Deniable Authentication on the Internet
We revisit the question of deniable cryptographic primitives, where, intuitively, a malicious party observing the interaction, cannot later prove to a third party that the interaction took place. Example include deniable message authentication, key exchange…
Code-Carrying Authorization
Cryptography: From Theory to Practice
You use cryptography every time you make a credit card-based Internet purchase or use an ATM machine. But what is it? How does it work and how do we know when it is secure? This…
Verifying Policy-Based Web Services Security
Automated Test Generation (ATG)
Overview We are conducting research on automating software testing using (static and dynamic) program analysis with the goal of building testing tools that are automatic, scalable and check many properties. Our work combines program analysis,…
Innovation Inquiries: The Birth of a Research Lab
By Rob Knies, Managing Editor, Microsoft Research Since Microsoft Research New England was announced on Feb. 4, Jennifer Chayes, managing director of the lab, based in Cambridge, Mass., has been hard at work along with…