Publication Modular verification of security protocol code by typing Karthik Bhargavan, Cédric Fournet, Andy Gordon POPL ’10 Proceedings of the 37th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages | January 2010 ISBN: 978-1-60558-479-9
Publication Detecting spam in a Twitter network Sarita Yardi, Daniel Romero, Grant Schoenebeck, danah boyd First Monday | January 2010, Vol 15 Project
Publication Public-Key Encryption Schemes with Auxiliary Inputs Yevgeniy Dodis, Shafi Goldwasser, Yael Tauman Kalai, Chris Peikert , Vinod Vaikuntanathan Theory of Cryptography Conference: Lecture Notes in Computer Science, 2010 | January 2010
Publication Faster Computation of the Tate Pairing Christophe Arene, Tanja Lange, Michael Naehrig, Christophe Ritzenthaler Journal of Number Theory | January 2010 doi:10.1016/j.jnt.2010.05.013 Project
Publication Modular Reduction without Pre-computation for Special Moduli Tolga Acar, Dan Shumow January 2010 | (in preparation) edition edition (in preparation)
Publication Faster Pairing Computations on Curves with High-Degree Twists Craig Costello, Tanja Lange, Michael Naehrig Public Key Cryptography — PKC 2010 | January 2010 Project
Publication Differentially Private Aggregation of Distributed Time-Series with Transformation and Encryption Vibhor Rastogi, Suman Nath SIGMOD ’10: Proceedings of the 2010 ACM SIGMOD international conference on Management of data | January 2010 Project
Publication SecPAL: Design and Semantics of a Decentralized Authorization Language Moritz Becker, Cédric Fournet, Andy Gordon Journal of Computer Security | January 2010, Vol 18(4): pp. 619-665
Publication Characterizing, Modeling, and Generating Workload Spikes for Stateful Services Peter Bodík, Armando Fox, Michael J. Franklin, Michael I. Jordan, David A. Patterson SOCC ’10: Symposium on Cloud Computing | January 2010
Publication Differential Privacy in New Settings Cynthia Dwork Symposium on Discrete Algorithms (SODA) | January 2010 Symposium on Discrete Algorithms (SODA) Project