Publication Privacy Considerations for a Pervasive Eye Tracking World Dan Liebling, Sören Preibusch 4th International Workshop on Pervasive Eye Tracking and Mobile Eye-Based Interaction | September 2014
Publication Efficient and Secure Algorithms for GLV-Based Scalar Multiplication and their Implementation on GLV-GLS Curves (Extended Version) Armando Faz-Hernandez, Patrick Longa, Ana Sanchez Journal of Cryptographic Engineering | September 2014
Publication On the revocation of U-Prove tokens Christian Paquin MSR-TR-2014-122 | September 2014 Project
Publication Zero-Effort Payments: Design, Deployment, and Lessons Christopher Smowton, Jay Lorch, David Molnar, Stefan Saroiu, Alec Wolman Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp) | September 2014 Proceedings of the ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp) Project
Publication Accelerating NTRU Based Homomorphic Encryption Using GPUs Wei Dai, Yarkın Doröz, Berk Sunar 2014 IEEE High Performance Extreme Computing Conference (HPEC) | September 2014
Publication XRay: Increasing the Web’s Transparency with Differential Correlation Mathias Lecuyer, Guillaume Ducoffe, Francis Lan, Andrei Papancea, Theofilos Petsios, Riley Spahn, Augustin Chaintreau, Roxana Geambasu USENIX Security’14 | August 2014
Publication Towards reliable storage of 56-bit secrets in human memory Joseph Bonneau, Stuart Schechter Proceedings of the 23rd USENIX Security Symposium | August 2014 Proceedings of the 23rd USENIX Security Symposium
Publication Telepathwords: Preventing Weak Passwords by Reading Users’ Minds Saranga Komanduri, Rich Shay, Lorrie Cranor, Cormac Herley, Stuart Schechter Proceedings of the 23rd USENIX Security Symposium | August 2014
Publication Towards reliable storage of 56-bit secrets in human memory (extended version) Joseph Bonneau, Stuart Schechter MSR-TR-2014-95 | August 2014