| |
| Hal Abelson
| Information Accountability
|
| |
| David Ackley
| Randomized Instruction Set Emulation
|
| |
| David Ackley
| Computation in the Wild
|
| |
| Elena S. Ackley
| On-line Negative Databases
|
| |
| Elena S. Ackley
| Protecting Data Privacy through Hard-to-Reverse Negative
Databases
|
| |
| Elena Ackley
| Protecting Data Privacy through Hard-to-Reverse Negative Databases
|
| |
| Elena S. Ackley
| Protecting Data Privacy through Hard-to-Reverse Negative
Databases
|
| |
| Rakesh Agarwala
| Reduced Incidence of Hip Fracture in the Old Order Amish
|
| Rakesh Agarwala
| Anabaptist Genealogy Database
|
| |
| Gagan Aggarwal
| Approximation Algorithms for k-Anonymity
|
| Gagan Aggarwal
| Two Can Keep a Secret: A Distributed Architecture for Secure Database
|
| Gagan Aggarwal
| Anonymizing Tables
|
| Gagan Aggarwal
| k-Anonymity: Algorithms and Hardness
|
| |
| Gagan Aggarwal
| Privacy Protection and Advertising in a Networked World.
|
| |
| Gagan Aggarwal
| Achieving Anonymity via Clustering
|
| |
| Gagan Aggarwal
| Algorithms for the Database Layout Problem
|
| Gagan Aggarwal
| On the Streaming Model Augmented with a Sorting Primitive
|
| Gagan Aggarwal
| Enabling Privacy for the Paranoids
|
| Gagan Aggarwal
| Secure computation of the k'th-ranked element
|
| |
| G. Aggrawal
| An analysis of private browsing modes in modern browsers
|
| |
| Rakesh Agrawal
| Privacy Preserving Indexing of Documents on the Network
|
| |
| Rakesh Agrawal
| Privacy Preserving OLAP
|
| |
| Noga Alon
| Tight Bounds for Shared Memory Systems Accessed by Byzantine Processes
|
| |
| Dana Angluin
| Stabilizing Consensus in Mobile Networks
|
| Dana Angluin
| Stably computable properties of network graphs
|
| |
| Dana Angluin
| Self-stabilizing behavior in networks of nondeterministically
interacting sensors
|
| |
| A Arasu
| Approximate Counts and Quantiles over Sliding Windows
|
| |
| David Arthur
| Analyzing the Efficiency of BitTorrent and Related
Peer-to-Peer Networks
|
| |
| James Aspnes
| Stably computable properties of network graphs
|
| |
| James Aspnes
| Towards a Theory of Data Entanglement
|
| James Aspnes
| Self-stabilizing behavior in networks of nondeterministically
interacting sensors
|
| James Aspnes
| Inoculation strategies for victims of viruses and the sum-of-squares partition problem
|
| |
| David Athur
| On the Worst Case Complexity of the k-means Method
|
| |
| Brian Babcock
| Load Shedding Techniques for Aggregation Queries in Stream Systems
|
| Brian Babcock
| Operator scheduling in data stream systems
|
| |
| Shivnath Babu
| The Pipelined Set Cover Problem
|
| Shivnath Babu
| Adaptive Caching for Continuous Queries
|
| |
| Shivnath Babu
| Adaptive Ordering of Pipelined Stream Filters
|
| Shivnath Babu
| Operator scheduling in data stream systems
|
| |
| Michael Backes
| Compositional Analysis of Contract Signing Protocols
|
| |
| Justin Balthrop
| Computation in the Wild
|
| Justin Balthrop
| Technological Networks and the Spread of Computer Viruses
|
| |
| S. Barocas
| Privacy preserving targeted advertising
|
| |
| G. Barrantes
| Randomized Instruction Set Emulation
|
| |
| G. Barrantes
| Increasing Communications Security through Protocol Parameter Diversity
|
| |
| Paulo S.L.M. Barreto
| Efficient Implementation of Pairing-Based Cryptosystems
|
| Paulo S.L.M. Barreto
| On the Selection of Pairing-Friendly Groups
|
| |
| Paulo S.L.M. BarretoM
| Constructing Elliptic Curves with Prescribed Embedding Degrees
|
| |
| Adam Barth
| Privacy and Contextual Integrity: Framework and
Applications
|
| Adam Barth
| Managing Digital Rights using Linear Logic
|
| |
| Adam Barth
| Enterprise Privacy Promises and Enforcement
|
| Adam Barth
| Correcting Privacy Violations in Blind-Carbon-Copy (BCC)
Encrypted Email
|
| Adam Barth
| Conflict and Combination in Privacy Policy Languages
|
| |
| Adam Barth
| Private encrypted content distribution using private broadcast
encryption
|
| |
| Mayank Bawa
| Enabling Privacy for the Paranoids
|
| Mayank Bawa
| The Price of Validity in Dynamic Networks
|
| Mayank Bawa
| Privacy Preserving Indexing of Documents on the Network
|
| |
| Mayank Bawa
| Query Processing With Guarantees in Query-Centric
Networks
|
| |
| Mayank Bawa
| Two Can Keep a Secret: A Distributed Architecture for Secure Database
|
| |
| M. Bayati
| Achieving Stability in Networks of Input-Queued Switches
using a Local Online Scheduling Algorithm
|
| |
| Omar Benjelloun
| Swoosh: A Generic Approach to Entity Resolution
|
| Omar Benjelloun
| Generic Entity Resolution with Data Confidences
|
| |
| Omar Benjelloun
| D-Swoosh: A Family of Algorithms for Generic, Distributed Entity
Resolution
|
| Omar Benjelloun
| Generic Entity Resolution with Data Confidences
|
| |
| Dirk Bergemann
| Flexibility as an Instrument in DRM Systems
|
| |
| Dirk Bergemann
| Towards an Economic Analysis of Trusted Systems (Position Paper)
|
| |
| Tim Berners-Lee
| Information Accountability
|
| |
| LG Biesecker
| Anabaptist Genealogy Database
|
| |
| Philip Bohannon
| Detection and Recovery Techniques for Database Corruption
|
| |
| H. Bojinov
| Kamouflage: loss-resistant password management
|
| H. Bojinov
| XCS: cross channel scripting and its impact on web applications
|
| |
| Rebecca Bolin
| Policy Responses to Spam
|
| |
| D. Boneh
| Framing attacks on smart phones and dumb routers: tap-jacking and geo-localization attacks
|
| D. Boneh
| An analysis of private browsing modes in modern browsers
|
| |
| D. Boneh
| Privacy preserving targeted advertising
|
| D. Boneh
| Kamouflage: loss-resistant password management
|
| D. Boneh
| Busting frame busting: a study of clickjacking vulnerabilities at popular sites
|
| D. Boneh
| XCS: cross channel scripting and its impact on web applications
|
| D. Boneh
| Traitor Tracing with Constant Size Ciphertext
|
| D. Boneh
| On The Impossibility of Basing Identity Based Encryption on Trapdoor Permutations
|
| D. Boneh
| Conjunctive, subset, and range queries on encrypted data
|
| D. Boneh
| Exposing private information by timing web applications
|
| D. Boneh
| Reducing Shoulder-surfing by Using Gaze-based Password Entry
|
| D. Boneh
| Transaction Generators: Root Kits for the Web
|
| D. Boneh
| Space-Efficient Identity Based Encryption Without Pairings
|
| |
| Dan Boneh
| Short Signatures from the Weil Pairing
|
| Dan Boneh
| Aggregate and Verifiably Encrytped Signatures from Bilinear
Maps
|
| |
| Dan Boneh
| Private encrypted content distribution using private broadcast
encryption
|
| Dan Boneh
| Hierarchical Identity Based Encryption with Constant Size
Ciphertext
|
| Dan Boneh
| Stronger Password Authentication Using
Browser Extensions
|
| Dan Boneh
| Applications of Multilinear Forms to Cryptography
|
| |
| Dan Boneh
| Private Web Search
|
| |
| Dan Boneh
| Protecting Browser State from Web Privacy Attacks
|
| Dan Boneh
| Correcting Privacy Violations in Blind-Carbon-Copy (BCC)
Encrypted Email
|
| Dan Boneh
| Short Group Signatures
|
| Dan Boneh
| Searchable Public Key Encryption
|
| Dan Boneh
| PORTIA: Privacy, Obligations, and Rights in Technologies of Information Assessment
|
| Dan Boneh
| A Survey of Two Signature Aggregation Techniques
|
| Dan Boneh
| Oblivious Signature-Based Envelope
|
| |
| Dan Boneh
| A Browser Plug-in Solution to the Unique Password Problem
|
| Dan Boneh
| Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
|
| Dan Boneh
| Evaluating 2-DNF Formulas on Ciphertexts
|
| Dan Boneh
| Group Signatures with Verifier-Local Revocation
|
| |
| Dan Boneh
| On the Effectiveness of Address-Space Randomization
|
| |
| A. Bortz
| Exposing private information by timing web applications
|
| |
| Andrew Bortz
| Protecting Browser State from Web Privacy Attacks
|
| |
| X. Boyen
| Kamouflage: loss-resistant password management
|
| |
| Xavier Boyen
| Hierarchical Identity Based Encryption with Constant Size
Ciphertext
|
| |
| Xavier Boyen
| Direct Chosen Ciphertext Security from Identity-Based Techniques
|
| Xavier Boyen
| Short Group Signatures
|
| |
| James Brown
| Scaling Theory for Information Networks
|
| |
| Dave Buchfuhrer
| Inapproximability for VCG-Based Combinatorial Auctions
|
| |
| David Buchfuhrer
| Computation and incentives in combinatorial public projects
|
| |
| John Burge
| Learning DFA representations of HTTP for protecting web
applications
|
| |
| Mike Burmester
| Accountable Privacy
|
| |
| E. Bursztein
| Kamouflage: loss-resistant password management
|
| E. Bursztein
| Busting frame busting: a study of clickjacking vulnerabilities at popular sites
|
| E. Bursztein
| XCS: cross channel scripting and its impact on web applications
|
| |
| E. Bursztein
| Framing attacks on smart phones and dumb routers: tap-jacking and geo-localization attacks
|
| E. Bursztein
| An analysis of private browsing modes in modern browsers
|
| |
| Ran Canetti
| Extractable Perfectly One-way Functions
|
| |
| Ran Canetti
| Obfuscating Point Functions with Multibit Output
|
| |
| Ran Canetti
| Towards a Theory of Extractable Functions
|
| |
| Melody Chan
| Stably computable properties of network graphs
|
| |
| Kevin Chang
| Inoculation strategies for victims of viruses and the sum-of-squares partition problem
|
| |
| Kevin Chang
|
Pass-Efficient Algorithms for Clustering
|
| |
| Kevin Chang
| Pass-Efficient Algorithms for Facility Location
|
| Kevin Chang
| The Space Complexity of Pass-Efficient Algorithms for Clustering
|
| |
| S. Chaudhuri
| Robust identification of fuzzy duplicates
|
| |
| Shuchi Chawla
| Toward Privacy in Public Databases
|
| |
| David Cheng
| A Divide-and-Merge Methodology for Clustering
|
| |
| Neil Chou
| Client-side defense against web-based identity theft
|
| |
| John Corwin
| Dynamic Tables: An Architecture for Managing Evolving, Heterogeneous Biomedical Data in Relational Database Management Systems
|
| |
| Giovanni Di Crescenzo
| Searchable Public Key Encryption
|
| |
| Judy Cushing
|
Information technology challenges of biodiversity and ecosystems informatics
|
| |
| Ronny Ramzi Dakdouk
| Theory and Application of Extractable Functions
|
| |
| Ronny Ramzi Dakdouk
| Extractable Perfectly One-way Functions
|
| |
| Ronny Ramzi Dakdouk
| Obfuscating Point Functions with Multibit Output
|
| |
| Ronny Ramzi Dakdouk
| Towards a Theory of Extractable Functions
|
| |
| Anirban Dasgupta
| Spectral Clustering by Recursive Partitioning
|
| |
| Anirban Dasgupta
| Spectral Clustering with Limited Independence
|
| |
| Mayur Datar
| On the Streaming Model Augmented with a Sorting Primitive
|
| Mayur Datar
| Load Shedding Techniques for Aggregation Queries in Stream Systems
|
| Mayur Datar
| Operator scheduling in data stream systems
|
| |
| Anupam Datta
| Security Analysis of Network Protocols: Compositional Reasoning and
Complexity-theoretic Foundations
|
| |
| Anupam Datta
| Privacy and Contextual Integrity: Framework and
Applications
|
| |
| Anupam Datta
| Probabilistic polynomial-time semantics for a protocol security
logic
|
| Anupam Datta
| The Impossibility of Realizable Ideal Functionality
|
| Anupam Datta
| Compositional Analysis of Contract Signing Protocols
|
| Anupam Datta
| A Modular Correctness Proof of IEEE 802.11i and TLS
|
| Anupam Datta
| A derivation system and compositional logic for security
protocols
|
| Anupam Datta
| Sequential Probabilistic Process Calculus and Simulation-Based
Security
|
| Anupam Datta
| Unifying Equivalence-Based Definitions of Protocol Security
|
| Anupam Datta
| Abstraction and Refinement in Protocol Derivation
|
| Anupam Datta
| Secure Protocol Composition
|
| Anupam Datta
| On the Relationships Between Notions of Simulation-Based Security
|
| Anupam Datta
| Formal Derivation of Security Protocols
|
| |
| Al Davis
| Scaling Theory for Information Networks
|
| |
| Ante Derek
| A Modular Correctness Proof of IEEE 802.11i and TLS
|
| Ante Derek
| Formal Derivation of Security Protocols
|
| |
| Ante Derek
| Formal Analysis of Security Protocols: Protocol Composition Logic
|
| |
| Ante Derek
| Probabilistic polynomial-time semantics for a protocol security
logic
|
| Ante Derek
| The Impossibility of Realizable Ideal Functionality
|
| Ante Derek
| Compositional Analysis of Contract Signing Protocols
|
| Ante Derek
| A derivation system and compositional logic for security
protocols
|
| Ante Derek
| Abstraction and Refinement in Protocol Derivation
|
| Ante Derek
| Secure Protocol Composition
|
| |
| Yvo Desmedt
| Accountable Privacy
|
| |
| Petros Drineas
| A Randomized Algorithm for a Tensor-Based Generalization of the
Singular Value Decomposition
|
| Petros Drineas
| Fast Monte Carlo Algorithms for Matrices I: Approximating Matrix Multiplication
|
| Petros Drineas
| Fast Monte Carlo Algorithms for Matrices II: Computing Low-Rank Approximations to a Matrix
|
| Petros Drineas
| Fast Monte Carlo Algorithms for Matrices III: Computing an Efficient Approximate Decomposition of a Matrix
|
| |
| Petros Drineas
| On the Nystrom Method for Approximating a Gram Matrix for Improved
Kernel-Based Learning
|
| |
| Petros Drineas
| Sampling Sub-problems of Heterogeneous Max-Cut Problems and Approximation
Algorithms
|
| |
| Wenliang Du
| Oblivious Signature-Based Envelope
|
| |
| Shaddin Dughmi
| Inapproximability for VCG-Based Combinatorial Auctions
|
| |
| Cynthia Dwork
| Our Data, Ourselves: Privacy via Distributed Noise
Generation
|
| |
| Cynthia Dwork
| Privacy-preserving Datamining on Vertically Partitioned Databases
|
| Cynthia Dwork
| Toward Privacy in Public Databases
|
| |
| Nadav Eiron
| Ranking the Web Frontier
|
| |
| Thomas Eisenbach
| Flexibility as an Instrument in DRM Systems
|
| |
| Michael Elkin
| Efficient Algorithms for Constructing (1+\epsilon,\beta)-Spanners in the Distributed and Streaming Models
|
| |
| M. Enachescu
| Scale Free Aggregation in Sensor Networks
|
| |
| Fernando Esponda
| Enhancing Privacy through Negative Representations of Data
|
| Fernando Esponda
| On-line Negative Databases
|
| Fernando Esponda
| A formal framework for positive and negative detection
|
| |
| Fernando Esponda
| Protecting Data Privacy through Hard-to-Reverse Negative
Databases
|
| |
| Fernando Esponda
| Protecting Data Privacy through Hard-to-Reverse Negative Databases
|
| |
| Fernando Esponda
| Negative Representations of Information
|
| |
| Fernando Esponda
| Protecting Data Privacy through Hard-to-Reverse Negative
Databases
|
| Fernando Esponda
| Anonymous Data Collection in Sensor Networks
|
| |
| Alex Fabraikant
| On the Structure of Weakly-Acyclic Games
|
| |
| Christos Faloutsos
| Connection Subgraphs in Social Networks
|
| |
| Tomas Feder
| Algorithms for the Database Layout Problem
|
| |
| Tomas Feder
| Achieving Anonymity via Clustering
