Publication Fully Automated Analysis of Padding-Based Encryption in the Computational Model Gilles Barthe, Juan Manuel Crespo, César Kunz, Benedikt Schmidt, Benjamin Grégoire, Yassine Lakhnech, Santiago Zanella-Béguelin 20th ACM Conference on Computer and Communications Security, CCS 2013 | January 2013
Publication Small World: Collisions Among Attackers in a Finite Population Cormac Herley WEIS | January 2013
Publication On the (In)security of the Fiat-Shamir Paradigm, Revisited Nir Bitansky, Dana Dachman-Soled, Sanjam Garg, Abhishek Jain, Yael Tauman Kalai, Adriana LÓpez-Alt, Daniel Wichs In Proceedings of the 10th Theory of Cryptography Conference (TCC) | January 2013
Publication How to Run Turing Machines on Encrypted Data Shafi Goldwasser, Yael Tauman Kalai, Raluca A. Popa, Vinod Vaikuntanathan, Nickolai Zeldovich In Advances in Cryptology (CRYPTO) | January 2013, pp. 536-553
Publication Counter-Factual Reinforcement Learning: How to Model Decision-Makers That Anticipate the Future Ritchie Lee, David Wolpert, Scott Backhaus, Russell Bent, Brendan Tracey Decision Making and Imperfection, 4 | Published by Springer | 2013, Vol 474 ISBN: 978-3-642-36406-8
Publication Protect Sensitive Sites from Phishing Attacks Using Features Extractable from Inaccessible Phishing URLs Weibo Chu, Bin Benjamin Zhu, Feng Xue, Xiaohong Guan, Zhongmin Cai January 2013
Publication Does My Password Go up to Eleven? The Impact of Password Meters on Password Selection Serge Egelman, Andreas Sotirakopoulos, Ildar Muslukhov, Konstantin Beznosov, Cormac Herley Proc. CHI | January 2013
Publication Contagion and Observability In Security Domains Yoram Bachrach, Moez Draief, Sanjeev Goyal Allerton | January 2013
Publication Migration to the Cloud Made Safe and Secure Ken Eguro, Kaushik Rajan, Ravi Ramamurthy, Kapil Vaswani, Ramarathnam Venkatesan Off the Beaten Track (OBT) Workshop | January 2013