Sciweavers

3901 search results - page 692 / 781
» software 2008
Sort
View
111
Voted
USS
2008
15 years 3 months ago
Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications
We examine the security requirements for creating a Deniable File System (DFS), and the efficacy with which the TrueCrypt disk-encryption software meets those requirements. We fin...
Alexei Czeskis, David J. St. Hilaire, Karl Koscher...
USS
2008
15 years 3 months ago
You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems
In light of the systemic vulnerabilities uncovered by recent reviews of deployed e-voting systems, the surest way to secure the voting process would be to scrap the existing syste...
J. Alex Halderman, Eric Rescorla, Hovav Shacham, D...
106
Voted
USS
2008
15 years 3 months ago
VoteBox: A Tamper-evident, Verifiable Electronic Voting System
Commercial electronic voting systems have experienced many high-profile software, hardware, and usability failures in real elections. While it is tempting to abandon electronic vo...
Daniel Sandler, Kyle Derr, Dan S. Wallach
87
Voted
WSC
2008
15 years 3 months ago
Empowering decision support with simulation technology - Scenario Navigator
The commercial simulation environments that are available today focus primarily on the development of simulation models. They are designed for a single user. They provide animatio...
Edwin Valentin, Renk A. Bijlsma, Vincent de Gast
98
Voted
WSC
2008
15 years 3 months ago
Distributed agent-based simulation of construction projects with HLA
Simulation techniques can provide a resource-driven schedule and answer many hypothetical scenarios before project execution to improve on conventional project management software...
Hosein Taghaddos, Simaan M. AbouRizk, Yasser Moham...