Zobrazeno 1 - 10
of 604
pro vyhledávání: '"Halderman, A."'
Since ZMap's debut in 2013, networking and security researchers have used the open-source scanner to write hundreds of research papers that study Internet behavior. In addition, ZMap has been adopted by the security industry to build new classes of e
Externí odkaz:
http://arxiv.org/abs/2406.15585
Autor:
Xue, Diwen, Ramesh, Reethika, Jain, Arham, Kallitsis, Michalis, Halderman, J. Alex, Crandall, Jedidiah R., Ensafi, Roya
Publikováno v:
31st USENIX Security Symposium (USENIX Security 22). 2022
VPN adoption has seen steady growth over the past decade due to increased public awareness of privacy and surveillance threats. In response, certain governments are attempting to restrict VPN access by identifying connections using "dual use" DPI tec
Externí odkaz:
http://arxiv.org/abs/2403.03998
Publikováno v:
FOCI issue 1 (2024) 22-28
As Internet censors rapidly evolve new blocking techniques, circumvention tools must also adapt and roll out new strategies to remain unblocked. But new strategies can be time consuming for circumventors to develop and deploy, and usually an update t
Externí odkaz:
http://arxiv.org/abs/2312.00163
For more than a century, election officials across the United States have inspected voting machines before elections using a procedure called Logic and Accuracy Testing (LAT). This procedure consists of election officials casting a test deck of ballo
Externí odkaz:
http://arxiv.org/abs/2308.02306
Pre-election logic and accuracy (L&A) testing is a process in which election officials validate the behavior of voting equipment by casting a known set of test ballots and confirming the expected results. Ideally, such testing can serve to detect cer
Externí odkaz:
http://arxiv.org/abs/2207.14394
Postal voting is growing rapidly in the U.S., with 43% of voters casting ballots by mail in 2020, yet until recently there has been little research about extending the protections of end-to-end verifiable (E2E-V) election schemes to vote-by-mail cont
Externí odkaz:
http://arxiv.org/abs/2111.08662
Autor:
Schrom, Edward, Kinzig, Ann, Forrest, Stephanie, Graham, Andrea L., Levin, Simon A., Bergstrom, Carl T., Castillo-Chavez, Carlos, Collins, James P., de Boer, Rob J., Doupé, Adam, Ensafi, Roya, Feldman, Stuart, Halderman, Bryan T. Grenfell. Alex, Huijben, Silvie, Maley, Carlo, Mosesr, Melanie, Perelson, Alan S., Perrings, Charles, Plotkin, Joshua, Rexford, Jennifer, Tiwari, Mohit
We explore the commonalities between methods for assuring the security of computer systems (cybersecurity) and the mechanisms that have evolved through natural selection to protect vertebrates against pathogens, and how insights derived from studying
Externí odkaz:
http://arxiv.org/abs/2107.10344
We present a method and software for ballot-polling risk-limiting audits (RLAs) based on Bernoulli sampling: ballots are included in the sample with probability $p$, independently. Bernoulli sampling has several advantages: (1) it does not require a
Externí odkaz:
http://arxiv.org/abs/1812.06361
Publikováno v:
World Journal of Otorhinolaryngology-Head and Neck Surgery, Vol 8, Iss 1, Pp 16-24 (2022)
Abstract The surgical approach to lesions of the ventral craniovertebral junction (CVJ) has evolved significantly in the last several years with the advent of endoscopic skull base surgery. Differing pathologies of the CVJ can result in irreducible c
Externí odkaz:
https://doaj.org/article/23efb3b9c9c64453923dda820c6fb137
Autor:
Bernhard, Matthew, Benaloh, Josh, Halderman, J. Alex, Rivest, Ronald L., Ryan, Peter Y. A., Stark, Philip B., Teague, Vanessa, Vora, Poorvi L., Wallach, Dan S.
Elections seem simple---aren't they just counting? But they have a unique, challenging combination of security and privacy requirements. The stakes are high; the context is adversarial; the electorate needs to be convinced that the results are correc
Externí odkaz:
http://arxiv.org/abs/1707.08619