Publication Policy-Carrying Data: A Privacy Abstraction for Attaching Terms of Service to Mobile Data Stefan Saroiu, Alec Wolman, Sharad Agarwal HotMobile ’15 Proceedings of the 16th International Workshop on Mobile Computing Systems and Applications | February 2015
Publication Sensor-Based User Authentication He Wang, Dimitrios Lymberopoulos, Jie Liu Wireless Sensor Networks – 12th European Conference, EWSN 2015, Porto, Portugal | February 2015 ISBN: 978-3-319-15581-4
Publication Identifying Cross-origin Resource Status Using Application Cache Sangho Lee, Hyungsub Kim, Jong Kim 22nd Network and Distributed System Security Symposium (NDSS 2015) | February 2015
Publication Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis Joppe Bos, Craig Costello, Patrick Longa, Michael Naehrig Journal of Cryptographic Engineering | February 2015, Vol 6(4): pp. 259-286 Project
Publication Display Leakage and Transparent Wearable Displays: Investigation of Risk, Root Causes, and Defenses Tadayoshi Kohno, Joel Kollin, David Molnar, Franziska Roesner, MSR-TR-2015-18 | February 2015
Publication The Cost of Asking Crowd Workers to Behave Maliciously Walter. S. Lasecki, Jaime Teevan, Ece Kamar In Proceedings of the Workshop on Human-Agent Interaction Design and Models (HAIDM 2015) at AAMAS 2015 | February 2015
Publication IC-Cut: A Compositional Search Strategy for Dynamic Test Generation Maria Christakis, Patrice Godefroid MSR-TR-2015-10 | February 2015 February 2015, revised May 2015
Publication Efficient RAM and control flow in verifiable outsourced computation Riad S. Wahby, Srinath Setty, Zuocheng Ren, Andrew J. Blumberg, Michael Walfish Network & Distributed System Security Symposium (NDSS) | February 2015 Network & Distributed System Security Symposium (NDSS)
Publication Bloom Cookies: Web Search Personalization without User Tracking Nitesh Mor, Oriana Riva, Suman Nath, John Kubiatowicz Proceedings of the 22nd Annual Network and Distributed System Security Symposium (NDSS ’15) | February 2015 Proceedings of the 22nd Annual Network and Distributed System Security Symposium (NDSS '15)
Publication Homomorphic Computation of Edit Distance Jung Hee Cheon, Miran Kim, Kristin Lauter January 2015 Project