Publication
Secure Web Services for Low-cost Devices
Publication
Moderately Hard, Memory-bound Functions
Publication
Stopping Spam
Publication
A Type Discipline for Authorization Policies
Publication
Some Things Algorithms Cannot Do
Video
802.11i Security Analysis: Can we build a secure WLAN?
Security has become a serious concern in wireless local area networks. In order to eliminate the vulnerabilities in previous security mechanisms, IEEE Task Group i has designed 802.11i to provide enhanced MAC security in a…
Video
Clustering Algorithms for Perceptual Image Hashing
A perceptual image hash function maps an image to a short binary string based on an image’s appearance to the human eye. Perceptual hashing is useful in image databases, watermarking, and content authentication in adversarial…
Publication