Publication How to Run POSIX Apps in a Minimal Picoprocess Jon Howell, Bryan Parno, John (JD) Douceur MSR-TR-2013-10 | January 2013
Publication Orthogonal Security With Cipherbase Arvind Arasu, Spyros Blanas, Ken Eguro, Raghav Kaushik, Donald Kossmann, Ravi Ramamurthy, Ramarathnam Venkatesan 6th Biennial Conference on Innovative Data Systems Research (CIDR’13) | January 2013 6th Biennial Conference on Innovative Data Systems Research (CIDR'13)
Publication Small World: Collisions Among Attackers in a Finite Population Cormac Herley WEIS | January 2013
Publication Fully Automated Analysis of Padding-Based Encryption in the Computational Model Gilles Barthe, Juan Manuel Crespo, César Kunz, Benedikt Schmidt, Benjamin Grégoire, Yassine Lakhnech, Santiago Zanella-Béguelin 20th ACM Conference on Computer and Communications Security, CCS 2013 | January 2013
Publication Does My Password Go up to Eleven? The Impact of Password Meters on Password Selection Serge Egelman, Andreas Sotirakopoulos, Ildar Muslukhov, Konstantin Beznosov, Cormac Herley Proc. CHI | January 2013
Publication Migration to the Cloud Made Safe and Secure Ken Eguro, Kaushik Rajan, Ravi Ramamurthy, Kapil Vaswani, Ramarathnam Venkatesan Off the Beaten Track (OBT) Workshop | January 2013
Publication Counter-Factual Reinforcement Learning: How to Model Decision-Makers That Anticipate the Future Ritchie Lee, David Wolpert, Scott Backhaus, Russell Bent, Brendan Tracey Decision Making and Imperfection, 4 | Published by Springer | 2013, Vol 474 ISBN: 978-3-642-36406-8
Publication Smart Meter Aggregation via Secret-Sharing George Danezis, Cédric Fournet, Markulf Kohlweiss, Santiago Zanella-Béguelin 2013 Smart Energy Grid Security Workshop, SEGS 2013 | January 2013 To appear
Publication Protect Sensitive Sites from Phishing Attacks Using Features Extractable from Inaccessible Phishing URLs Weibo Chu, Bin Benjamin Zhu, Feng Xue, Xiaohong Guan, Zhongmin Cai January 2013