Author of the publication

Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting.

, , , , , , and . ACSAC, page 30-39. IEEE Computer Society, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Complexity of Distributed Cooperation in the Presence of Failures., , and . OPODIS, page 245-264. Suger, Saint-Denis, rue Catulienne, France, (2000)A Binary Integer Programming Model for Optimal Object Distribution., , and . OPODIS, page 211-226. Hermes, (1998)Two Optimization Techniques for Component-Based Systems Deployment., , , and . SEKE, page 153-162. (2001)Cooperative computing with fragmentable and mergeable groups., and . SIROCCO, page 141-156. Carleton Scientific, (2000)Optimal Scheduling for Distributed Cooperation Without Communication., , and . SIROCCO, volume 8 of Proceedings in Informatics, page 259-274. Carleton Scientific, (2001)Highly Scalable Algorithms for Robust String Barcoding., , , and . International Conference on Computational Science (2), volume 3515 of Lecture Notes in Computer Science, page 1020-1028. Springer, (2005)Failure-Sensitive Analysis of Parallel Algorithms with Controlled Memory Access Concurrency., , and . Parallel Process. Lett., 17 (2): 153-168 (2007)Towards Feasible Implementations of Low-Latency Multi-writer Atomic Registers., , , and . NCA, page 75-82. IEEE Computer Society, (2011)Eventually-Serializable Data Services., , , , and . PODC, page 300-309. ACM, (1996)Pre-Election Testing and Post-Election Audit of Optical Scan Voting Terminal Memory Cards., , , , , , , , and . EVT, USENIX Association, (2008)