|
| Tomas Feder
| Approximation Algorithms for k-Anonymity
|
| Tomas Feder
| Anonymizing Tables
|
| Tomas Feder
| k-Anonymity: Algorithms and Hardness
|
| |
| Joan Feigenbaum
| Approximate privacy: foundations and quantification
|
| Joan Feigenbaum
| Usability of Browser-Based Tools for Web-Search Privacy
|
| |
| Joan Feigenbaum
| Implementing Privacy-Preserving Bayesian-Net
Discovery for Vertically Partitioned Data
|
| |
| Joan Feigenbaum
| A Model of Onion Routing with Provable Anonymity
|
| Joan Feigenbaum
| Private Web Search
|
| Joan Feigenbaum
| Probabilistic Analysis of Onion Routing
in a Black-box Model
|
| Joan Feigenbaum
| Finding Highly Correlated Pairs Efficiently with Powerful
Pruning
|
| |
| Joan Feigenbaum
| Secure Multiparty Computation of Approximations
|
| |
| Joan Feigenbaum
| Flexibility as an Instrument in DRM Systems
|
| Joan Feigenbaum
| Privacy Engineering in Digital Rights Management Systems
|
| |
| Joan Feigenbaum
| Towards a Theory of Data Entanglement
|
| Joan Feigenbaum
| Some Requirements for Adoption of Privacy-Preserving Data Mining
|
| Joan Feigenbaum
| Computing Diameter in the Streaming and Sliding-Window Models
|
| Joan Feigenbaum
| Graph Distances in the Streaming Model: The Value of Space
|
| Joan Feigenbaum
| Untitled white paper on "Malevolence in the
Cyberinfrastructure"
|
| Joan Feigenbaum
| Towards an Economic Analysis of Trusted Systems (Position Paper)
|
| Joan Feigenbaum
| On Graph Problems in a Semi-Streaming Model
|
| Joan Feigenbaum
| Secure Computation of Surveys
|
| Joan Feigenbaum
| PORTIA: Privacy, Obligations, and Rights in Technologies of Information Assessment
|
| |
| Joan
Feigenbaum | Learning-Based Anomaly Detection in BGP Updates
|
| |
| Joan Feigenbaum
| Preventing Active Timing Attacks in Low-Latency Anonymous Communication
|
| Joan Feigenbaum
| Approximate Privacy: Foundations and Quantification (Extended Abstract)
|
| Joan Feigenbaum
| Approximate Privacy: PARs for Set Problems
|
| Joan Feigenbaum
| Approximate Privacy: Foundations and Quantification
|
| Joan Feigenbaum
| Computational Challenges in E-commerce
|
| Joan Feigenbaum
| Information Accountability
|
| |
| Joan Feigenbaum
| Towards Better Support for Copyright Compliance and for Privacy
|
| |
| Michael J. Fischer
| Stabilizing Consensus in Mobile Networks
|
| |
| Michael J. Fischer
| Self-stabilizing Leader Election in Networks of Finite-state
Anonymous Agents
|
| |
| Michael J. Fischer
| Stably computable properties of network graphs
|
| Michael J. Fischer
| Typed Computational Email for Serverless Distributed Applications
|
| |
| Michael J. Fischer
| Self-stabilizing behavior in networks of nondeterministically
interacting sensors
|
| |
| Robert Fischer
| Typed Computational Email for Serverless Distributed Applications
|
| |
| Staphanie Forrest
| Radial Structure of the Internet
|
| |
| Stephanie Forrest
| Protecting Data Privacy through Hard-to-Reverse Negative
Databases
|
| Stephanie Forrest
| Anonymous Data Collection in Sensor Networks
|
| Stephanie Forrest
| Increasing Communications Security through Protocol Parameter Diversity
|
| Stephanie Forrest
| Pretty Good BGP: Improving BGP by cautiously adopting
routes
|
| Stephanie Forrest
| Learning DFA representations of HTTP for protecting web
applications
|
| |
| Stephanie Forrest
| Protecting Data Privacy through Hard-to-Reverse Negative Databases
|
| Stephanie Forrest
| Autonomous Security for Autonomous Systems
|
| Stephanie Forrest
| An Integrated Model of Traffic, Geography and Economy in the Internet
|
| Stephanie Forrest
| Scaling Theory for Information Networks
|
| |
| Stephanie Forrest
| Randomized Instruction Set Emulation
|
| Stephanie Forrest
| Computation in the Wild
|
| Stephanie Forrest
| Enhancing Privacy through Negative Representations of Data
|
| Stephanie Forrest
| On-line Negative Databases
|
| Stephanie Forrest
| Technological Networks and the Spread of Computer Viruses
|
| Stephanie Forrest
| A formal framework for positive and negative detection
|
| Stephanie Forrest
| Java object lifetimes are predictable
|
| |
| Stephanie Forrest
| Protecting Data Privacy through Hard-to-Reverse Negative
Databases
|
| |
| Mike Frame
|
Information technology challenges of biodiversity and ecosystems informatics
|
| |
| Michael Freedman
| Efficient Private Matching and Set Intersection
|
| |
| Michael Freedman
| Privacy Engineering in Digital Rights Management Systems
|
| |
| Alan Frieze
| A new approach to the planted clique problem
|
| |
| Anne Frondorf
|
Information technology challenges of biodiversity and ecosystems informatics
|
| |
| Hu Fu
| Inapproximability for VCG-Based Combinatorial Auctions
|
| |
| Prasanna Ganesan
| Two Can Keep a Secret: A Distributed Architecture for Secure Database
|
| |
| Prasanna Ganesan
| SPROUT: P2P Routing with Social Networks
|
| Prasanna Ganesan
| SPROUT: P2P Routing with Social Networks (extended version)
|
| Prasanna Ganesan
| Enabling Privacy for the Paranoids
|
| Prasanna Ganesan
| Optimal Routing in Chord
|
| Prasanna Ganesan
| DHT Routing Using Social Links
|
| |
| V. Ganti
| Robust identification of fuzzy duplicates
|
| |
| Hector Garcia-Molina
| Limited Reputation Sharing in P2P Systems
|
| Hector Garcia-Molina
| SPROUT: P2P Routing with Social Networks
|
| Hector Garcia-Molina
| SPROUT: P2P Routing with Social Networks (extended version)
|
| Hector Garcia-Molina
| Enabling Privacy for the Paranoids
|
| Hector Garcia-Molina
| The Price of Validity in Dynamic Networks
|
| Hector Garcia-Molina
| DHT Routing Using Social Links
|
| |
| Hector Garcia-Molina
| Security Configuration Management
|
| |
| Hector Garcia-Molina
| Swoosh: A Generic Approach to Entity Resolution
|
| Hector Garcia-Molina
| Generic Entity Resolution with Data Confidences
|
| |
| Hector Garcia-Molina
| D-Swoosh: A Family of Algorithms for Generic, Distributed Entity
Resolution
|
| Hector Garcia-Molina
| Generic Entity Resolution with Data Confidences
|
| Hector Garcia-Molina
| Two Can Keep a Secret: A Distributed Architecture for Secure Database
|
| |
| Tal Garfinkel
| Reducing Shoulder-surfing by Using Gaze-based Password Entry
|
| |
| C. Gentry
| Space-Efficient Identity Based Encryption Without Pairings
|
| |
| Craig Gentry
| Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
|
| |
| Craig Gentry
| Aggregate and Verifiably Encrytped Signatures from Bilinear
Maps
|
| |
| Craig Gentry
| A Survey of Two Signature Aggregation Techniques
|
| |
| Aristides Gionis
| The Price of Validity in Dynamic Networks
|
| |
| Matthew Glickman
| Computation in the Wild
|
| |
| Brighten Godfrey
| Incentive compatibility and dynamics of congestion control
|
| |
| Michael Godwin
| Digital Rights Management: A Guide for Librarians
|
| |
| Mike Godwin
| A Modest Proposal: Libel Law Reform in the Internet Era
|
| |
| A. Goel
| Scale Free Aggregation in Sensor Networks
|
| |
| Eu-Jin Goh
| Hierarchical Identity Based Encryption with Constant Size
Ciphertext
|
| |
| Eu-Jin Goh
| On the Effectiveness of Address-Space Randomization
|
| Eu-Jin Goh
| Building Secure Indexes for Searching Efficiently on Encrypted Compressed data
|
| |
| Eu-Jin Goh
| Encryption Schemes from Bilinear Maps
|
| |
| Eu-Jin Goh
| Evaluating 2-DNF Formulas on Ciphertexts
|
| |
| Sharon Goldberg
| How secure are secure interdomain routing protocols?
