mortendahl.dk
University | Mostly Photos
http://mortendahl.dk/blog/category/university
University – Mostly Photos. The Little Hobby Blog for Morten Dahl. It’s been a while now since the last post in my little series on. But I’ve finally polished the code for evaluating programmes as I wanted to. Overall, it’s not that different from the. Code of the previous post. In fact, the most challenging aspect is how to enumerate all guesses. Continue reading →. Kalami: Working with the Syntax Tree. While the grammar from the previous post on parsing. Puts some restrictions on the form of a valid.
jbonneau.com
Joseph Bonneau — publications
http://www.jbonneau.com/publications.html
1 650 804 6934. 1 415 436 9333 x132. My thesis work focued on human authentication on the web, though I've also published on social networking privacy, crypto protocols, side-channel attacks, software obfuscation, and reverse engineering. I try to make full text available for all publications accepted into academic conferences and workshops as soon as possible. And Microsoft Academic Search. Pages have bibliometric data and links to citations of my papers. Guessing statistics and metrics. Inproceedings{B...
infosecon.net
USEC '12
http://infosecon.net/usec12
USEC 2013 CFP AVAILABLE. Workshop on Usable Security. Financial Cryptography and Data Security 2012. February 27 - March 2, 2012. Many aspects of data security combine technical and human factors. If a highly secure system is unusable, users will move their data to less secure but more usable systems. Problems with usability are a major contributor to many high-profile security failures today. Sadia Afroz, Drexel University. Ross Anderson, University of Cambridge. Matt Bishop, UC Davis. Tamzen Cannoy, PGP.
infosecon.net
USEC '12
http://infosecon.net/usec12/index.php
USEC 2013 CFP AVAILABLE. Workshop on Usable Security. Financial Cryptography and Data Security 2012. February 27 - March 2, 2012. Many aspects of data security combine technical and human factors. If a highly secure system is unusable, users will move their data to less secure but more usable systems. Problems with usability are a major contributor to many high-profile security failures today. Sadia Afroz, Drexel University. Ross Anderson, University of Cambridge. Matt Bishop, UC Davis. Tamzen Cannoy, PGP.
cs.columbia.edu
Tal Malkin
http://www.cs.columbia.edu/~tal
Department of Computer Science. 1214 Amsterdam Avenue MC 0401. New York, NY 10027-7003, USA. Email: tal at cs dot columbia dot edu. My research interests are in cryptography, complexity theory, security, and related areas. My focus is developing sound mathematical foundations for applications requiring security and privacy. I head the Cryptography Lab. Which is in the intersection of the Theory Group. And the Systems Security Center. BiTR: Built-in Tamper Resilience. Asiacrypt 2011, to appear. Tal Malkin...