Publication Functional Re-encryption and Collusion-Resistant Obfuscation Nishanth Chandran, Melissa Chase, Vinod Vaikuntanathan Theory of Cryptography Conference (TCC) 2012 | April 2012 Theory of Cryptography Conference (TCC)
Publication Automation in Computer-Aided Cryptography: proofs, attacks and designs Gilles Barthe, Benjamin Grégoire, César Kunz, Yassine Lakhnech, Santiago Zanella-Béguelin 2nd International Conference on Certified Programs and Proofs, CPP 2012 | April 2012
Publication Koi: A Location-Privacy Platform for Smartphone Apps Saikat Guha, Venkata Padmanabhan, Venkat Padmanabhan Proceedings of the 9th Symposium on Networked Systems Design and Implementation (NSDI) | April 2012 Proceedings of the 9th Symposium on Networked Systems Design and Implementation (NSDI)
Publication Congestion Lower Bounds for Secure In-network Aggregation Raghav Bhaskar ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ’12) | April 2012 ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec '12)
Publication Incremental Deterministic Public-Key Encryption Ilya Mironov, Omkant Pandey, Omer Reingold, Gil Segev EUROCRYPT’12 | April 2012 EUROCRYPT'12
Publication Monadic Reï¬nement Types for Verifying JavaScript Programs Nikhil Swamy, Joel Weinberger, Juan Chen, Ben Livshits, Cole Schlesinger MSR-TR-2012-37 | March 2012
Publication On the Security of the “Free-XOR” Technique Seung Geol Choi, Jonathan Katz, Ranjit Kumaresan, Hong-Sheng Zhou TCC 2012: Theory of Cryptography | March 2012
Publication An Conundrum of Permissions: Installing Applications on an Android Smartphone Patrick Kelly, Sunny Consolvo, Lorrie Cranor, Jaeyeon Jung, Norman Sadeh, David Wetherall Workshop on Usable Security | March 2012
Publication How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption Bryan Parno, Mariana Raykova, Vinod Vaikuntanathan Proceedings of the IACR Theory of Cryptography Conference (TCC) | March 2012 Proceedings of the IACR Theory of Cryptography Conference (TCC)
Publication Functional Re-encryption and Collusion-Resistant Obfuscation Nishanth Chandran, Melissa Chase, Vinod Vaikuntanathan Theory of Cryptography – 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings | March 2012 Theory of Cryptography – 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings ISBN: 978-3-642-28913-2