|
| |
| B. Gourdin
| Framing attacks on smart phones and dumb routers: tap-jacking and geo-localization attacks
|
| |
| R. Govindan
| Scale Free Aggregation in Sensor Networks
|
| |
| Ashley Green
| Sensitive Information in a Wired World
|
| |
| Ashley Green
| The Private Database
|
| |
| James Grimmelman
| Policy Responses to Spam
|
| |
| Alvaro Gutierrez
| Towards Better Digital Identity Management
|
| |
| H. Hajime
| Java object lifetimes are predictable
|
| |
| M. Hamburg
| Space-Efficient Identity Based Encryption Without Pairings
|
| |
| Changhua He
| A Modular Correctness Proof of IEEE 802.11i and TLS
|
| |
| Paul Helman
| Protecting Data Privacy through Hard-to-Reverse Negative Databases
|
| |
| Paul Helman
| Enhancing Privacy through Negative Representations of Data
|
| |
| Paul Helman
| On-line Negative Databases
|
| Paul Helman
| A formal framework for positive and negative detection
|
| |
| Paul Helman
| Protecting Data Privacy through Hard-to-Reverse Negative
Databases
|
| |
| Paul Helman
| Protecting Data Privacy through Hard-to-Reverse Negative
Databases
|
| |
| James Hendler
| Information Accountability
|
| |
| Dan Holevoet
| Copyright Reforms for the Digital Age: A Closer Look at
Google
|
| |
| Petter Holme
| Radial Structure of the Internet
|
| |
| Petter Holme
| An Integrated Model of Traffic, Geography and Economy in the Internet
|
| |
| John Hopcroft
| Spectral Clustering with Limited Independence
|
| |
| John Hopcroft
| Spectral Clustering by Recursive Partitioning
|
| |
| James Horey
| Anonymous Data Collection in Sensor Networks
|
| |
| Jeremy Horwitz
| Applications of Cayley Graphs, Bilinearity, and Higher-Order Residues to Cryptology
|
| |
| Jeremy Horwitz
| Toward Heirarchical Identity-Based Encryption
|
| |
| Daniel C. Howe
| TrackMeNot: Resisting Surveillance in Web Search
|
| |
| Peter Hummon
| How secure are secure interdomain routing protocols?
|
| |
| Ken Ingham
| Learning DFA representations of HTTP for protecting web
applications
|
| |
|
Yuval Ishai
| Private Multiparty Sampling and Approximation of Vector Combinations
|
| |
| Yuval Ishai
| Secure Multiparty Computation of Approximations
|
| |
| C. Jackson
| An analysis of private browsing modes in modern browsers
|
| |
| C. Jackson
| Busting frame busting: a study of clickjacking vulnerabilities at popular sites
|
| C. Jackson
| Transaction Generators: Root Kits for the Web
|
| |
| Collin Jackson
| A Browser Plug-in Solution to the Unique Password Problem
|
| |
| Collin Jackson
| Stronger Password Authentication Using
Browser Extensions
|
| |
| Collin Jackson
| Protecting Browser State from Web Privacy Attacks
|
| |
|
Geetha Jagannathan
| Privacy-Preserving Data Imputation
|
| |
| Geetha Jagannathan
| Privacy-Preserving Distributed k-Means Clustering over Arbitrarily Partitioned Data
|
| |
| Aaron D. Jaggard
| Approximate privacy: foundations and quantification
|
| Aaron D. Jaggard
| On the Structure of Weakly-Acyclic Games
|
| Aaron D. Jaggard
| Distributed Computing With Adaptive Heuristics
|
| |
| Aaron D. Jaggard
| Towards a Unified Approach to (In)Decision: Routing, Games, Circuits, Consensus, and Beyond
|
| |
| Aaron D. Jaggard
| Approximate Privacy: Foundations and Quantification (Extended Abstract)
|
| Aaron D. Jaggard
| Approximate Privacy: PARs for Set Problems
|
| Aaron D. Jaggard
| Approximate Privacy: Foundations and Quantification
|
| |
| Haixia Jia
| Protecting Data Privacy through Hard-to-Reverse Negative
Databases
|
| |
| Haixia Jia
| Protecting Data Privacy through Hard-to-Reverse Negative
Databases
|
| |
| Haixia Jia
| Protecting Data Privacy through Hard-to-Reverse Negative Databases
|
| |
| Hong Jiang
| Distributed Systems of Simple Interacting Agents
|
| |
| Hong Jiang
| Self-stabilizing behavior in networks of nondeterministically
interacting sensors
|
| |
| Hong Jiang
| Stabilizing Consensus in Mobile Networks
|
| Hong Jiang
| Stably computable properties of network graphs
|
| Hong Jiang
| Typed Computational Email for Serverless Distributed Applications
|
| |
| Hong Jiang
| Self-stabilizing Leader Election in Networks of Finite-state
Anonymous Agents
|
| |
| Aaron Johnson
| A Model of Onion Routing with Provable Anonymity
|
| Aaron Johnson
| Private Web Search
|
| Aaron Johnson
| Probabilistic Analysis of Onion Routing
in a Black-box Model
|
| |
| Aaron Johnson
| Preventing Active Timing Attacks in Low-Latency Anonymous Communication
|
| Aaron Johnson
| Design and Analysis of Efficient Anonymous-Communication Protocols
|
| |
| Jeff Jonas
| Swoosh: A Generic Approach to Entity Resolution
|
| |
| Roberto Bayardo Jr.
| Privacy Preserving Indexing of Documents on the Network
|
| |
| Ravi Kannan
| Spectral Clustering with Limited Independence
|
| Ravi Kannan
| The Space Complexity of Pass-Efficient Algorithms for Clustering
|
| Ravi Kannan
| Sampling Sub-problems of Heterogeneous Max-Cut Problems and Approximation
Algorithms
|
| |
| Ravi Kannan
| Spectral Clustering by Recursive Partitioning
|
| |
| Ravi Kannan
| A new approach to the planted clique problem
|
| |
| Ravi Kannan
| A Divide-and-Merge Methodology for Clustering
|
| Ravi Kannan
| Fast Monte Carlo Algorithms for Matrices I: Approximating Matrix Multiplication
|
| Ravi Kannan
| Fast Monte Carlo Algorithms for Matrices II: Computing Low-Rank Approximations to a Matrix
|
| Ravi Kannan
| Fast Monte Carlo Algorithms for Matrices III: Computing an Efficient Approximate Decomposition of a Matrix
|
| |
| Sampath Kannan
| Computing Diameter in the Streaming and Sliding-Window Models
|
| Sampath Kannan
| Graph Distances in the Streaming Model: The Value of Space
|
| Sampath Kannan
| On Graph Problems in a Semi-Streaming Model
|
| |
| O. Kardes | Implementing Privacy-Preserving Bayesian-Net
Discovery for Vertically Partitioned Data
|
| |
| J. Karlin
| Pretty Good BGP: Improving BGP by cautiously adopting
routes
|
| |
| Josh Karlin
| Distributed Internet Security and Measurement
|
| Josh Karlin
| Autonomous Security for Autonomous Systems
|
| Josh Karlin
| An Integrated Model of Traffic, Geography and Economy in the Internet
|
| |
| Josh Karlin
| Radial Structure of the Internet
|
| |
| Hideki Kawai
| D-Swoosh: A Family of Algorithms for Generic, Distributed Entity
Resolution
|
| |
| Krishnaram Kenthapadi
| Simulatable Auditing
|
| |
| Krishnaram Kenthapadi
| Enabling Privacy for the Paranoids
|
| |
| Krishnaram Kenthapadi
| Models and Algorithms for Data Privacy
|
| |
| Krishnaram Kenthapadi
| Balanced Allocation on Graphs
|
| Krishnaram Kenthapadi
| Achieving Anonymity via Clustering
|
| Krishnaram Kenthapadi
| Our Data, Ourselves: Privacy via Distributed Noise
Generation
|
| Krishnaram Kenthapadi
| Approximation Algorithms for k-Anonymity
|
| Krishnaram Kenthapadi
| Two Can Keep a Secret: A Distributed Architecture for Secure Database
|
| Krishnaram Kenthapadi
| Anonymizing Tables
|
| Krishnaram Kenthapadi
| k-Anonymity: Algorithms and Hardness
|
| |
| Krishnaram Kenthapadi
| Decentralized Algorithms using both Local and Random Probes
for P2P Load Balancing
|
| |
| A. Keshavarzian
| Achieving Stability in Networks of Input-Queued Switches
