Blue Santa Application 2015: Fill & Download for Free

GET FORM

Download the form

How to Edit Your Blue Santa Application 2015 Online On the Fly

Follow the step-by-step guide to get your Blue Santa Application 2015 edited with ease:

  • Hit the Get Form button on this page.
  • You will go to our PDF editor.
  • Make some changes to your document, like signing, highlighting, and other tools in the top toolbar.
  • Hit the Download button and download your all-set document into you local computer.
Get Form

Download the form

We Are Proud of Letting You Edit Blue Santa Application 2015 With the Best-in-class Technology

Find the Benefit of Our Best PDF Editor for Blue Santa Application 2015

Get Form

Download the form

How to Edit Your Blue Santa Application 2015 Online

If you need to sign a document, you may need to add text, complete the date, and do other editing. CocoDoc makes it very easy to edit your form just in your browser. Let's see how do you make it.

  • Hit the Get Form button on this page.
  • You will go to CocoDoc online PDF editor webpage.
  • When the editor appears, click the tool icon in the top toolbar to edit your form, like highlighting and erasing.
  • To add date, click the Date icon, hold and drag the generated date to the target place.
  • Change the default date by changing the default to another date in the box.
  • Click OK to save your edits and click the Download button when you finish editing.

How to Edit Text for Your Blue Santa Application 2015 with Adobe DC on Windows

Adobe DC on Windows is a useful tool to edit your file on a PC. This is especially useful when you prefer to do work about file edit in your local environment. So, let'get started.

  • Click the Adobe DC app on Windows.
  • Find and click the Edit PDF tool.
  • Click the Select a File button and select a file from you computer.
  • Click a text box to give a slight change the text font, size, and other formats.
  • Select File > Save or File > Save As to confirm the edit to your Blue Santa Application 2015.

How to Edit Your Blue Santa Application 2015 With Adobe Dc on Mac

  • Select a file on you computer and Open it with the Adobe DC for Mac.
  • Navigate to and click Edit PDF from the right position.
  • Edit your form as needed by selecting the tool from the top toolbar.
  • Click the Fill & Sign tool and select the Sign icon in the top toolbar to customize your signature in different ways.
  • Select File > Save to save the changed file.

How to Edit your Blue Santa Application 2015 from G Suite with CocoDoc

Like using G Suite for your work to complete a form? You can do PDF editing in Google Drive with CocoDoc, so you can fill out your PDF just in your favorite workspace.

  • Go to Google Workspace Marketplace, search and install CocoDoc for Google Drive add-on.
  • Go to the Drive, find and right click the form and select Open With.
  • Select the CocoDoc PDF option, and allow your Google account to integrate into CocoDoc in the popup windows.
  • Choose the PDF Editor option to open the CocoDoc PDF editor.
  • Click the tool in the top toolbar to edit your Blue Santa Application 2015 on the specified place, like signing and adding text.
  • Click the Download button to save your form.

PDF Editor FAQ

What are some of the coolest AI startups?

