Publication The Role of Abduction in Declarative Authorization Policies Mo Becker 10th International Symposium on Practical Aspects of Declarative Languages (PADL) | January 2008 10th International Symposium on Practical Aspects of Declarative Languages (PADL)
Publication The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences Kristin Lauter, Katherine Stange Selected Areas in Cryptography 2008 | January 2008 Project
Publication P-signatures and Noninteractive Anonymous Credentials Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya Theory of Cryptography Conference 2008 | January 2008
Publication Ascertaining the Reality of Network Neutrality Violation in Backbone ISPs Ying Zhang, Z. Morley Mao, Ming Zhang HotNets | January 2008 HotNets
Publication Analysis on AACS’ Traitor Tracing Against Mix-and-Match Attacks Bin Benjamin Zhu, Min Feng, Fen Liu, Lei Hu IEEE Consumer Communications and Networking Conference | January 2008
Publication Improved Bounds on Security Reductions for Discrete Log Based Signatures Sanjam Garg, Raghav Bhaskar, Satyanarayana V. Lokam, Satya Lokam CRYPTO | January 2008 ISBN: 978-3-540-85173-8
Publication On compressible pairings and their computation Michael Naehrig, Paulo S. L. M. Barreto, Peter Schwabe Progress in Cryptology – AFRICACRYPT 2008 | January 2008 Progress in Cryptology – AFRICACRYPT 2008 Project
Publication ALADIN: Active Learning for Statistical Intrusion Detection Jack W. Stokes, John C. Platt, Joseph Kravis, Michael Shilman Neural Information Processing Systems Workshop on Machine Learning in Adversarial Environments for Computer Security | December 2007
Publication Off-Line Viral Economic Systems for Digital Media Shan He, Renan G. Cattelan, Kamal Jain, Darko Kirovski MSR-TR-2007-166 | December 2007
Publication An Analysis of Browser Domain-Isolation Bugs and A Light-Weight Transparent Defense Mechanism Shuo Chen, David Ross, Yi-Min Wang Proceedings of the ACM Conference on Computer and Communications Security (CCS) | October 2007 Proceedings of the ACM Conference on Computer and Communications Security (CCS)