Publication Evaluating a Trial Deployment of Password Re-Use for Phishing Prevention Dinei Florencio, Cormac Herley Proc. Anti-phishing Working Group 2nd Annual eCrime Researchers Summit | October 2007
Publication Run-Time Randomization to Mitigate Tampering Bertrand Anckaert, Mariusz Jakubowski, Ramarathnam Venkatesan, Koen De Bosschere 2nd International Workshop on Security (IWSEC 2007) | October 2007
Publication Randomized Radon transforms for biometric authentication via fingerprint hashing Mariusz Jakubowski, Ramarathnam Venkatesan 7th ACM Workshop on Digital Rights Management | October 2007
Publication Parallel White Noise Generation on a GPU via Cryptographic Hash Stanley Tzeng, Li-Yi Wei MSR-TR-2007-141 | October 2007 I3D 2008
Publication Asirra: A CAPTCHA that Exploits Interest-Aligned Manual Image Categorization Jeremy Elson, John (JD) Douceur, Jon Howell, Jared Saul Proceedings of 14th ACM Conference on Computer and Communications Security (CCS) | October 2007 Proceedings of 14th ACM Conference on Computer and Communications Security (CCS)
Publication Simulatable VRFs with Applications to Multi-Theorem NIZK Melissa Chase, Anna Lysyanskaya Crypto 2007 | August 2007
Publication An Ad Omnia Approach to Defining and Achieving Private Data Analysis Cynthia Dwork Privacy, Security, and Trust in KDD—PinKDD 2007 | August 2007 2009 PET Award for Outstanding Research in Privacy Enhancing Technologies. Project
Publication How Dynamic are IP Addresses Yinglian Xie, Fang Yu, Kannan Achan, Eliot Gillum, Moises Goldszmidt, Ted Wobber Proceedings of the ACM SIGCOMM Conference | August 2007
Publication Asymmetric Gradient Boosting with Application to Spam Filtering Jingrui He, Bo Thiesson Fourth Conference on Email and Anti-Spam | August 2007
Publication A Type Discipline for Authorization Policies Cédric Fournet, Andy Gordon, Sergio Maffeis ACM Transactions on Programming Languages and Systems | August 2007, Vol 29(5)