Disclosure: We’ve answered this using information from the Tracxn platform that tracks over 3400 artificial intelligence companies. More such industry insights on the Tracxn blog.Here are some of the top startups in artificial intelligence basis the space they operate:I. Infrastructure: Companies which provide AI as a Service, NLP as a Service, Computer Vision as a Service. These companies provide cloud infrastructure, algorithms, libraries for creating AI based applicationsMachine IntelligenceSentient.ai (2007, San Francisco, $143.78M): Massively scaled AI and deep learningDataRobot (2012, Boston, $111.40M): Machine Learning Platform for Predictive AnalysisVicarious (2010, San Francisco, $72M): Human-level intelligence in vision, language, and motor controlH2O.ai (2011, Mountain View, $30.62M): Scalable Machine learning API for EnterprisesNumenta (2005, Redwood City, $29.60M): Machine Intelligence Software on the Principles of the Neo CortexNatural Language ProcessingMobvoi (2012, Beijing, $256.62M): NLP based voice recognition tool for Chinese LanguageSoundHound (2005, Santa Clara, $115M): Developer of sound recognition based mobile appsUnisound (2012, Beijing, $67.60M): Voice recognition and language processing start-upCogito Corporation (2007, Boston, $22.50M): Caller Behavioural science for sales and serviceVoiceBase (2010, Novato, $20M ): API's for speech recognition and speech analyticsComputer VisionSenseTime (2014, Hong Kong, $190M): Provides deep learning based image recognition solutionsMegvii (2011, Beijing, $145M): Facial recognition technologyClarifai (2013, New York City, $41.25M): Deep learning based image & video recognition API providerCortica (2007, Ramat Gan, $37.90M): Visual search and in-image analyzing technology.Affectiva (2009, Waltham, $34M): Deep learning based emotional state detectionEnabling TechKnuEdge (2005, San Diego, $100M): Voice recognition and Machine intelligence solutionsTrifacta (2012, San Francisco, $76.30M): Self-service data preparation softwarePaxata (2012, Redwood City, $60.99M): Adaptive Data Preparation platformTamr (2012, Cambridge, $41.20M): Automated data cleaning and curationGraphcore (2016, $30M): Machine learning processor for accelerating AI processingII. Applications Enterprise: Companies developing Artificial Intelligence based applications for various functions within an enterpriseBI& AnalyticsPalantir (2004, Palo Alto, $2.32B): Intelligence products to Augment Human Driven AnalysisDataminr (2009, New York City, $175.40M): Social media analyticsAyasdi (2008, Palo Alto, $108.13M): Machine Learning Intelligence Plaform for IndustriesAttivio (2007, Newton, $102M): Data discovery, integration and enterprise searchVoyager Labs (2012, Hod Hasharon, $100M): Cloud-based social media analytics solutionEnterprise SecurityCylance (2012, Irvine, $177M): Machine learning based threat detection solution for endpoint devicesDarktrace (2013, Cambridge, $104.50M): Machine learning based adaptive threat detectionThreatMetrix (2005, San Jose, $92.45M): Fraud prevention & context based authentication solutionCybereason (2012, Tel Aviv, $88.60M): Machine-learning based endpoint threat detection & responseVectra Networks (2009, San Jose, $77.80M): Machine learning & behavioral analytics based on-going threat attack detectionMarketingBloomReach (2009, Mountain View, $97M): Customer Analytics and site optimization Machine Intelligence PlatformNetworked Insights (2006, Madison, $80M): Audience Analytics and Content Marketing platformPersado (2012, New York City, $66M): Marketing Optimization with Machine LearningKahuna (2012, Palo Alto, $58M): Mobile Marketing and Communication AutomationEmarsys (2000, Vienna, $55.30M): B2C marketing personalization platformSalesInsideSales.com (2004, Provo, $251.20M): Cloud based Predictive Lead Management SystemRadius (2009, San Francisco, $132.85M): Predictive Marketing and Sales platformEverString (2012, San Mateo, $78.70M): Predictive Analytics based Sales and Marketing platformLattice (2006, San Mateo, $75M): Lead Scoring and Conversion App for Marketing and SalesConversica (2007, Foster City, $56M): AI based Lead Analytics and engagement platformCustomer ServiceInteractions (2004, Franklin, $159.72M): Automated Omnichannel Customer careClarabridge (2006, Reston, $124.94M): Customer Intelligence PlatformAfiniti (2006, Washington D.C., $100M): afiniti offers Enterprise Behavioral Pairing of callers & agents through applied artificial intelligence technology.CallMiner (2002, Fort Myers, $53.31M): Conversational Analytics Software SolutionsRobotic Process Automation: Companies providing AI-based application for enterprise process automationWorkFusion (2010, New York City, $71.30M): Robotic process automation with workforce orchestration and machine learning in one stackArago (1995, Frankfurt Am Main, $55M): AI based business process automation solutionHyperScience (2013, New York City, $28.88M): AI-based data processing and automationCelaton (2004, Buckingham, $3.95M): Intelligent automation for content processingTextual Analytics Solutions (2004, Bangalore, $250K): Infrastructure for information processing and analysisIII. Applications Industry: Companies developing applications leveraging Artificial Intelligence techniques for different industry verticals.Healthcare & PharmaModernizing Medicine (2010, Boca Raton, $328.74M): Provides specialty-specific EMR with machine learning technologyiCarbonX (2015, Shenzhen, $215.07M): Big Data and AI powered platform to analyze omics data along with phenotypic, social and environmental informationButterfly Network (2011, Guilford, $100M): Ultrasound based low cost, portable imaging devices that use machine learning technologyBenevolent AI (2013, London, $87.70M): AI for Drug discovery and drug developmentFreenome (2014, Palo Alto, $71.30M): Deep learning platform for detecting circulating cancer-related markersFintechKreditech (2012, Hamburg, $281.13M): Personal lending based on big data pointsWeLab (2013, Hong Kong, $180M): Alternate lending solutions for consumersP Omni Prime (2014, Shanghai, $137.80M): Mobile based purchase finance solutionKensho (2010, Cambridge, $108M): Intelligent market researchRetail & EcommerceBlippar (2011, London, $99M): Visual discovery browser using augmented reality and image recognitionTrax (2010, Tel Aviv, $83.60M): Image recognition software.Blue Yonder (2008, Karlsruhe, $75M): Predictive Analytics based on Artificial IntelligenceTwiggle (2013, Tel Aviv, $33M): Improved Product Search and discovery using AIPrism Skylabs (2011, San Francisco, $24M): Video analyticsMobilityZoox (2013, Menlo Park, $290M): Stealth mode robo taxi startupNavya Technology (2014, Paris, $38.50M): Autonomous electric shuttle for mobilitynuTonomy (2013, Massachusetts, $19.60M): Self-driving cars and autonomous robotsCloudMade (2007, London, $16.06M): Connected car solutionsNeurala (2006, Cambridge, $16.24M): Develops software for drone and robot autonomyIV. Applications Consumer: Companies developing AI-enabled applications/systems for consumer use casesIntelligent DevicesRoobo (2014, Beijing, $100M): Developer of intelligent robots, VR and UAVsJibo (2012, Boston, $68.40M): Personal speech recognizing social robotTuring Robot (2011, Beijing, $15.70M): AI robot companyEmotech (2014, London, $10.74M): Personal social robot with an AI-based personality that evolves with timeApplications Consumer ChatbotOzlo (2013, Palo Alto, $14M): Chat based AI assistant botMagic (2015, San Francisco, $12.12M): Provides anything on demand with only SMSMezi (2015, San Francisco, $11.80M): Text based personal shopping assistant and conciergeKasisto (2013, Menlo Park, $11.50M): Conversational AI solutions for mobile applicationsSherpa (2012, Erandio, $8.20M): Personal Assistant and Search Engine through voice commands

