer users, their machines are running malware. Others are aware that strange software inhabits their machine, but cannot get rid of it. In this paper, we ...
Lionel Litty, David Lie