Publication Verifiable Elections That Scale for Free Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn Public-Key Cryptography – PKC 2013 | February 2013 Public-Key Cryptography – PKC 2013
Publication Shroud: Enabling Private Access to Large-Scale Data in the Data Center Jay Lorch, Bryan Parno, James Mickens, Mariana Raykova, Joshua Schiffman Proceedings of the 11th USENIX Conference on File and Storage Technologies (FAST) | February 2013 Proceedings of the 11th USENIX Conference on File and Storage Technologies (FAST)
Publication FixMeUp: Repairing Access-Control Bugs in Web Applications Sooel Son, Vitaly Shmatikov, Kathryn S McKinley Network and Distributed System Security Symposium (NDSS) | February 2013 Network and Distributed System Security Symposium (NDSS)
Publication Verito: A Practical System for Transparency and Accountability in Virtual Economies Raghav Bhaskar, Saikat Guha, Srivatsan Laxman, Prasad Naldurg Proceedings of the Network and Distributed Systems Security Symposium (NDSS) | February 2013 Proceedings of the Network and Distributed Systems Security Symposium (NDSS)
Publication ZQL: A Compiler for Privacy-Preserving Data Processing Cédric Fournet, Markulf Kohlweiss, George Danezis MSR-TR-2013-25 | February 2013 Video
Publication Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme Joppe Bos, Kristin Lauter, Jake Loftus, Michael Naehrig MSR-TR-2013-23 | February 2013
Publication InteGuard: Toward Automatic Protection of Third-Party Web Service Integrations Luyi Xing, Yangyi Chen, XiaoFeng Wang, Shuo Chen Network & Distributed System Security Symposium (NDSS) | February 2013 Network & Distributed System Security Symposium (NDSS)
Publication Missive: Fast Appliance Launch From an Untrusted Buffer Cache Jon Howell, Jeremy Elson, Bryan Parno, John (JD) Douceur MSR-TR-2013-9 | January 2013
Publication How to Run POSIX Apps in a Minimal Picoprocess Jon Howell, Bryan Parno, John (JD) Douceur MSR-TR-2013-10 | January 2013