using a Local Online Scheduling Algorithm
|
| |
| Samir Khuller
| Achieving Anonymity via Clustering
|
| |
| Robert Kleinberg
| Inapproximability for VCG-Based Combinatorial Auctions
|
| |
| C. Konig
| Scalable Exploration of Physical Database Design
|
| |
| Aleksandra Korolova
| Link Privacy in Social Networks
|
| |
| Nimrod Kozlovski
| Technology in service of accountability - watch the watchers
|
| |
| Nimrod Kozlovski
| A Paradigm Shift in Online Policing - Designing Accountable
Policing
|
| |
| M. Kumar
| Reducing Shoulder-surfing by Using Gaze-based Password Entry
|
| |
| N. Kumar
| Achieving Stability in Networks of Input-Queued Switches
using a Local Online Scheduling Algorithm
|
| |
| Ralf Kusters
| Sequential Probabilistic Process Calculus and Simulation-Based
Security
|
| Ralf Kusters
| Unifying Equivalence-Based Definitions of Protocol Security
|
| Ralf Kusters
| On the Relationships Between Notions of Simulation-Based Security
|
| |
| Eric Landis
|
Information technology challenges of biodiversity and ecosystems informatics
|
| |
| Tait Larson
| D-Swoosh: A Family of Algorithms for Generic, Distributed Entity
Resolution
|
| |
| Robert Ledesma
| Client-side defense against web-based identity theft
|
| |
| Ninghui Li
| Oblivious Signature-Based Envelope
|
| |
| Michael Lodder
| Scaling Theory for Information Networks
|
| |
| AL Lodge
| Reduced Incidence of Hip Fracture in the Old Order Amish
|
| |
| Sachin Lodha
| Probabilistic Anonymity
|
| |
| Charlin Lu
| Powerful Privacy Potential: P3P in the Context of
Legislation and Education
|
| |
| Ben Lynn
| A Survey of Two Signature Aggregation Techniques
|
| |
| Ben Lynn
| On the Implementation of Pairing-Based Cryptosystems
|
| Ben Lynn
| Positive Results and Techniques for Obfuscation
|
| Ben Lynn
| Efficient Implementation of Pairing-Based Cryptosystems
|
| Ben Lynn
| Short Signatures from the Weil Pairing
|
| Ben Lynn
| On the Selection of Pairing-Friendly Groups
|
| Ben Lynn
| Aggregate and Verifiably Encrytped Signatures from Bilinear
Maps
|
| Ben Lynn
| Authenticated Identity-Based Encryption
|
| Ben Lynn
| Constructing Elliptic Curves with Prescribed Embedding Degrees
|
| Ben Lynn
| Toward Heirarchical Identity-Based Encryption
|
| |
| Anna Lysyanskaya
| Sequential Aggregate Signatures from Trapdoor Permutations
|
| |
| Michael M.Groat
| Anonymous Data Collection in Sensor Networks
|
| |
| Michael W. Mahoney
| Fast Monte Carlo Algorithms for Matrices I: Approximating Matrix Multiplication
|
| Michael W. Mahoney
| Fast Monte Carlo Algorithms for Matrices II: Computing Low-Rank Approximations to a Matrix
|
| Michael W. Mahoney
| Fast Monte Carlo Algorithms for Matrices III: Computing an Efficient Approximate Decomposition of a Matrix
|
| |
| Michael W. Mahoney
| Sampling Sub-problems of Heterogeneous Max-Cut Problems and Approximation
Algorithms
|
| |
| Michael W. Mahoney
| A Randomized Algorithm for a Tensor-Based Generalization of the
Singular Value Decomposition
|
| |
| Michael W. Mahoney
| On the Nystrom Method for Approximating a Gram Matrix for Improved
Kernel-Based Learning
|
| |
| David Maier
|
Information technology challenges of biodiversity and ecosystems informatics
|
| |
| Dahlia Malkhi
| Fairplay -- A Secure Two-Party Computation System
|
| |
| Tal Malkin
| Secure Multiparty Computation of Approximations
|
| |
|
Tal Malkin
| Private Multiparty Sampling and Approximation of Vector Combinations
|
| |
| G. S. Manku
| Know thy Neighbor's Neighbor: The Power of Lookahead in Randomized P2P Networks
|
| G. S. Manku
| Optimal Routing in Chord
|
| G. S. Manku
| Approximate Counts and Quantiles over Sliding Windows
|
| G. S. Manku
| Randomized ID Selection for Peer to Peer Networks
|
| |
| G. S. Manku
| Decentralized Algorithms using both Local and Random Probes
for P2P Load Balancing
|
| |
| G. S. Manku
| Dipsea: A Modular Distributed Hash Table |
| |
| Luis Marenco
| Dynamic Tables: An Architecture for Managing Evolving, Heterogeneous Biomedical Data in Relational Database Management Systems
|
| |
| Sergio Marti
| Limited Reputation Sharing in P2P Systems
|
| Sergio Marti
| SPROUT: P2P Routing with Social Networks
|
| Sergio Marti
| SPROUT: P2P Routing with Social Networks (extended version)
|
| Sergio Marti
| DHT Routing Using Social Links
|
| |
| Sergio Marti
| Trust and reputation in peer-to-peer networks
|
| |
| DJ McBride
| Reduced Incidence of Hip Fracture in the Old Order Amish
|
| |
| Kevin S. McCurley
| Ranking the Web Frontier
|
| Kevin S. McCurley
| Connection Subgraphs in Social Networks
|
| |
| Katherine McDaniel
| A Modest Proposal: Libel Law Reform in the Internet Era
|
| |
| Andrew McGregor
| Graph Distances in the Streaming Model: The Value of Space
|
| Andrew McGregor
| On Graph Problems in a Semi-Streaming Model
|
| |
| Frank McSherry
| Toward Privacy in Public Databases
|
| |
| Frank McSherry
| Our Data, Ourselves: Privacy via Distributed Noise
Generation
|
| |
| Qixiang Mei
| Direct Chosen Ciphertext Security from Identity-Based Techniques
|
| |
| David Menestrina
| D-Swoosh: A Family of Algorithms for Generic, Distributed Entity
Resolution
|
| David Menestrina
| Generic Entity Resolution with Data Confidences
|
| |
| David Menestrina
| Generic Entity Resolution with Data Confidences
|
| |
| Michael Merritt
| Tight Bounds for Shared Memory Systems Accessed by Byzantine Processes
|
| |
| Silvio Micali
| Sequential Aggregate Signatures from Trapdoor Permutations
|
| |
| Perry L. Miller
| Dynamic Tables: An Architecture for Managing Evolving, Heterogeneous Biomedical Data in Relational Database Management Systems
|
| |
| Ilya Mironov
| Our Data, Ourselves: Privacy via Distributed Noise
Generation
|
| |
| Nina Mishra
| Enabling Privacy for the Paranoids
|
| Nina Mishra
| Secure computation of the k'th-ranked element
|
| |
| Nina Mishra
| Simulatable Auditing
|
| |
| BD Mitchell
| Reduced Incidence of Hip Fracture in the Old Order Amish
|
| |
| J. Mitchell
| Transaction Generators: Root Kits for the Web
|
| |
| John C. Mitchell
| A Modular Correctness Proof of IEEE 802.11i and TLS
|
| John C. Mitchell
| Secure Protocol Composition
|
| |
| John C. Mitchell
| Protecting Browser State from Web Privacy Attacks
|
| John C. Mitchell
| Probabilistic polynomial-time semantics for a protocol security
logic
|
| John C. Mitchell
| The Impossibility of Realizable Ideal Functionality
|
| John C. Mitchell
| Compositional Analysis of Contract Signing Protocols
|
| John C. Mitchell
| Enterprise Privacy Promises and Enforcement
|
| John C. Mitchell
| A derivation system and compositional logic for security
protocols
|
| John C. Mitchell
| Sequential Probabilistic Process Calculus and Simulation-Based
Security
|
| John C. Mitchell
| Unifying Equivalence-Based Definitions of Protocol Security
|
| John C. Mitchell
| Client-side defense against web-based identity theft
|
| John C. Mitchell
| Conflict and Combination in Privacy Policy Languages
|
| John C. Mitchell
| Abstraction and Refinement in Protocol Derivation
|
| John C. Mitchell
| On the Relationships Between Notions of Simulation-Based Security
