Search results
- Security Breach Notification Laws: Views from Chief Security Officers, Samuelson Law, Technology & Public Policy Clinic, University of California, Berkeley, December, 2007
- Consumer Information Sharing: Where the Sun Still Don't Shine, Chris Hoofnagle, Jennifer King, Samuelson Law, Technology & Public Policy Clinic, UC Berkeley, December, 2007
- LQG Control for Distributed Systems over TCP-like Erasure Channels, E. Garone, B. Sinopoli, A. Goldsmith, and A. Casavola, Proceedings of IEEE Conference on Decision and Control, December, 2007
- Security and Privacy Risks of Embedded RFID in Everyday Things: the e-Passport and Beyond, Marci Meingast, Jennifer King, Deirdre Mulligan, Journal of Communications, 2, 7, 36-48, December, 2007
- Security and Privacy Risks of Embedded RFID in Everyday Things: the e-Passport and Beyond, Marci Meingast, Jennifer King, Deirdre Mulligan, Journal of Communications, 2, 7, 36-48, December, 2007
- HybrIDS: Embeddable Hybrid Intrusion Detection System, Adrian Lauf, Vanderbilt University, December, 2007
- Linear Programming Analysis of Loopy Belief Propagation for Weighted Matching, Sujay Sanghavi, Dmitry Malioutov, Alan S. Willsky, submitted to NIPS 2007, December, 2007
- A Modeling Environment for Patient Portals, Sean Duncavage, Janos Laszlo Mathe, Jan Werner, Akos Ledeczi, Bradley Malin, Janos Sztipanovits, 14, November, 2007
- Write markers for probabilistic quorum systems, Michael Merideth, Michael Reiter, Computer Science Department, Carnegie Mellon University, CMU-CS-07-165, November, 2007
- An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants, Jason Franklin, Vern Paxson, Stefan Savage, Adrian Perrig, ACM Conference on Computer and Communications Security (CCS), ACM, November, 2007
- Formal Proofs of Cryptographic Security of Diffie-Hellman based Protocols, Arnab Roy, Anupam Datta, John C. Mitchell, Proceedings of Symposium On Trustworthy Global Computing, November, 2007
- A Modeling Environment for Patient Portals, Sean Duncavage, Janos Laszlo Mathe, Jan Werner, Bradley Malin, Akos Ledeczi, Janos Sztipanovits, AMIA 2007, November, 2007
- The Inherent Security of Routing Protocols in Ad Hoc and Sensor Networks, Tanya Roosta, Sameer Pai, Phoebus Chen, Shankar Sastry, Stephen Wicker, Proceedings of the 50th Annual IEEE Global Communications Conference (IEEE GLOBECOM'07), IEEE, November, 2007
- Automatically Generating Attacks on Webapps with Model Checking, Michael Martin, 11, October, 2007
- Inductive Proofs of Computational Secrecy, Arnab Roy, 11, October, 2007
- Characterizing the Remote Control Behavior of Bots, Elizabeth Stinson, 11, October, 2007
- Model-Based Design Environment for Clinical Information Systems, Janos Laszlo Mathe, Sean Duncavage, Jan Werner, Akos Ledeczi, Bradley Malin, Janos Sztipanovits, 11, October, 2007
- Monitoring Elderly, Ruzena Bajcsy, 11, October, 2007
- Portcullis: Protecting Connection Setup fromDenial-of-Capability Attacks, Adrian Perrig, 11, October, 2007
- ARSL: A Language for Authorization Rule Specification in Software Security, Weider D. Yu, 11, October, 2007
- Using Social Network Theory Towards Development Of Wireless Ad Hoc Network Trust, Sameer Pai, 11, October, 2007
- Towards Automatic Discovery of Deviations in Binary Implementations, Cody Hartwig, 11, October, 2007
- Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust, Sameer Pai, 11, October, 2007
- A Model-based Intrusion Detection System for Wireless Process Control Systems, Tanya Roosta, 10, October, 2007
- Can Selective Sensing Protect Democratic Principles and Enhance Policing?, Deirdre Mulligan, Stephen Wicker, 10, October, 2007
- Competition and Fraud in Online Advertising Markets, Bob Mungamuru, 10, October, 2007
