Publication Orthogonal Security With Cipherbase Arvind Arasu, Spyros Blanas, Ken Eguro, Raghav Kaushik, Donald Kossmann, Ravi Ramamurthy, Ramarathnam Venkatesan 6th Biennial Conference on Innovative Data Systems Research (CIDR’13) | January 2013 6th Biennial Conference on Innovative Data Systems Research (CIDR'13)
Publication Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage Chetan Bansal, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeis 2nd Conference on Principles of Security and Trust (POST 2013) | January 2013
Publication Fully Automated Analysis of Padding-Based Encryption in the Computational Model Gilles Barthe, Juan Manuel Crespo, César Kunz, Benedikt Schmidt, Benjamin Grégoire, Yassine Lakhnech, Santiago Zanella-Béguelin 20th ACM Conference on Computer and Communications Security, CCS 2013 | January 2013
Publication Small World: Collisions Among Attackers in a Finite Population Cormac Herley WEIS | January 2013
Publication On the (In)security of the Fiat-Shamir Paradigm, Revisited Nir Bitansky, Dana Dachman-Soled, Sanjam Garg, Abhishek Jain, Yael Tauman Kalai, Adriana LÓpez-Alt, Daniel Wichs In Proceedings of the 10th Theory of Cryptography Conference (TCC) | January 2013
Publication How to Run Turing Machines on Encrypted Data Shafi Goldwasser, Yael Tauman Kalai, Raluca A. Popa, Vinod Vaikuntanathan, Nickolai Zeldovich In Advances in Cryptology (CRYPTO) | January 2013, pp. 536-553
Publication Counter-Factual Reinforcement Learning: How to Model Decision-Makers That Anticipate the Future Ritchie Lee, David Wolpert, Scott Backhaus, Russell Bent, Brendan Tracey Decision Making and Imperfection, 4 | Published by Springer | 2013, Vol 474 ISBN: 978-3-642-36406-8
Publication Protect Sensitive Sites from Phishing Attacks Using Features Extractable from Inaccessible Phishing URLs Weibo Chu, Bin Benjamin Zhu, Feng Xue, Xiaohong Guan, Zhongmin Cai January 2013