|
| John C. Mitchell
| Formal Derivation of Security Protocols
|
| |
| John C. Mitchell
| Privacy and Contextual Integrity: Framework and
Applications
|
| John C. Mitchell
| Managing Digital Rights using Linear Logic
|
| |
| John C. Mitchell
| A Browser Plug-in Solution to the Unique Password Problem
|
| |
| John C Mitchell
| Stronger Password Authentication Using
Browser Extensions
|
| |
| Pradipta Mitra
| Spectral Clustering by Recursive Partitioning
|
| |
| Pradipta Mitra
| Clustering Algorithms for Random and Pseudo-random Structures
|
| |
| Pradipta Mitra
| Spectral Clustering with Limited Independence
|
| |
| Nicholas Miyake
| A Browser Plug-in Solution to the Unique Password Problem
|
| |
| Nicholas Miyake
| Stronger Password Authentication Using
Browser Extensions
|
| |
| Nagendra Modadugu
| Security for Real-World Networked Applications
|
| |
| Nagendra Modadugu
| On the Effectiveness of Address-Space Randomization
|
| |
| Melanie Moses
| Scaling Theory for Information Networks
|
| |
| Elchanan Mossel
| Inapproximability for VCG-Based Combinatorial Auctions
|
| |
| Rajeev Motwani
| Algorithms for the Database Layout Problem
|
| Rajeev Motwani
| Adaptive Ordering of Pipelined Stream Filters
|
| Rajeev Motwani
| Enabling Privacy for the Paranoids
|
| Rajeev Motwani
| The Price of Validity in Dynamic Networks
|
| Rajeev Motwani
| Load Shedding Techniques for Aggregation Queries in Stream Systems
|
| Rajeev Motwani
| Scale Free Aggregation in Sensor Networks
|
| Rajeev Motwani
| Operator scheduling in data stream systems
|
| |
| Rajeev Motwani
| Efficient Algorithms for Finding and Masking Quasi-Identifiers
|
| Rajeev Motwani
| Link Privacy in Social Networks
|
| Rajeev Motwani
| Auditing SQL Queries
|
| |
| Rajeev Motwani
| Approximation Algorithms for k-Anonymity
|
| Rajeev Motwani
| Two Can Keep a Secret: A Distributed Architecture for Secure Database
|
| Rajeev Motwani
| Anonymizing Tables
|
| Rajeev Motwani
| The Pipelined Set Cover Problem
|
| Rajeev Motwani
| Adaptive Caching for Continuous Queries
|
| Rajeev Motwani
| Robust identification of fuzzy duplicates
|
| Rajeev Motwani
| k-Anonymity: Algorithms and Hardness
|
| |
| K. Munagala
| The Pipelined Set Cover Problem
|
| K. Munagala
| Adaptive Caching for Continuous Queries
|
| |
| S. Munagala
| Adaptive Ordering of Pipelined Stream Filters
|
| |
| Bob Mungamuru
| Security Configuration Management
|
| |
| S. U. Nabar
| Scalable Exploration of Physical Database Design
|
| S. U. Nabar
| Achieving Stability in Networks of Input-Queued Switches
using a Local Online Scheduling Algorithm
|
| |
| Shubha U. Nabar
| Link Privacy in Social Networks
|
| Shubha U. Nabar
| Auditing SQL Queries
|
| |
| P. Nandy
| Exposing private information by timing web applications
|
| |
| M. Naor
| Traitor Tracing with Constant Size Ciphertext
|
| |
| Moni Naor
| Know thy Neighbor's Neighbor: The Power of Lookahead in Randomized P2P Networks
|
| |
| Moni Naor
| Our Data, Ourselves: Privacy via Distributed Noise
Generation
|
| |
| A. Narayanan
| Privacy preserving targeted advertising
|
| |
| M. Newman
| Technological Networks and the Spread of Computer Viruses
|
| |
| J. Niishizawa
| Adaptive Ordering of Pipelined Stream Filters
|
| |
| Noam Nisan
| Fairplay -- A Secure Two-Party Computation System
|
| |
| Noam Nisan
| Best-Response Mechanisms
|
| |
| H. Nissenbaum
| Privacy preserving targeted advertising
|
| |
| Helen Nissenbaum
| Table of Contents for and Introduction to "Privacy in Context: Technology, Policy, and the Integrity of Social Life"
|
| Helen Nissenbaum
| TrackMeNot: Resisting Surveillance in Web Search
|
| |
| Helen Nissenbaum
| Privacy and Contextual Integrity: Framework and
Applications
|
| |
| Helen Nissenbaum
| Privacy as Contextual Integrity
|
| |
| Kobbi Nissim
| Privacy-preserving Datamining on Vertically Partitioned Databases
|
| Kobbi Nissim
| Efficient Private Matching and Set Intersection
|
| |
| Kobbi Nissim
| Evaluating 2-DNF Formulas on Ciphertexts
|
| Kobbi Nissim
| Simulatable Auditing
|
| |
| Kobbi Nissim
| Secure Multiparty Computation of Approximations
|
| |
| Chris Olston
| Security Configuration Management
|
| |
| Rafail Ostrovsky
| Searchable Public Key Encryption
|
| |
| M. Page
| On the Effectiveness of Address-Space Randomization
|
| |
| Rina Panigrahy
| Entropy based Nearest Neighbor Search in High
Dimensions
|
| |
| Rina Panigrahy
| Finding Frequent Elements in non-bursty Streams
|
| |
| Rina Panigrahy
| Algorithms for the Database Layout Problem
|
| |
| Rina Panigrahy
| Analyzing the Efficiency of BitTorrent and Related
Peer-to-Peer Networks
|
| Rina Panigrahy
| Balanced Allocation on Graphs
|
| Rina Panigrahy
| Achieving Anonymity via Clustering
|
| Rina Panigrahy
| Approximation Algorithms for k-Anonymity
|
| Rina Panigrahy
| Anonymizing Tables
|
| Rina Panigrahy
| k-Anonymity: Algorithms and Hardness
|
| |
| Christos Papadimitriou
| Inapproximability for VCG-Based Combinatorial Auctions
|
| |
| A. Papakonstantinou
| On The Impossibility of Basing Identity Based Encryption on Trapdoor Permutations
|
| |
| David C. Parkes
| Computational Challenges in E-commerce
|
| |
| Dusko Pavlovic
| A derivation system and compositional logic for security
protocols
|
| Dusko Pavlovic
| Formal Derivation of Security Protocols
|
| |
| Dusko Pavlovic
| Abstraction and Refinement in Protocol Derivation
|
| |
| David M. Pennock
| Computational Challenges in E-commerce
|
| |
| Rene Peralta
| Stably computable properties of network graphs
|
| |
| Giuseppe Persiano
| Searchable Public Key Encryption
|
| |
| B. Pfaff
| On the Effectiveness of Address-Space Randomization
|
| |
| Benny Pinkas
| Some Requirements for Adoption of Privacy-Preserving Data Mining
|
| Benny Pinkas
| Efficient Private Matching and Set Intersection
|
| Benny Pinkas
| Secure computation of the k'th-ranked element
|
| Benny Pinkas
| Secure Computation of Surveys
|
| Benny Pinkas
| Fairplay -- A Secure Two-Party Computation System
|
| |
| TI Pollin
| Reduced Incidence of Hip Fracture in the Old Order Amish
|
| |
| Manoj Prabhakaran
| Positive Results and Techniques for Obfuscation
|
| |
| Sarah Price
| Copyright Reforms for the Digital Age: A Closer Look at
Google
|
| |
| C. Rackoff
| On The Impossibility of Basing Identity Based Encryption on Trapdoor Permutations
|
| |
| Sridhar Rajagopalan
| On the Streaming Model Augmented with a Sorting Primitive
|
| |
| Ajith Ramanathan
| On the Relationships Between Notions of Simulation-Based Security
|
| |
| Ajith Ramanathan
| The Impossibility of Realizable Ideal Functionality
|
| Ajith Ramanathan
| Sequential Probabilistic Process Calculus and Simulation-Based
Security
|
| Ajith Ramanathan
| Unifying Equivalence-Based Definitions of Protocol Security
|
| |
| Rajeev Rastogi
| Detection and Recovery Techniques for Database Corruption
|
| |
| Omer Reingold
| Tight Bounds for Shared Memory Systems Accessed by Byzantine Processes
|
| |
| J. Rexford
| Pretty Good BGP: Improving BGP by cautiously adopting
routes
|
| |
| Jennifer Rexford
| How secure are secure interdomain routing protocols?