- Network Security and the Need to Consider Provider Coordination in Network Access Policy, Aaron Burstein, 10, October, 2007
- Probabilistic Opaque Quorum Systems, Michael Reiter, 10, October, 2007
- The Building Blocks of Consensus, Yee Jiun Song, 10, October, 2007
- Quicksilver Scalable Multicast, Ken Birman, 10, October, 2007
- Model-Based Design Environment for Clinical Information Systems, Akos Ledeczi, 10, October, 2007
- Privacy and Utility in Business Processes, Anupam Datta, 10, October, 2007
- Don’t Sweat Your Privacy: Using Humidity to Detect Human Presence, Mark Luk, 10, October, 2007
- Construction of an EMR Testbed, Janos Laszlo Mathe, Sean Duncavage, Jan Werner, Akos Ledeczi, Bradley Malin, Janos Sztipanovits, October, 2007
- Embeddable Hybrid Intrusion Detection System, Adrian Lauf, Richard A. Peters, William H. Robinson, October, 2007
- Poster - Embeddable Hybrid Intrusion Detection System, Adrian Lauf, Richard A. Peters, William H. Robinson, October, 2007
- SecVisor: A Tiny Hypervisor to Provide Lifetime Kernel Code Integrity for Commodity OSes, Arvind Seshadri, Mark Luk, Ning Qu, Adrian Perrig, ACM Symposium on Operating Systems Principles (SOSP), ACM, October, 2007
- Message-In-a-Bottle: User-Friendly and Secure Key Deployment for Sensor Nodes, Adrian Perrig, Mark Luk, Cynthia Kuo, Proceedings of the ACM Conference on Embedded Networked Sensor System (SenSys 2007), October, 2007
- Protecting Browsers from DNS Rebinding Attacks, Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh, Computer and Communications Security, October, 2007
- Secure Web Applications via Automatic Partitioning, S. Chong, J. Liu, A. C. Myers, X. Qi, K. Vikram, L. Zheng, X. Zheng, Proceedings of the 21st ACM Symposium on Operating Systems Principles, 31-44, October, 2007
- Respectful cameras: detecting visual markers in real-time to address privacy concerns, Jeremy Schiff, Marci Meingast, Deirdre Mulligan, Shankar Sastry, Ken Goldberg, Intelligent Robots and Systems, 2007. IROS 2007. IEEE/RSJ International Conference on, 971-978, October, 2007
- Constructive Techniques for Meta and Model-Level Reasoning, Ethan Jackson, Janos Sztipanovits, Proceedings of MODELS07, October, 2007
- Implementing a Model-Based Design Environment for Clinical Information Systems, Janos Laszlo Mathe, Sean Duncavage, Jan Werner, Akos Ledeczi, Bradley Malin, Janos Sztipanovits, 30, September, 2007
- Automated Tracking of Pallets in Warehouses: Beacon Layout and Asymmetric Ultrasound Observation Models,, Menasheh Fogel, Nathan Burkhart, Hongliang Ren, Jeremy Schiff, Max Meng, Ken Goldberg, Third IEEE Conference on Automation Science and Engineering (CASE),, September, 2007
- Implementing a Model-Based Design Environment for Clinical Information Systems, Janos Laszlo Mathe, Sean Duncavage, Jan Werner, Bradley Malin, Akos Ledeczi, Janos Sztipanovits, Workshop on Model-Based Trustworthy Health Information Systems In Conjunction with Models 2007, September, 2007
- Mapping the Security Landscape: A Role for Language Techniques, Fred Schneider, Luis Caires and Vasco T. Vasconcelos, Proceedings 18th International Conference, CONCUR 2007, September, 2007
- Lagrangian Relaxation for MAP Estimation in Graphical Models, Jason K. Johnson, Dmitry Malioutov, Alan S. Willsky, 45th Annual Allerton Conference on Communication, Control and Computing, September, 2007
- Network Security and the Need to Consider Provider Coordination in Network Access Policy, Aaron Burstein, Fred Schneider, 35th Research Conference on Communication, Information, and Internet Policy (TPRC), September, 2007
- Don't Sweat Your Privacy: Using Humidity to Detect Human Presence, Jun Han, Abhishek Jain, Mark Luk, Adrian Perrig, Proceedings of 5th International Workshop on Privacy in UbiComp (UbiPriv'07), September, 2007
