Software penetration testing. Security & Privacy, IEEE, vol.3, issue.1, pp.84-87, 2005. ,
Developing and retaining a security testing mindset. Security & Privacy, IEEE, vol.6, issue.5, pp.82-85, 2008. ,
Software security testing. Security & Privacy, IEEE, vol.2, issue.5, pp.81-85, 2004. ,
Why security testing is hard. Security & Privacy, IEEE, vol.1, issue.4, pp.83-86, 2003. ,
HB 150-20 Information Technology Security Testing: Common Criteria. National Institute of Standards and Technology, 2005. ,
Scantegrity: End-to-End Voter-Verifiable Optical- Scan Voting, IEEE Security & Privacy Magazine, vol.6, issue.3, pp.40-46, 2008. ,
DOI : 10.1109/MSP.2008.70
Helios: web-based open-audit voting, SS'08: Proceedings of the 17th conference on Security symposium, pp.335-348, 2008. ,
Security analysis of the diebold accuvote-ts voting machine, EVT'07: Proceedings of the USENIX Workshop on Accurate Electronic Voting Technology, pp.2-2, 2007. ,
Risks of e-voting, Communications of the ACM, vol.50, issue.11, pp.120-120, 2007. ,
DOI : 10.1145/1297797.1297827
Are your votes really counted?: testing the security of real-world electronic voting systems, ISSTA '08: Proceedings of the 2008 international symposium on Software testing and analysis, pp.237-248, 2008. ,
Report of the california voting system review (USENIX Security Symposium, 2007. ,