Publication Adaptation: Tracking the Ecologies of Music and Peer-to-Peer Networks Kate Crawford Media International Australia/Special Issue | February 2005, Vol 114: pp. 30-39
Publication Secrecy and Group Creation Luca Cardelli, Giorgio Ghelli, Andy Gordon Information and Computation | January 2005, Vol 196(2): pp. 127-155
Publication A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network Xiaoming Wang, Bin Benjamin Zhu, Shipeng Li Int. Conf. on Digital Rights Management: Technology, Issues, Challenges and Systems | January 2005
Publication On the Impossibility of Obfuscation with Auxiliary Input Shafi Goldwasser, Yael Tauman Kalai In Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS’05) | January 2005
Publication Click Fraud Resistant Methods for Learning Click-Through Rates Kamal Jain, Kunal Talwar WINE | January 2005 ISBN: 3-540-30900-4
Publication Security Analysis of KEA Authenticated Key Exchange Protocol Kristin Lauter IACR Cryptology ePrint Archive | January 2005, Vol 2005: pp. 265
Publication Fine Granularity Scalability Encryption of MPEG-4 FGS Bitstreams Bin Benjamin Zhu, Yang Yang, Chang Wen Chen, Shipeng Li IEEE Int. Workshop Multimedia Signal Processing (MMSP) 2005 | January 2005
Publication Smooth Projective Hashing and Two-Message Oblivious Transfer Yael Tauman Kalai In EUROCRYPT 2005, Springer-Verlag (LNCS 3494) | January 2005
Publication Designing Human Friendly Human Interaction Proofs (HIPS) Kumar Chellapilla, Kevin Larson, Patrice Simard, Mary Czerwinski ACM’s CHI 2005 | January 2005