- Inductive Proofs of Computational Secrecy, Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell, Proceedings of 12th European Symposium On Research In Computer Security, September, 2007
- Probabilistic opaque quorum systems, Michael Merideth, Michael Reiter, Distributed Computing: 21st International Symposium, DISC 2007, 403-419, September, 2007
- Security is Broken, Rik Farrow, 31, August, 2007
- Cross-cutting Opportunities in Network Defenses, Robbert van Renesse, 21, August, 2007
- SECuR-IT: A Summer School and Immersion Program, Sigurd Meldal, 19, August, 2007
- Toward a Culture of Cybersecurity Research, Aaron Burstein, 10, August, 2007
- Maximum Entropy Relaxation for Graphical Model Selection given Inconsistent Statistics, Venkat Chandrasekaran, Jason K. Johnson, Alan S. Willsky, IEEE Statistical Signal Processing Workshop, August, 2007
- Family Sharing and object Evolution: Technical Report, Xin Qi, Andrew C. Myers, n/a, August, 2007
- Profiles in Team Science, Deborah Illman, National Science Foundation, University of Washington, August, 2007
- Portcullis: Protecting Connection Setup from Denial-of-Capability Attacks, Bryan Parno, Dan Wendlandt, Elaine Shi, Adrian Perrig, Bruce Maggs, Yih-Chun Hu, Proceedings of ACM SIGCOMM, August, 2007
- Differences between Observation and Sampling Error in Sparse Signal Reconstruction, Galen Reeves, Michael Gastpar, IEEE 2007 Statistical ignal Processing Workshop, August, 2007
- Personal Internet Security, UK House of Lords, UK House of Lords, August, 2007
- Turtles All The Way Down: Research Challenges in User-Based Attestation, Jonathan M. McCune, Adrian Perrig, Arvind Seshadri, Leendert van Doorn, Proceedings of the Workshop on Hot Topics in Security (HotSec), August, 2007
- Decentralized Detection in Undirected Network Topologies, O. Patrick Kreidl, Alan S. Willsky, IEEE 2007 Statistical ignal Processing Workshop, August, 2007
- SIF: Enforcing Confidentiality and Integrity in Web Applications, S. Chong, K. Vikram, A. C. Myers, Proceedings of the 16th USENIX Security Symposium, 1-16, August, 2007
- Platform-Based Design for Clinical Information Systems, Jan Werner, Janos Laszlo Mathe, Sean Duncavage, Bradley Malin, Akos Ledeczi, Jim Jirjis, Janos Sztipanovits, 24, July, 2007
- Privacy and Utility in Business Processes, Adam Barth, Anupam Datta, John C. Mitchell, sharada sundaram, Proceedings of 20th IEEE Computer Security Foundations Symposium, July, 2007
- Characterizing Bots’ Remote Control Behavior, Elizabeth Stinson, John C. Mitchell, 4th GI Int'l Conf. on Detection of Intrusions \& Malware, and Vulnerability Assessment (DIMVA), July, 2007
- Platform-Based Design for Clinical Information Systems, Jan Werner, Janos Laszlo Mathe, Sean Duncavage, Bradley Malin, Akos Ledeczi, Jim Jirjis, Janos Sztipanovits, 5th IEEE International Conference on Industrial Informatics INDIN 2007, July, 2007
- Approximate Estimation of Distributed Networked Control Systems, Songhwai Oh, Shankar Sastry, American Control Conference, July, 2007
- Credentials-Based Authorization: Evaluation and Implementation, Fred Schneider, Lars Arge, Christian Cachin, Tomasz Jurdzinski, and Andrzej Tarlecki, Proceedings 34th International Colloquium, ICALP 2007, July, 2007
- PPMLP: A Special Modeling Language Processor for Privacy Policies, Weider D. Yu, Savitha Murthy, Proceedings of the 11th IEEE International Symposium on Computers and Communications (ISCC 2007), IEEE Communications Society, 851-858, July, 2007
- SIGABA: cryptanalysis of the full keyspace, Mark Stamp, Wing On Chan, Cryptologia, 31, 3, 201-222, July, 2007
