Publication Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions R. Curtmola, J. Garay, Seny Kamara, R. Ostrovsky 13th ACM Conference on Computer and Communications Security (CCS ’06) | May 2006
Publication Detecting Spam Web Pages Through Content Analysis Alexandros Ntoulas, Marc Najork, Mark Manasse, Dennis Fetterly 15th International World Wide Web Conference (WWW) | May 2006
Publication Our Data, Ourselves: Privacy Via Distributed Noise Generation Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, Moni Naor Advances in Cryptology (EUROCRYPT 2006) | May 2006 Project
Publication SubVirt: Implementing malware with virtual machines Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen Wang, Jay Lorch Proceedings of the 2006 IEEE Symposium on Security and Privacy | May 2006
Publication Provably Secure Steganography with Imperfect Sampling Anna Lysyanskaya, Mira Belenkiy Public Key Cryptography | April 2006
Publication Collision-resistant no more: Hash-and-sign paradigm revisited Ilya Mironov Public Key Cryptography (PKC 2006) | April 2006 ISBN: 3-540-33851-9
Publication Stronger Security of Authenticated Key Exchange Brian LaMacchia, Kristin Lauter, Anton Mityagin IACR Cryptology ePrint Archive | March 2006, Vol 2006: pp. 73
Publication Guessing Attacks and the Computational Soundness of Static Equivalence Martin Abadi, Mathieu Baudet, Bogdan Warinschi Foundations of Software Science and Computation Structures (FOSSACS) 2006 | March 2006 ISBN: 3-540-33045-3
Publication Calibrating Noise to Sensitivity in Private Data Analysis Cynthia Dwork, Frank McSherry, Kobbi Nissim, Adam Smith Third Theory of Cryptography Conference (TCC 2006) | March 2006 ISBN: 3-540-32731-2 Project