Reliably Erasing Data From Flash-Based Solid State Drives
Skype Morph
Trafficking fraudulent accounts : the role of the underground market in twitter spam and abuse - 2013 - Usenix
Network-Level Spam and Scam Defenses Nick Feamster Georgia Tech with Anirudh Ramachandran, Shuang Hao, Maria Konte Alex Gray, Sven Krasser, Santosh Vempala,
Quid-Pro-Quo-tocols Strengthening Semi-Honest Protocols with Dual Execution Yan Huang 1, Jonathan Katz 2, David Evans 1 1. University of Virginia 2. University.
1 Practical Cryptographic Secure Computation David Evans University of Virginia DHOSA MURI.
Automatic Inference and Enforcement of Kernel Data Structure Invariants Arati Baliga, Vinod Ganapathy and Liviu Iftode Department of Computer Science Rutgers.
Leakage- Resilient Cryptography: Recent Advances Research Exam May 20, 2010 Petros Mol 1.
VDG 12/5/2003 1 On the Prevention of Service Flooding in the Internet Virgil D. Gligor [email protected] Electrical and Computer Engineering Department University.
Ethnographic Fieldwork at a University IT Security Office Xinming (Simon) Ou Kansas State University Joint work with John McHugh, S. Raj Rajagopalan, Sathya.
The Yin-Yang of Web Authentication
Putting a Fork in Fork (Linux Process and Memory Management)