- Privacy and Utility in Business Processes, Adam Barth, John C. Mitchell, Anupam Datta, sharada sundaram, 20th IEEE Computer Security Foundations Symposium (CSF 20), July, 2007
- Privacy in Camera Networks, A Technical Perspective, Marci Meingast, Sameer Pai, Stephen Wicker, Shankar Sastry, UCB Technical Report UCB/EECS-2007-94, July, 2007
- National Workshop on Beyond SCADA: Networked Embedded Control for Cyber-Physical Systems (NEC4CPS): Research Strategies and Roadmap, Bruce Krogh, Marija Ilic, Shankar Sastry, Team for Research in Ubitquitous Secure Technology (TRUST), July, 2007
- Estimation in Gaussian Graphical Models using Tractable Subgrahs: A Walk-Sum Analysis, Venkat Chandrasekaran, Jason K. Johnson, Alan S. Willsky, IEEE Transactions on Signal Processing (accepted), July, 2007
- Annual Progress Report, Joint EU-US-Tekes Workshop, "Long Term Challenges in High Confidence Evolutionary Embedded Systems", Grant No CNS-06369330, Shankar Sastry, Team for Research in Ubitquitous Secure Technology (TRUST), July, 2007
- Estimation in Wireless Sensor Network, Bonnie Zhu, Bruno Sinopoli, Kameshwar Poola, Shankar Sastry, Proceedings of the 26th American Control Conference, July, 2007
- 8. Static Error Detection Using Semantic Inconsistency Inference, I. Dillig, T. Dillig, A. Aiken, Conference on Programming Language Design and Implementation, 435-446, June, 2007
- An Overview of the Saturn Project, A. Aiken, S. Bugrara, I. Dillig, T. Dillig, P. Hawkins, B. Hackett, Workshop on Program Analysis for Software Tools and Engineering, 43-48, June, 2007
- Networks Of Sensors In Public Spaces: Combining Technology With Art, Sameer Pai, Philip Kuryloski, Henry Yip, Srikant Yennamandra, Stephen Wicker, Kirsten Boehner, Geri Gay, Proceedings of the IEEE 21st International Conference on Advanced Information Networking and Applications, June, 2007
- Pyramid Match Hashing: Sub-Linear Time Indexing Over Partial Correspondences, Kristen Grauman, trevor darrell, Proc. CVPR 2007, IEEE CS Press, June, 2007
- Using Social Network Theory Towards Development Of Wireless Ad hoc Network Trust, Sameer Pai, Tanya Roosta, Stephen Wicker, Shankar Sastry, Proceedings of the IEEE 21st International Conference on Advanced Information Networking and Applications, June, 2007
- Vulnerability Analysis of SCADA Protocol Binaries through Detection of Memory Access Taintedness, Carlo Bellettini, Julian L. Rrushi, Proceedings of the 8th IEEE SMC Information Assurance Workshop, LTC John Hill, 341-348, June, 2007
- . Utilizing dynamically coupled cores to form a resilient chip multiprocessor, Christopher LaFrieda, Engin Ipek, Jose Martinez, and Rajit Manohar, International Conference on Dependable Systems and Networks, June, 2007
- Discriminative Gaussian Process Latent Variable Models for Classification, Raquel Urtasun, trevor darrell, ICML 2007, June, 2007
- The Behavior of Unbounded Path-loss Models and the Effect of Singularity on Computed Network Interference, Hazer Inaltekin, Stephen Wicker, IEEE SECON 2007, June, 2007
- Learning Visual Representations using Images with Captions, Ariadna Quattoni, Micheal Collins, trevor darrell, Proc. CVPR 2007, IEEE CS Press, June, 2007
- Time Synchronization for Multi-Modal Target Tracking in Heterogeneous Sensor Networks, Isaac E Amundson, Manish Kushwaha, Brano Kusy, Peter Volgyesi, Gyula Simon, Xenofon Koutsoukos, Akos Ledeczi, Workshop on Networked Distributed Systems for Intelligent Sensing and Control, June, 2007
- Radio Interferometric Tracking of Mobile Wireless Nodes, Brano Kusy, Janos Sallai, Gyorgy Balogh, Akos Ledeczi, Vladimir Protopopescu, Johnny Tolliver, Frank DeNap, Morey Parang, 5th International Conference on Mobile Systems, Applications, and Services (Mobisys 07), 139-150, June, 2007
