593 | -- | 596 | Ronald L. Rivest, David Chaum, Bart Preneel, Aviel D. Rubin, Donald G. Saari, Poorvi L. Vora. Guest editorial: special issue on electronic voting |
597 | -- | 610 | Tigran Antonyan, Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, Laurent Michel, Nicolas C. Nicolaou, Alexander Russell, Alexander A. Shvartsman. State-wide elections, optical scan voting systems, and the pursuit of integrity |
611 | -- | 627 | David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y. A. Ryan, Emily Shen, Alan T. Sherman, Poorvi L. Vora. Scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes |
628 | -- | 637 | Russell A. Fink, Alan T. Sherman, Richard Carback. TPM meets DRE: reducing the trust base for electronic voting using trusted platform modules |
638 | -- | 650 | Ryan W. Gardner, Sujata Garera, Aviel D. Rubin. Detecting code alteration by creating a temporary memory bottleneck |
651 | -- | 661 | Adolfo Villafiorita, Komminist Weldemariam, Roberto Tiella. Development, formal verification, and evaluation of an E-voting system with VVPAT |
662 | -- | 673 | Peter Y. A. Ryan, David Bismark, James Heather, Steve Schneider, Zhe Xia. Prêt à voter: a voter-verifiable voting system |
674 | -- | 684 | Jeroen van de Graaf. Voting with unconditional privacy by merging Prêt à voter and PunchScan |
685 | -- | 698 | Josh Benaloh, Tal Moran, Lee Naish, Kim Ramchen, Vanessa Teague. Shuffle-sum: coercion-resistant verifiable tallying for STV voting |
699 | -- | 707 | Kevin Henry, Douglas R. Stinson, Jiayuan Sui. The effectiveness of receipt-based attacks on ThreeBallot |
708 | -- | 717 | Philip B. Stark. CAST: Canvass audits by sampling and testing |
718 | -- | 728 | Bryan A. Campbell, Michael D. Byrne. Straight-party voting: what do voters think? |
729 | -- | 744 | Guido Schryen, Eliot Rich. Security in large-scale internet elections: a retrospective analysis of elections in Estonia, the Netherlands, and Switzerland |
745 | -- | 750 | Jens-Matthias Bohli, Christian Henrich, Carmen Kempka, Jörn Müller-Quade, Stefan Röhrich. Enhancing electronic voting machines on the example of Bingo voting |
757 | -- | 0 | Ali H. Sayed. Free electronic access to SP publications |
758 | -- | 767 | Tony Thomas, Sabu Emmanuel, A. V. Subramanyam, Mohan S. Kankanhalli. Joint watermarking scheme for multiparty multilevel DRM architecture |
768 | -- | 780 | Jean-François Jourdas, Pierre Moulin. High-rate random-like spherical fingerprinting codes with linear decoding complexity |
781 | -- | 789 | Hung-Min Sun, King-Hang Wang, Wei-Chih Ting. On the security of the secure arithmetic code |
790 | -- | 801 | Chin-Chen Chang, Chia-Chen Lin, T. Hoang Ngan Le, Hoai Bac Le. Self-verifying visual secret sharing using error diffusion and interpolation techniques |
802 | -- | 811 | Carsten Gottschlich, Preda Mihailescu, Axel Munk. Robust orientation field estimation and extrapolation using semilocal line sensors |
812 | -- | 823 | Ryan N. Rakvic, Bradley J. Ulis, Randy P. Broussard, Robert W. Ives, Neil Steiner. Parallelizing iris recognition |
824 | -- | 836 | Samir Shah, Arun Ross. Iris segmentation using geodesic active contours |
837 | -- | 848 | Karen Hollingsworth, Tanya Peters, Kevin W. Bowyer, Patrick J. Flynn. Iris recognition using signal-level fusion of frames from video |
849 | -- | 866 | Norman Poh, Thirimachos Bourlai, Josef Kittler, Lorène Allano, Fernando Alonso-Fernandez, Onkar Ambekar, John P. Baker, Bernadette Dorizzi, Omolara Fatukasi, Julian Féerrez-Aguilar, Harald Ganster, Javier Ortega-Garcia, Donald E. Maurer, Albert Ali Salah, Tobias Scheidat, Claus Vielhauer. Benchmarking quality-dependent and cost-sensitive score-level multimodal biometric fusion algorithms |
867 | -- | 882 | Bo Fu, Simon X. Yang, Jianping Li, Dekun Hu. Multibiometric cryptosystem: model structure and performance analysis |
883 | -- | 898 | Yafei Yang, Yan Sun, Steven Kay, Qing Yang. Securing rating aggregation systems using statistical detectors and trust |
899 | -- | 910 | Hong Cao, Alex C. Kot. Accurate detection of demosaicing regularity for digital image forensics |
911 | -- | 927 | W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu. Behavior forensics with side information for multimedia fingerprinting social networks |
928 | -- | 932 | Guopu Zhu, Jiwu Huang, Sam Kwong, Jianquan Yang. A study on the randomness measure of image hashing |
933 | -- | 945 | Chun-I Fan, Yi-Hui Lin. Provably secure remote truly three-factor authentication scheme with privacy protection on biometrics |
946 | -- | 955 | Nitesh Saxena, Jeong Hyun Yi. Noninteractive self-certification for long-lived mobile ad hoc networks |
956 | -- | 973 | Tanya Ignatenko, Frans M. J. Willems. Biometric systems: privacy and secrecy aspects |
974 | -- | 981 | Luke Miratrix, Philip B. Stark. Election audits using a trinomial bound |
982 | -- | 994 | Minho Jin, Chang D. Yoo. Quantum hashing for multimedia |
995 | -- | 1004 | Dalwon Jang, Chang Dong Yoo, Sunil Lee, Sungwoong Kim, Ton Kalker. Pairwise boosted audio fingerprint |
1005 | -- | 1014 | Philip B. Stark. Risk-limiting postelection audits: conservative P-values from common probability inequalities |