Publication
Modular code-based cryptographic verification
Video
Machine Learning and Crowdsourcing
Adam Kalai of Microsoft Research New England—in association with Serge Belongie of the University of California, San Diego; Ce Liu of Microsoft Research New England; George Pierrakos of University of California, Berkeley; Ohad Shamir of…
Video
Retroactive Security
Classic security uses access control, and, essentially, that does not work. Current systems are designed to say “no” and otherwise limit access, while another reason is code bugs. Real-world security currently is retroactive, an example…