Publication Applications of SAT Solvers to Cryptanalysis of Hash Functions Ilya Mironov, Lintao Zhang International Conference on Theory and Applications of Satisfiability Testing (SAT 06) | August 2006 International Conference on Theory and Applications of Satisfiability Testing (SAT 06) ISBN: 3-540-37206-7
Publication Online Discriminative Spam Filter Training Joshua Goodman, Scott Wen-tau Yih Proceedings of the 3rd Conference on Email and Anti-Spam | July 2006 Proceedings of the 3rd Conference on Email and Anti-Spam
Publication Concurrent Composition of Secure Protocols in the Timing Model Ronald L Rivest, Adi Shamir, Yael Tauman Kalai Journal of Cryptology | July 2006
Publication Concurrent Composition of Secure Protocols in the Timing Model Yael Tauman Kalai, Yehuda Lindell, Manoj Prabhakaran STOC ’05 Proceedings of the thirty-seventh annual ACM symposium on Theory of computing | July 2006
Publication Milk or Wine: Does Software Security Improve with Age? Andy Ozment, Stuart Schechter Proceedings of the 15th USENIX Security Symposium | July 2006 Proceedings of the 15th USENIX Security Symposium
Publication How to Login from an Internet Cafe Without Worrying about Keyloggers Dinei Florencio, Cormac Herley MSR-TR-2006-12 | July 2006
Publication How to find better index terms through citations Anna Ritchie, Simone Teufel, Stephen Robertson Proceedings of the Workshop `Can Computational Linguistics Improve Information Retrieval?’, at ACL/COLING-2006 | July 2006 Proceedings of the Workshop `Can Computational Linguistics Improve Information Retrieval?', at ACL/COLING-2006
Publication Differential Privacy Cynthia Dwork 33rd International Colloquium on Automata, Languages and Programming, part II (ICALP 2006) | July 2006 33rd International Colloquium on Automata, Languages and Programming, part II (ICALP 2006) ISBN: 3-540-35907-9 Project
Publication Password Rescue: A New Approach to Phishing Prevention Dinei Florencio, Cormac Herley July 2006