|
| Jennifer Rexford
| Putting BGP on the Right Path: a Case for Next-Hop Routing
|
| Jennifer Rexford
| Neighbor-specific BGP: more flexible routing policies while improving global stability
|
| |
| Jennifer Rexford | Learning-Based Anomaly Detection in BGP Updates
|
| |
| Jennifer Rexfrod
| Autonomous Security for Autonomous Systems
|
| |
| Leonid Reyzin
| Sequential Aggregate Signatures from Trapdoor Permutations
|
| |
| Chris Riley
| Liability in Peer-to-Peer Systems
|
| |
| J. Rosenstein
| Conflict and Combination in Privacy Policy Languages
|
| |
| Blake Ross
| A Browser Plug-in Solution to the Unique Password Problem
|
| |
| Blake Ross
| Stronger Password Authentication Using
Browser Extensions
|
| |
| Boris Rotenberg
| The Legal Regulation of Software Interoperability in the European Union: Digital Communications Networks and the Need to Re-Assess the 1991 EU Software Directive
|
| |
| Matthias Ruhl
| On the Streaming Model Augmented with a Sorting Primitive
|
| |
| G. Rydstedt
| Busting frame busting: a study of clickjacking vulnerabilities at popular sites
|
| |
| G. Rydstedt
| Framing attacks on smart phones and dumb routers: tap-jacking and geo-localization attacks
|
| |
| Raphael
Ryger | Implementing Privacy-Preserving Bayesian-Net
Discovery for Vertically Partitioned Data
|
| |
| Raphael Ryger
| Some Requirements for Adoption of Privacy-Preserving Data Mining
|
| Raphael Ryger
| Secure Computation of Surveys
|
| |
| Amit Sahaj
| Positive Results and Techniques for Obfuscation
|
| |
| Felipe Saint-Jean
| Some Requirements for Adoption of Privacy-Preserving Data Mining
|
| |
| Felipe Saint-Jean
| Implementation and Evaluation of Privacy-Preserving Protocols
|
| |
| Felipe Saint-Jean
| A Java Implementation of a Single-Database Computationally Symmetric
Private Information Retrieval (cSPIR) protocol
|
| |
| Felipe Saint-Jean
| Private Web Search
|
| |
| Felipe Saint-Jean
| Secure Computation of Surveys
|
| |
| Felipe Saint-Jean
| Usability of Browser-Based Tools for Web-Search Privacy
|
| |
| Thomas Sander
| Privacy Engineering in Digital Rights Management Systems
|
| |
| Andre Scedrov
| The Impossibility of Realizable Ideal Functionality
|
| |
| AA Sch"affer
| Two Problems with Multiple Genetic Studies of the Same Disease
|
| |
| AA Sch"affer
| Reduced Incidence of Hip Fracture in the Old Order Amish
|
| AA Sch"affer
| Anabaptist Genealogy Database
|
| |
| Michael Schapira
| Inapproximability for VCG-Based Combinatorial Auctions
|
| Michael Schapira
| Towards a Unified Approach to (In)Decision: Routing, Games, Circuits, Consensus, and Beyond
|
| |
| Michael Schapira
| Computation and incentives in combinatorial public projects
|
| Michael Schapira
| Approximate privacy: foundations and quantification
|
| Michael Schapira
| On the Structure of Weakly-Acyclic Games
|
| Michael Schapira
| Incentive compatibility and dynamics of congestion control
|
| Michael Schapira
| How secure are secure interdomain routing protocols?
|
| Michael Schapira
| Best-Response Mechanisms
|
| Michael Schapira
| Distributed Computing With Adaptive Heuristics
|
| Michael Schapira
| Putting BGP on the Right Path: a Case for Next-Hop Routing
|
| Michael Schapira
| Approximate Privacy: Foundations and Quantification (Extended Abstract)
|
| Michael Schapira
| Approximate Privacy: PARs for Set Problems
|
| Michael Schapira
| Neighbor-specific BGP: more flexible routing policies while improving global stability
|
| Michael Schapira
| Approximate Privacy: Foundations and Quantification
|
| |
| John L. Schnase
|
Information technology challenges of biodiversity and ecosystems informatics
|
| |
| Michael Scott
| Efficient Implementation of Pairing-Based Cryptosystems
|
| Michael Scott
| On the Selection of Pairing-Friendly Groups
|
| Michael Scott
| Constructing Elliptic Curves with Prescribed Embedding Degrees
|
| |
| Yaron Sella
| Fairplay -- A Secure Two-Party Computation System
|
| |
| S. Seshadri
| Detection and Recovery Techniques for Database Corruption
|
| |
| Hovav Shacham
| On the Effectiveness of Address-Space Randomization
|
| Hovav Shacham
| Short Group Signatures
|
| |
| Hovav Shacham
| New Paradigms in Signature Schemes
|
| Hovav Shacham
| A Survey of Two Signature Aggregation Techniques
|
| |
| Hovav Shacham
| Sequential Aggregate Signatures from Trapdoor Permutations
|
| |
| Hovav Shacham
| Group Signatures with Verifier-Local Revocation
|
| |
| Hovav Shacham
| Short Signatures from the Weil Pairing
|
| Hovav Shacham
| Aggregate and Verifiably Encrytped Signatures from Bilinear
Maps
|
| |
| JR Shapiro
| Reduced Incidence of Hip Fracture in the Old Order Amish
|
| |
| Scott Shenker
| Towards an Economic Analysis of Trusted Systems (Position Paper)
|
| |
| Scott Shenker
| Incentive compatibility and dynamics of congestion control
|
| |
| Scott Shenker
| Flexibility as an Instrument in DRM Systems
|
| |
| Vitaly Shmatikov
| Unifying Equivalence-Based Definitions of Protocol Security
|
| |
| Vitaly Shmatikov
| Probabilistic polynomial-time semantics for a protocol security
logic
|
| |
| Adam Shostack
| Privacy Engineering in Digital Rights Management Systems
|
| |
| AR Shuldiner
| Reduced Incidence of Hip Fracture in the Old Order Amish
|
| |
| Avi Silberschatz
|
Information technology challenges of biodiversity and ecosystems informatics
|
| |
| Avi Silberschatz
| Dynamic Tables: An Architecture for Managing Evolving, Heterogeneous Biomedical Data in Relational Database Management Systems
|
| |
| Avi Silberschatz
| PORTIA: Privacy, Obligations, and Rights in Technologies of Information Assessment
|
| Avi Silberschatz
| Detection and Recovery Techniques for Database Corruption
|
| |
| Alice Silverberg
| Applications of Multilinear Forms to Cryptography
|
| |
| Yaron Singer
| Computation and incentives in combinatorial public projects
|
| |
| Yaron Singer
| Inapproximability for VCG-Based Combinatorial Auctions
|
| |
| Adam Smith
| Toward Privacy in Public Databases
|
| |
| Jonathan Smith
| Towards an Economic Analysis of Trusted Systems (Position Paper)
|
| |
| Anil Somayaji
| Learning DFA representations of HTTP for protecting web
applications
|
| |
| R. Srikant
| Privacy Preserving OLAP
|
| |
| Utkarsh Srivastava
| Enabling Privacy for the Paranoids
|
| |
| Utkarsh Srivastava
| Two Can Keep a Secret: A Distributed Architecture for Secure Database
|
| |
| D. Stefanovic
| Randomized Instruction Set Emulation
|
| D. Stefanovic
| Java object lifetimes are predictable
|
| |
| DG Stinchcomb
| Reduced Incidence of Hip Fracture in the Old Order Amish
|
| |
| Martin J. Strauss
| Secure Multiparty Computation of Approximations
|
| |
|
Martin J. Strauss
| Private Multiparty Sampling and Approximation of Vector Combinations
|
| |
| EA Streeten
| Reduced Incidence of Hip Fracture in the Old Order Amish
|
| |
| Qi Su
| Swoosh: A Generic Approach to Entity Resolution
|
| |
| Hiran Subramaniam
| Experimental Analysis of Privacy-Preserving Statistics Computation
|
| |
| S. Sudarshan
| Detection and Recovery Techniques for Database Corruption
|
| |
| Mukund Sundararajan
| A Modular Correctness Proof of IEEE 802.11i and TLS
|
| |
| Mukund Sundararajan
| Trade-offs in Cost Sharing
|
| |
| Siddharth Suri
| Graph Distances in the Streaming Model: The Value of Space
|
| Siddharth Suri
| On Graph Problems in a Semi-Streaming Model
|
| |
| Gerald Jay Sussman
| Information Accountability
|
| |
| Paul Syverson
| A Model of Onion Routing with Provable Anonymity
|
| Paul Syverson
| Probabilistic Analysis of Onion Routing
in a Black-box Model
|
| |
| Paul Syverson
| Preventing Active Timing Attacks in Low-Latency Anonymous Communication
|
| |
| Gadi Taubenfeld
| Tight Bounds for Shared Memory Systems Accessed by Byzantine Processes
|
| |
| Yuka Teraguchi
| Client-side defense against web-based identity theft
|
| |
| Sutthipong Thavisomboon
| D-Swoosh: A Family of Algorithms for Generic, Distributed Entity
