Publication The Role of Abduction in Declarative Authorization Policies Mo Becker 10th International Symposium on Practical Aspects of Declarative Languages (PADL) | January 2008 10th International Symposium on Practical Aspects of Declarative Languages (PADL)
Publication Analysis on AACS’ Traitor Tracing Against Mix-and-Match Attacks Bin Benjamin Zhu, Min Feng, Fen Liu, Lei Hu IEEE Consumer Communications and Networking Conference | January 2008
Publication The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences Kristin Lauter, Katherine Stange Selected Areas in Cryptography 2008 | January 2008 Project
Publication Ascertaining the Reality of Network Neutrality Violation in Backbone ISPs Ying Zhang, Z. Morley Mao, Ming Zhang HotNets | January 2008 HotNets
Publication Improved Bounds on Security Reductions for Discrete Log Based Signatures Sanjam Garg, Raghav Bhaskar, Satyanarayana V. Lokam, Satya Lokam CRYPTO | January 2008 ISBN: 978-3-540-85173-8
Publication P-signatures and Noninteractive Anonymous Credentials Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya Theory of Cryptography Conference 2008 | January 2008
Publication On compressible pairings and their computation Michael Naehrig, Paulo S. L. M. Barreto, Peter Schwabe Progress in Cryptology – AFRICACRYPT 2008 | January 2008 Progress in Cryptology – AFRICACRYPT 2008 Project
Publication ALADIN: Active Learning for Statistical Intrusion Detection Jack W. Stokes, John C. Platt, Joseph Kravis, Michael Shilman Neural Information Processing Systems Workshop on Machine Learning in Adversarial Environments for Computer Security | December 2007
Publication Off-Line Viral Economic Systems for Digital Media Shan He, Renan G. Cattelan, Kamal Jain, Darko Kirovski MSR-TR-2007-166 | December 2007
Publication An Analysis of Browser Domain-Isolation Bugs and A Light-Weight Transparent Defense Mechanism Shuo Chen, David Ross, Yi-Min Wang Proceedings of the ACM Conference on Computer and Communications Security (CCS) | October 2007 Proceedings of the ACM Conference on Computer and Communications Security (CCS)