Publication On the revocation of U-Prove tokens Christian Paquin MSR-TR-2014-122 | September 2014 Project
Publication Zero-Effort Payments: Design, Deployment, and Lessons Christopher Smowton, Jay Lorch, David Molnar, Stefan Saroiu, Alec Wolman Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp) | September 2014 Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp) Project
Publication Accelerating NTRU Based Homomorphic Encryption Using GPUs Wei Dai, Yarkın Doröz, Berk Sunar 2014 IEEE High Performance Extreme Computing Conference (HPEC) | September 2014
Publication XRay: Increasing the Web’s Transparency with Differential Correlation Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Chaintreau, Roxana Geambasu USENIX Security’14 | August 2014
Publication Towards reliable storage of 56-bit secrets in human memory Joseph Bonneau, Stuart Schechter Proceedings of the 23rd USENIX Security Symposium | August 2014 Proceedings of the 23rd USENIX Security Symposium
Publication Telepathwords: Preventing Weak Passwords by Reading Users’ Minds Saranga Komanduri, Rich Shay, Lorrie Cranor, Cormac Herley, Stuart Schechter Proceedings of the 23rd USENIX Security Symposium | August 2014
Publication Towards reliable storage of 56-bit secrets in human memory (extended version) Joseph Bonneau, Stuart Schechter MSR-TR-2014-95 | August 2014
Publication How to Use Bitcoin to Design Fair Protocols Iddo Bentov, Ranjit Kumaresan Lecture Notes in Computer Science | August 2014
Publication Amortizing Garbled Circuits Yan Huang, Jonathan Katz, Vladimir Kolesnikov, Ranjit Kumaresan, Alex J. Malozemoff Lecture Notes in Computer Science | August 2014