Resolution
|
| |
| Dilys Thomas
| Enabling Privacy for the Paranoids
|
| |
| Dilys Thomas
| Privacy Preserving OLAP
|
| |
| Dilys Thomas
| Achieving Anonymity via Clustering
|
| Dilys Thomas
| Approximation Algorithms for k-Anonymity
|
| Dilys Thomas
| Two Can Keep a Secret: A Distributed Architecture for Secure Database
|
| Dilys Thomas
| Anonymizing Tables
|
| Dilys Thomas
| k-Anonymity: Algorithms and Hardness
|
| |
| Dilys Thomas
| Algorithms and Architectures for Data Privacy
|
| Dilys Thomas
| Finding Frequent Elements in non-bursty Streams
|
| |
| Dilys Thomas
| Operator scheduling in data stream systems
|
| |
| Dilys Thomas
| Auditing SQL Queries
|
| |
| Dilys Thomas
| Probabilistic Anonymity
|
| |
| Andrew Tomkins
| Connection Subgraphs in Social Networks
|
| |
| John A. Tomlin
| Ranking the Web Frontier
|
| |
| V. Toubiana
| Privacy preserving targeted advertising
|
| |
| Will Tsui
| Digital Identity Management on the Internet
|
| |
| Mathieu Turuani
| Probabilistic polynomial-time semantics for a protocol security
logic
|
| Mathieu Turuani
| Compositional Analysis of Contract Signing Protocols
|
| |
| Chris Umans
| Inapproximability for VCG-Based Combinatorial Auctions
|
| |
| Y. Vahlis
| On The Impossibility of Basing Identity Based Encryption on Trapdoor Permutations
|
| |
| Gregory Valiant
| Best-Response Mechanisms
|
| |
| Sergei Vassilvitskii
| On the Worst Case Complexity of the k-means Method
|
| |
| Bobby Vellanki
| The Private Database
|
| |
| Santosh Vempala
| A Divide-and-Merge Methodology for Clustering
|
| |
| Grant Wang
| A Divide-and-Merge Methodology for Clustering
|
| |
| Yi Wang
| Neighbor-specific BGP: more flexible routing policies while improving global stability
|
| |
| B. Waters
| On The Impossibility of Basing Identity Based Encryption on Trapdoor Permutations
|
| B. Waters
| Conjunctive, subset, and range queries on encrypted data
|
| |
| Brent Waters
| Direct Chosen Ciphertext Security from Identity-Based Techniques
|
| |
| Brent Waters
| Private encrypted content distribution using private broadcast
encryption
|
| |
| Brent Waters
| Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
|
| |
| Timothy M. Weber
| Values in a National Information Infrastructure: A Case Study
of the US Census
|
| |
| Hoeteck Wee
| Toward Privacy in Public Databases
|
| |
| Daniel J. Weitzner
| Information Accountability
|
| |
| Jennifer Widom
| Adaptive Ordering of Pipelined Stream Filters
|
| Jennifer Widom
| Enabling Privacy for the Paranoids
|
| |
| Jennifer Widom
| Swoosh: A Generic Approach to Entity Resolution
|
| |
| Jennifer Widom
| The Pipelined Set Cover Problem
|
| Jennifer Widom
| Adaptive Caching for Continuous Queries
|
| |
| U Wieder
| Know thy Neighbor's Neighbor: The Power of Lookahead in Randomized P2P Networks
|
| |
| M. Williamson
| Technological Networks and the Spread of Computer Viruses
|
| |
| T. Winograd
| Reducing Shoulder-surfing by Using Gaze-based Password Entry
|
| |
| Rebecca N. Wright
| Distributed Computing With Adaptive Heuristics
|
| Rebecca N. Wright
| Secure Multiparty Computation of Approximations
|
| |
| Rebecca N. Wright
| Towards a Unified Approach to (In)Decision: Routing, Games, Circuits, Consensus, and Beyond
|
| |
| Rebecca N. Wright
| Implementing Privacy-Preserving Bayesian-Net
Discovery for Vertically Partitioned Data
|
| |
| Rebecca N. Wright
| Privacy-Preserving Classification of Customer Data without Loss of Accuracy
|
| Rebecca N. Wright
| Privacy-Enhancing k-Anonymization of Customer Data
|
| Rebecca N. Wright
| Improved Privacy-Preserving Bayesian Network Parameter Learning on Vertically Partitioned Data
|
| Rebecca N. Wright
| Tight Bounds for Shared Memory Systems Accessed by Byzantine Processes
|
| Rebecca N. Wright
| Privacy-Preserving Distributed k-Means Clustering over Arbitrarily Partitioned Data
|
| Rebecca N. Wright
| Anonymity-Preserving Data Collection
|
| Rebecca N. Wright
| Accountable Privacy
|
| Rebecca N. Wright
| Experimental Analysis of Privacy-Preserving Statistics Computation
|
| Rebecca N. Wright
| Privacy-Preserving Bayesian Network Structure Computation on Distributed Heterogeneous Data
|
| Rebecca N. Wright
| PORTIA: Privacy, Obligations, and Rights in Technologies of Information Assessment
|
| |
|
Rebecca N. Wright
| Private Multiparty Sampling and Approximation of Vector Combinations
|
|
Rebecca N. Wright
| Privacy-Preserving Data Imputation
|
|
Rebecca N. Wright
| Privacy-Preserving Queries on Encrypted Data
|
|
Rebecca N. Wright
| Privacy-Preserving Computation of Bayesian
Networks on Vertically Partitioned Data
|
| |
| Ying Xu
| Two Can Keep a Secret: A Distributed Architecture for Secure Database
|
| |
| Ying Xu
| Efficient Algorithms for Finding and Masking Quasi-Identifiers
|
| Ying Xu
| Link Privacy in Social Networks
|
| |
| Ying Xu
| Enabling Privacy for the Paranoids
|
| |
| Aleksandr Yampolskiy
| Towards a Theory of Data Entanglement
|
| Aleksandr Yampolskiy
| Inoculation strategies for victims of viruses and the sum-of-squares partition problem
|
| |
| Beverly Yang
| Resource Discovery in Peer-to-Peer Systems
|
| |
|
Zhiqiang Yang
| Privacy-Preserving Computation of Bayesian
Networks on Vertically Partitioned Data
|
| |
| Zhiqiang Yang
| Distributed Protocols for Data Privacy
|
| Zhiqiang Yang
| Privacy-Preserving Queries on Encrypted Data
|
| |
| Zhiqiang Yang
| Privacy-Preserving Classification of Customer Data without Loss of Accuracy
|
| Zhiqiang Yang
| Privacy-Enhancing k-Anonymization of Customer Data
|
| Zhiqiang Yang
| Improved Privacy-Preserving Bayesian Network Parameter Learning on Vertically Partitioned Data
|
| Zhiqiang Yang
| Anonymity-Preserving Data Collection
|
| Zhiqiang Yang
| Experimental Analysis of Privacy-Preserving Statistics Computation
|
| Zhiqiang Yang
| Privacy-Preserving Bayesian Network Structure Computation on Distributed Heterogeneous Data
|
| |
| Alec Yasinsac
| Accountable Privacy
|
| |
| Jamie Yoo
|
Controlling Sensitive Information
|
| |
| Jian Zhang | Learning-Based Anomaly Detection in BGP Updates
|
| |
| Jian Zhang
| Computing Diameter in the Streaming and Sliding-Window Models
|
| Jian Zhang
| Efficient Algorithms for Constructing (1+\epsilon,\beta)-Spanners in the Distributed and Streaming Models
|
| Jian Zhang
| On Graph Problems in a Semi-Streaming Model
|
| |
| Jian Zhang
| Massive Data Streams in Graph Theory and Computational Geometry
|
| |
| Jian Zhang
| Finding Highly Correlated Pairs Efficiently with Powerful
Pruning
|
| |
| Jian Zhang.
| Graph Distances in the Streaming Model: The Value of Space
|
| |
|
Sheng Zhong
| Privacy-Preserving Queries on Encrypted Data
|
| |
| Sheng Zhong
| Towards a Theory of Data Entanglement
|
| Sheng Zhong
| Privacy-Preserving Classification of Customer Data without Loss of Accuracy
|
| Sheng Zhong
| Privacy-Enhancing k-Anonymization of Customer Data
|
| Sheng Zhong
| Anonymity-Preserving Data Collection
|
| |
| An Zhu
| Anonymizing Tables
|
| |
| An Zhu
| Achieving Anonymity via Clustering
|
| An Zhu
| Approximation Algorithms for k-Anonymity
|
| An Zhu
| k-Anonymity: Algorithms and Hardness
|
| An Zhu
| Online Computations in Scheduling and Network Applications
|
| |
| An Zhu
| Algorithms for the Database Layout Problem
|
| |
| Yaping Zhu
| Putting BGP on the Right Path: a Case for Next-Hop Routing
|
| |
| Michael Zimmer
| The Quest for the Perfect Search Engine: Values,
Technical Design, and the Flow of Personal Information in Spheres of Mobility
|
| |
| Michael T. Zimmer
| Surveillance, privacy and the ethics of vehicle safety
communication technologies
|
| Michael T. Zimmer
| Personal Information and the Design of Vehicle Safety Communication Technologies: an Application of Privacy as Contextual Integrity
|
| |
| Aviv Zohar
| Incentive compatibility and dynamics of congestion control
|
| Aviv Zohar
| Best-Response Mechanisms
|