- A QoS policy configuration modeling language for publish/subscribe middleware platforms, Joe Hoffert, Douglas Schmidt, Aniruddha Gokhale, DEBS '07: Proceedings of the 2007 inaugural international conference on Distributed event-based systems, 140--145, June, 2007
- Minimizing response time for quorum-system protocols over wide-area networks, F. Oprea, M. Reiter, Proceedings of the 2007 International Conference on Dependable Systems and Networks, June, 2007
- MedSN System for In-Home Patient Monitoring: Architecture, Privacy and Security, Philip Kuryloski, Sameer Pai, Stephen Wicker, Yuan Xue, Proceedings of the Joint Confrence on High Confidence Medical Devices, Software, and Systems and Medical Device Plug-and-Play Interoperability (HCMDSS'07/MDPnP'07), June, 2007
- Vulnerabilities in First Generation RFID-enabled credit cards, Kevin Fu, 22, May, 2007
- Monitoring your network for fun and prophet[sic], John McHugh, 3, May, 2007
- Optimizing Power Consumption in Large Scale Storage Systems, Lakshmi Ganesh, Hakim Weatherspoon, Mahesh Balakrishnan, Ken Birman, 11th USENIX Workshop on Hot Topics in Operating Systems, May, 2007
- Transaction Generators: Rootkits for the Web, Collin Jackson, Dan Boneh, John C. Mitchell, May, 2007
- Civitas: A Secure Remote Voting System, Michael Clarkson, Stephen Chong, Andrew C. Myers, Cornell University Computing and Information Science Technology Report, May, 2007
- Embedded Intelligent Intrusion Detection: A Behavior-Based Approach, Adrian Lauf, Richard A. Peters, William H. Robinson, IEEE 4th international symposium on Embedded Computing, IEEE, N/A, May, 2007
- Minimal TCB code execution (Extended abstract), J. M. McCune, B. Parno, A. Perrig, M. Reiter, A. Seshadri, Proceedings of the 2007 IEEE Symposium on Security and Privacy, May, 2007
- A Fast and Efficient Source Authentication Solution for Broadcasting in Wireless Sensor Networks, Taojun Wu, Yi Cui, Brano Kusy, Akos Ledeczi, Janos Sallai, Nathan Skirvin, Jan Werner, Yuan Xue, Proceedings of New Technologies, Mobility and Security, 2007, ifip, IEEE, May, 2007
- Elections and Computers: A Match Made in ... Someplace?, Matt Bishop, 19, April, 2007
- Selling Security to Software Developers, Brian Chess, 12, April, 2007
- Brian Chess, Trust seminar presentation, 12, April, 2007
- Is Truly Real-Time Computing Becoming Unachievable?, Edward A. Lee, 3, April, 2007
- Is Truly Real-Time Computing Becoming Unachievable?, Edward A. Lee, 3, April, 2007
- Convergence Analysis of Reweighted Sum-Product Algorithms, Tanya Roosta, Martin J. Wainwright, Shankar Sastry, International Conference on Acoustic, Speech and Signal Processing, April, 2007
- MiniSec: A Secure Sensor Network Communication Architecture, Mark Luk, Ghita Mezzour, Adrian Perrig, Virgil D. Gligor, Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN), April, 2007
- Policy Outbrief, Deirdre K. Mulligan, 21, March, 2007
- Knowledge Transfer, Larry Rohrbough, 21, March, 2007
- TRUST: Team for Research in Ubiquitous Secure Technologies: Home Work Assignment, Shankar Sastry, 21, March, 2007
- Integrative Projects Ideas, Michael Reiter, 21, March, 2007
- End user security outbrief, Chris Karlof, 21, March, 2007
- Sensor Networks and Embedded Systems: Breakout Session Report, Stephen Wicker, 21, March, 2007
- Enhancing Security in Ultra-Large Scale (ULS) Systems using Domain- specific Modeling, Joe Hoffert, Akshay Dabholkar, Douglas Schmidt, Aniruddha Gokhale, 20, March, 2007
- Sensor Networks and Embedded Systems, Stephen Wicker, Deirdre K. Mulligan, Judith Cardell, 19, March, 2007
- Electronic Medical Record (EMR) Project, Janos Sztipanovits, 19, March, 2007
- Online ID Theft, Phishing, and Malware, John C. Mitchell, Doug Tygar, 19, March, 2007