What are some startups in the remote temperature monitoring industry?

Disclosure: We’ve answered this using information from the Tracxn platform that tracks over 3,00,000 companies across 230+ sectors. More such industry insights on the Tracxn blog.Below is a list of the most innovative startups in Nigeria:Startups in Remote Temperature Monitoring IndustryVital Connect (2011, Campbell, $65.90M): Biosensor patch for body vitals monitoringBiovotion AG (2011, Zurich, $13.41M): Wearable vital sign monitoringBiobeat (2014, Kadima, $1M): Body vitals monitoring solutionOxehealth (2012, Leeds, $811.61K): Digital video camera-based monitoring of body vitalsPerch (2014, San Francisco, $200K): Smart baby's body vitals monitorallb (2015, Seoul, $28.45K): baby monitoring deviceAmericanPharma Technologies (2011, Boise): Wireless health care storage technologyBaohuquan (2014, Beijing): Infant temperature measurement deviceBempu (2014, Bangalore): Neonatal hypothermia monitoring braceletBlue Maestro (2012, Weybridge): Bluetooth sensors, loggers, and controllersCao Gadget (2010, Irvine): Developer of tags and sensorse-TakesCare (2014, Versailles): Smart app connected thermometerFever Scout (2015, Santa Clara): Continuous temperature monitoring systems for babiesFever Smart (2013, Philadelphia): Wearable patch for temperature monitoring.Fourier Technologies (2011, Rosh Haayin): Developer of data acquisition systemHelyxon (2014, Chennai): Continuous temperature monitoring deviceIdeal Sciences (2013, Salt Lake City): WiFi connected sensors for temperature and humidity measurementiTherm (2013, Barcelona): Bracelet for monitoring kid's body temperatureLifeVit (2015, Barcelona): Suite of smart devices for tracking health parametersLiip Care (2015, Paterna): IoT-based smart baby wearable to track vital signsMonnit (2010, Salt Lake City): Wireless sensing modules, assorted peripherals and softwareBaby Check (2015, Texas City): Wearable sleep and temperature monitoring device for babiesNexxto (2010, Sao Paulo): Develops sensors for monitoring industrial assets and food supply chainPacif-i (2015, Weybridge): Smart Pacifier that monitors baby's temperatureQuantum Data (2016, Kelowna): Develops wireless temperature sensing equipment and sensor probesRaiing (2014, Beijing): App connected thermometer for remote monitoringRebusLabs (2015, Istanbul): Developer of devices for temperature monitoring of refrigerated productsReal Time Logistic Solutions (2010, Tonbridge): End-to-end products to enable IoT applicationsSenonics (2011, Denver): Develops loggers for measuring temperature and relative humiditySensorSwarm (2015, Mendota): Develops wireless temperature monitoringSensor Monitor (2016, Melbourne): Provides a wireless temperature monitoring solutionSwiftSensors (2014, Austin): Developing sensor networks to connect assets to cloudTempTr (2014, Westlake): Wearable and wireless intelligent thermometerThalman Health (2015, San Francisco): Body vitals monitoring wearable deviceAppybaby (2012, Porto): Baby Monitoring SystemVisybl (2015, Germantown): Solution for indoor asset trackingZelcius (2014, Bogota): Real-time monitoring solutions for cold chain applications

What are the latest topics for research papers on cryptography?

