David A. Wagner

Results: 48



#Item
11Election fraud / Voting / Electronic voting / Information society / Ballot / Voting machine / Electoral fraud / Visual cryptography / Approval voting / Politics / Cryptography / Elections

Cryptographic Voting Protocols: A Systems Perspective Chris Karlof Naveen Sastry David Wagner {ckarlof, nks, daw}@cs.berkeley.edu University of California, Berkeley

Add to Reading List

Source URL: naveen.ksastry.com

Language: English - Date: 2013-06-08 15:25:46
12Elections / Electoral systems / Election technology / Voter-verified paper audit trail / Electoral fraud / Voting system / Vote counting system / Cryptography / Election recount / Politics / Election fraud / Electronic voting

The Promise of Cryptographic Voting Protocols Chris Karlof Naveen Sastry David Wagner {ckarlof, nks, daw}@cs.berkeley.edu June 6, 2005 Electronic voting has a credibility gap: many experts have sharply criticized current

Add to Reading List

Source URL: naveen.ksastry.com

Language: English - Date: 2013-06-08 15:25:46
13

David J. Wagner, l.l.c. | Traveling Exhibitions Environmental Impact Historic and Interdisciplinary Context Dr. Michael Tobias and Jane Gray Morrison of the Dancing Star Foundation will be providing a major essay for th

Add to Reading List

Source URL: davidjwagnerllc.com

Language: English - Date: 2012-06-11 12:42:00
    14

    ENVIRONMENTAL IMPACT Traveling Exhibition Produced by David J. Wagner, L.L.C. ENVIRONMENTAL IMPACT is a traveling museum exhibition produced by David J. Wagner, L.L.C., the purpose of which is 1.) to recognize, document,

    Add to Reading List

    Source URL: davidjwagnerllc.com

    Language: English - Date: 2015-04-08 16:55:39
      15

      A Security Analysis of the Combex DarpaBrowser Architecture David Wagner Dean Tribble March 4, 2002 1 Introduction We describe the results of a limited-time evaluation of the security of the Combex DarpaBrowser, built on

      Add to Reading List

      Source URL: combex.com

      - Date: 2005-08-18 16:59:11
        16

        A Security Analysis of the Combex DarpaBrowser Architecture David Wagner Dean Tribble March 4, 2002

        Add to Reading List

        Source URL: combex.com

        - Date: 2005-08-18 16:59:23
          17

          Symbolic Software Model Validation Cynthia Sturton,1 Rohit Sinha,2 Thurston H.Y. Dang,2 Sakshi Jain,2 Michael McCoyd,2 Wei Yang Tan,2 Petros Maniatis,3 Sanjit A. Seshia,2 and David Wagner 2 1 University of North Carolin

          Add to Reading List

          Source URL: www.cs.berkeley.edu

          Language: English - Date: 2015-01-21 19:48:40
            18

            The Promise of Cryptographic Voting Protocols Chris Karlof Naveen Sastry David Wagner {ckarlof, nks, daw}@cs.berkeley.edu June 6, 2005 Electronic voting has a credibility gap: many experts have sharply criticized current

            Add to Reading List

            Source URL: www.chriskarlof.com

            Language: English - Date: 2012-01-02 15:39:31
              19Spamming / Computer crimes / Social engineering / Password / Phishing / HTTP cookie / Cross-site scripting / Email / Malware / Security / Computing / Computer security

              Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication Chris Karlof J.D. Tygar David Wagner {ckarlof, tygar, daw}@cs.berkeley.edu

              Add to Reading List

              Source URL: www.chriskarlof.com

              Language: English - Date: 2012-01-02 15:39:31
              20Cross-platform software / Java / CapDesk / Capability-based security / Sandbox / Computer security / Kernel / Computing / Software / System software

              A Security Analysis of the Combex DarpaBrowser Architecture David Wagner Dean Tribble March 4, 2002 1 Introduction We describe the results of a limited-time evaluation of the security of the Combex DarpaBrowser, built on

              Add to Reading List

              Source URL: combex.com

              Language: English - Date: 2005-08-18 16:59:47
              UPDATE