- TRUST:Team for Research in Ubiquitous Secure Technologies Overview, Shankar Sastry, 19, March, 2007
- Network Defense Research, Anthony Joseph, Vern Paxson, Robbert van Renesse, 19, March, 2007
- TRUST Education and Outreach, Kristen Gates, 19, March, 2007
- TRUST Summer Study Programs, Ruzena Bajcsy, Kristen Gates, 19, March, 2007
- Disseminating Learning Materials:TRUST Academy Online (TAO), Larry Howard, 19, March, 2007
- TRUST Center Activities, Stephen Wicker, 19, March, 2007
- Knowledge Transfer - Policy, Deirdre K. Mulligan, 19, March, 2007
- Sensor Networks: Technology Transfer, Stephen Wicker, 19, March, 2007
- Trustworthy Systems, Michael Reiter, 19, March, 2007
- ID Theft Technology Transfer, Barbara Goto, John C. Mitchell, 19, March, 2007
- TRUST Knowledge Transfer EMR Project, Gabor Karsai, 19, March, 2007
- TRUST Education and Outreach Year 3 Projects, Kristen Gates, 19, March, 2007
- Poster - Intelligent Intrusion Detection System, Adrian Lauf, William H. Robinson, March, 2007
- Developing an Industry Supported Computer Security Curriculum, John C. Mitchell, March, 2007
- Inductive Trace Properties Imply Computational Security, A. Roy, A. Datta, A. Derek, J. C. Mitchell, March, 2007
- Modeling Abstractions for Representing Privacy and Security in Patient Portals, Sean Duncavage, Janos Laszlo Mathe, Jan Werner, Gabor Karsai, Akos Ledeczi, Bradley Malin, Janos Sztipanovits, March, 2007
- Modeling and Simulation Tool Suite for Patient Portals, Janos Laszlo Mathe, Sean Duncavage, Jan Werner, Gabor Karsai, Akos Ledeczi, Bradley Malin, Janos Sztipanovits, March, 2007
- Composing Security Modeling Concepts into Embedded System Models, Jan Werner, Matthew Eby, Janos Laszlo Mathe, Gabor Karsai, Akos Ledeczi, Janos Sztipanovits, March, 2007
- Antiquity: Exploiting a Secure Log for Wide-Area Distributed Storage, Hakim Weatherspoon, Patrick Eaton, Byung-Gon Chun, John Kubiatowicz, the 2nd ACM European Conference on Computer Systems, March, 2007
- l-Diversity: Privacy beyound k-Anonymity, Ashwin Machanavajjhala, Daniel Kifer, Johannes Gehrke, Muthuramakrishnan Venkitasubramaniam, Cornell University, 52, March, 2007
- Embedded RFID and Everyday Things: A Case Study of the Security and Privacy Risks of the U.S. e-Passport, Marci Meingast, Jennifer King, Deirdre Mulligan, IEEE International Conference on RFID, March, 2007
- Integrating Security Modeling into Embedded System Design, Matthew Eby, Jan Werner, Gabor Karsai, Akos Ledeczi, International Conference and Workshop on the Engineering of Computer Based Systems, IEEE, March, 2007
- Dynamic Dependency Tests: Analysis and Applications to Multi-modal Data Association, Michael Siracusa, John Fisher, Eleventh International Conference on Artificial Intelligence and Statistics', March, 2007
- DynamicSecurity Labels and Static Information Flow Control, Lantian Zheng, Andrew C. Myers, International Journal of Information Security, 2-3, March, 2007
- Unconditionally Secret Key Agreement using Public Discussion, Amin Aminzadeh Gohari, Venkatachalam Anantharam, 15, February, 2007
- Industrial Wireless Systems: Implications for Everyone, Peter Fuhr, 8, February, 2007
- Mobility, Ubiquity and Security, G. Barthe, H. Mantel, P. Muller, A. C. Myers, A. Sabelfeld, February, 2007
- Worst-Case Backgrond Knowledge for Privacy-Preserving Data Publishing, David Martin, Daniel Kifer, Ashwin Machanavajjhala, Johannes Gehrke, Joseph Y. Halpern, International Conference on Data Engineering 2007: 126-135, Cornell University Comuputer Science Department, Cornell, USA, 10, February, 2007
- Low-cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup, Cynthia Kuo, Adrian Perrig, Jesse Walker, Usable Security (USEC), February, 2007
- Catchconv: Symbolic execution and run-time type inference for integer conversion errors, David A Molnar, David Wagner, University of California Berkeley, 2007-23, February, 2007
- Low-cost Manufacturing, Usability, and Security: An Analysis of Bluetooth Simple Pairing and Wi-Fi Protected Setup, Cynthia Kuo, Jesse Walker, Adrian Perrig, Usable Security (USEC), February, 2007
- Locked cookies: Web authentication security against phishing, pharming, and active attacks, Chris Karlof, Umesh Shankar, Barbara Goto, David Wagner, University of California at Berkeley, UCB/EECS-2007-25, February, 2007
- Using Model Based Intrusion Detection for SCADA Networks, Alfonso Valdes, 18, January, 2007
- Taking the long view on the Fourth Amendment: Stored Records and the Sanctity of the Home, Deirdre Mulligan, Jack Lerner, January, 2007
- OASiS: A Programming Framework for Service-Oriented Sensor Networks, Manish Kushwaha, Isaac E Amundson, Xenofon Koutsoukos, Sandeep Neema, Janos Sztipanovits, IEEE/Create-Net COMSWARE 2007, January, 2007
- Hierarchical Dirichlet Processes for Tracking Maneuvering Targets, Emily B. Fox, Erik Sudderth, Alan S. Willsky, Proceedings of the International Conference on Information Fusion, January, 2007
- inTrack: High Precision Tracking of Mobile Sensor Nodes, Brano Kusy, Gyorgy Ballogh, Janos Sallai, Akos Ledeczi, Miklos Maroti, Proc. of the European Conference on Sensor Networks, 51-66, January, 2007
- TRUST Annual Report 2006-2007, Faculty and Staff, Team for Research in Ubiquitous Secure Technology (TRUST), an NSF Science and Technology Center., January, 2007
- Unsupervised Segmentation of Natural Images via Lossy Data Compression, Allen Yang, John Wright, Yi Ma, Shankar Sastry, Computer Vision and Image Understanding, January, 2007
- The Magnificence of the Disaster: Reconstructing the Sony BMG Rootkit Incident, Deirdre Mulligan, Aaron K. Perzanowski, Berkeley Technology Law Journal, 22, 3, 1157, January, 2007
- Noticing notice: a large-scale experiment on the timing of software license agreements, Nathaniel S. Good, Jens Grossklags, Deirdre Mulligan, Joseph A. Konstan, CHI '07: Proceedings of the SIGCHI conference on Human factors in computing systems, ACM, 607--616, January, 2007
- From Weak to Strong Watermarking, Hopper Nicholas, David A Molnar, David Wagner, Theory of Cryptography Conference, International Association for Cryptologic Research, 2007
- Random Access Game over Noisy Channels with Capture Effect, Hazer Inaltekin, Stephen Wicker, ACM/IEEE 10th International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems, 2007
- Event Detection Time Calculations for Mobile Sensor Networks Using First Passage Processes, Hazer Inaltekin, Christina Tavoularis, Stephen Wicker, IEEE Globecom 2007, 2007
- Scalable Multicast Platforms for a New Generation of Robust Distributed Applications, Ken Birman, Mahesh Balakrishnan, Danny Dolev, Tudor Marian, Krzysztof Ostrowski, Amar Phanishayee, Proceedings The Second IEEE/Create-Net/ICST International Conference on Communication System software and Middleware (COMSWARE)., 2007
- Privacy Preservation in Wireless Mesh Network, Taojun Wu, Yuan Xue, Yi Cui, 7, CRC Press LLC, 2007
- • Space-Efficient Identity Based Encryption Without Pairings, D. Boneh, C. Gentry, and M. Hamburg, FOCS, 2007
- Private Web Search., by F. Saint-Jean, A. Johnson, D. Boneh, and J. Feigenbaum, 6th ACM Workshop on Privacy in the Electronic Society, 2007
- • Covert Channels in Privacy-Preserving Identification Systems., D. Bailley, D. Boneh, E. Goh, and A. Juels, 14'th ACM conference on Computer and Communications Security, 2007
- Public Key Encryption That Allows PIR Queries, D. Boneh, E. Kushilevitz, R. Ostrovsky, and W. Skeith, Crypto, 2007
- • Exposing private information by timing web applications, A. Bortz, D. Boneh, and P. Nandy, 16th International Conference on World Wide Web, 2007
- • Cryptographic Methods for Storing Ballots on a Voting Machine, J. Bethencourt, D. Boneh, and B. Waters, 14th Annual Network & Distributed System Security Conference, 2007
- • Conjunctive, subset, and range queries on encrypted data., D. Boneh and B. Waters, TCC'07, LNCS, 2007
- inTrack: High Precision Tracking of Mobile Sensor Nodes, B. Kusy, G.. Balogh, A. Ledeczi, J. Sallai, M. Maroti, 4th European Workshop on Wireless Sensor Networks (EWSN 2007), 2007
- Random Access Games: Selfish Nodes with Incomplete Information, Hazer Inaltekin, Stephen Wicker, IEEE Milcom 2007, 2007
- A Duopoly Pricing Game for Wireless IP Services, Hazer Inaltekin, Tom Wexler, Stephen Wicker, IEEE Secon 2007, 2007
- Privacy Preservation in Wireless Mesh Network, Taojun Wu, Yuan Xue, Yi Cui, Security in Wireless Mesh Network, 2007
- Disruption-Aware Service Composition and Recovery in Dynamic Networking Environments, Shanshan Jiang, Yuan Xue, Douglas Schmidt, Workshop on Automating Service Quality (WRAQS), Co-Located with ASE 2007, 2007
- Time Synchronization Attacks in Sensor Networks, Tanya Roosta, Mike Manzo, Shankar Sastry, Poovendran, Wang, Roy, 30, Springer, 2007
- Solvable Problems in Enterprise Digital Rights Management, Mark Stamp, E. John Sebes, Information Management & Computer Security, 15, 1, 33-45, 2007
- Scalable Multicast Platforms for a New Generation of Robust Distributed Applications, Ken Birman, Mahesh Balakrishnan, Danny Dolev, Tudor Marian, Krzysztof Ostrowski, Amar Phanishayee, Proceedings of The Second International Conference on Communication System software and Middleware (COMSWARE), IEEE/Create-Net/ICST, 2007
- Tracking and coordination of multiple agents using sensor networks: system design, algorithms and experiments, Songhwai Oh, Luca Schenato, Phoebus Chen, Shankar Sastry, Proceedings of the IEEE, 95, 1, 234-254, 2007
- FOCS, D. Boneh, C. Gentry, M. Hamburg, Space-Efficient Identity Based Encryption Without Pairings., 2007
- Reducing Shoulder-surfing by Using Gaze-based Password Entry, M. Kumar, T. Garfinkel, D. Boneh, T. Winograd, Symposium On Usable Privacy and Security (SOUPS), 2007
- Protecting Browsers from DNS Rebinding Attacks., C. Jackson, A. Barth, A. Bortz, W. Shao, D. Boneh, 14'th ACM conference on Computer and Communications Security (CCS), 2007
- Under-constrained execution: making automatic code destruction easy and scalable, Dawson Engler, Daniel Dunbar, International Symposium on Software Testing and Analysis (ISSTA), 2007, 2007
- Communication For Omniscience by a Neutral Observer and Information-Theoretic Key Agreement of Multiple Terminals, Amin Aminzadeh Gohari, Venkatachalam Anantharam, IEEE International Symposium on Information Theory, 2007
- Towards the security and privacy analysis of patient portals, Janos Laszlo Mathe, Sean Duncavage, Jan Werner, Akos Ledeczi, Bradley Malin, Janos Sztipanovits, ACM SIGBED Review, 4, 2, 5, 2007
- Applied Cryptanalysis: Breaking Ciphers in the Real World, Mark Stamp, Richard M. Low, Wiley-Interscience, 2007, 978-0470114865
- Minimum Disruption Service Composition and Recovery over Mobile Ad Hoc Networks, Shanshan Jiang, Yuan Xue, Douglas Schmidt, Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MOBIQUITOUS), 2007
- Throughput Optimization Routing under Uncertain Demand for Wireless Mesh Networks, Liang Dai, Yuan Xue, Bin Chang, Yi Cui, IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), 2007
- Protocol Composition Logic (PCL), Anupam Datta, Ante Derek, John C. Mitchell, Arnab Roy, Electronic Notes in Theoretical Computer Science, 172, 311-358, 2007
Found 190 publications.
Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.