You can use any of the research paper as reference for latest topics in Cryptography:Source:Security, Cryptography, and Privacy200 PublicationsAd Injection at Scale: Assessing Deceptive Advertisement ModificationsKurt Thomas, Elie Bursztein, Chris Grier, Grant Ho, Nav Jagpal, Alexandros Kapravelos, Damon McCoy, Antonio Nappa, Vern Paxson, Paul Pearce, Niels Provos, Moheeb Abu RajabProceedings of the IEEE Symposium on Security and Privacy (2015)Adding Third-Party Authentication to Open edX: A Case StudyJohn Cox, Pavel SimakovProceedings of the Second (2015) ACM Conference on Learning @ Scale, ACM, New York, NY, USA, pp. 277-280Framing Dependencies Introduced by Underground CommoditizationKurt Thomas, Danny Huang, David Wang, Elie Bursztein, Chris Grier, Thomas J. Holt, Christopher Kruegel, Damon McCoy, Stefan Savage, Giovanni VignaWorkshop on the Economics of Information Security (2015)GraphSC: Parallel Secure Computation Made EasyKartik Nayak, Xiao S. Wang, Stratis Ioannidis, Udi Weinsberg, Nina Taft, Elaine ShiIEEE Symposium on Security and Privacy, IEEE (2015) (to appear)Improving SSL Warnings: Comprehension and AdherenceAdrienne Porter Felt, Alex Ainslie, Robert W. Reeder, Sunny Consolvo, Somas Thyagaraja, Alan Bettes, Helen Harris, Jeff GrimesProceedings of the Conference on Human Factors and Computing Systems, ACM (2015)Internal Access ControlsGeetanjali SampemaneCommunications of the ACM, vol. 58 (2015), pp. 62-65SAC070 - SSAC Advisory on the Use of Static TLD / Suffix ListsWarren Kumari, Jaap Akkerhuis, Patrik FältströmICANN SSAC Reports and Advisories, ICANN (2015), pp. 32 (to appear)Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at GoogleJoseph Bonneau, Elie Bursztein, Ilan Caron, Rob Jackson, Mike WilliamsonWWW'15 - Proceedings of the 22nd international conference on World Wide Web, ACM (2015)Swapsies on the Internet: First Steps towards Reasoning about Risk and Trust in an Open WorldSophia Drossopoulou, James Noble, Mark S. MillerTenth Workshop on Programming Languages and Analysis for Security (PLAS 2015), ACMThe Correctness-Security Gap in Compiler OptimizationVijay D'Silva, Mathias Payer, Dawn SongSecurity and Privacy Workshops (SPW), 2015 IEEE, IEEE, pp. 73-87The Performance Cost of Shadow Stacks and Stack CanariesThurston H.Y. Dang, Petros Maniatis, David WagnerProceedings of the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS), ACM (2015), pp. 555-566Thwarting Fake OSN Accounts by Predicting their VictimsYazan Boshmaf, Matei Ripeanu, Konstantin Beznosov, Elizeu Santos-NetoAI-Sec'2015, ACM (to appear)Trends and Lessons from Three Years Fighting Malicious ExtensionsNav Jagpal, Eric Dingle, Jean-Philippe Gravel, Panayiotis Mavrommatis, Niels Provos, Moheeb Abu Rajab, Kurt ThomasUSENIX Security Symposium (2015)Understanding Sensitivity by Analyzing AnonymitySai Teja Peddinti, Aleksandra Korolova, Elie Bursztein, Geetanjali SampemaneIEEE Security & Privacy, vol. 13 (2015), pp. 14-21A Language-Based Approach to Secure Quorum ReplicationLantian Zheng, Andrew C. MyersProceedings of the Ninth Workshop on Programming Languages and Analysis for Security (2014), pp. 27-39BeyondCorp: A New Approach to Enterprise SecurityRory Ward, Betsy Beyer;login:, vol. Vol. 39, No. 6 (2014), pp. 6-11Cloak and Swagger: Understanding Data Sensitivity through the Lens of User AnonymitySai Teja Peddinti, Aleksandra Korolova, Elie Bursztein, Geetanjali Sampemane2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014, IEEE Computer Society, pp. 493-508Communities, Random Walks, and Social Sybil Defense.Lorenzo Alvisi, Allen Clement, Alessandro Epasto, Silvio Lattanzi, Alessandro PanconesiInternet Mathematics (2014)Dialing Back Abuse on Phone Verified AccountsKurt Thomas, Dmytro Iatskiv, Elie Bursztein, Tadek Pietraszek, Chris Grier, Damon McCoyProceedings of the 21st ACM Conference on Computer and Communications Security (2014)Dividing secrets to secure data outsourcingFatih Emekci, Ahmed Methwally, Divyakant Agrawal, Amr El AbbadiInformation Sciences, vol. 263 (2014), pp. 198-210Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVMCaroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Úlfar Erlingsson, Luis Lozano, Geoff PikeProceedings of the 23rd Usenix Security Symposium, USENIX, San Diego, CA (2014)Experimenting At Scale With Google Chrome's SSL WarningAdrienne Porter Felt, Robert W. Reeder, Hazim Almuhimedi, Sunny ConsolvoACM CHI Conference on Human Factors in Computing Systems (2014)Handcrafted Fraud and Extortion: Manual Account Hijacking in the WildElie Bursztein, Borbala Benko, Daniel Margolis, Tadek Pietraszek, Andy Archer, Allan Aquino, Andreas Pitsillidis, Stefan SavageIMC '14 Proceedings of the 2014 Conference on Internet Measurement Conference, ACM, 1600 Amphitheatre Parkway, pp. 347-358Helping You Protect YouM. Angela Sasse, Charles C. Palmer, Markus Jakobsson, Sunny Consolvo, Rick Wash, L. Jean CampIEEE (2014), pp. 39-42Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the CloudArnar Birgisson, Joe Gibbs Politz, Úlfar Erlingsson, Ankur Taly, Michael Vrable, Mark LentcznerNetwork and Distributed System Security Symposium, Internet Society (2014)MiniBox: A Two-Way Sandbox for x86 Native CodeYanlin Li, Jonathan McCune, James Newsome, Adrian Perrig, Brandon Baker, Will DrewryProceedings of the Usenix Annual Technical Conference, Usenix (2014)Moving Targets: Security and Rapid-Release in FirefoxSandy Clark, Michael Collis, Matt Blaze, Jonathan M. SmithProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, ACM, New York, NY, pp. 1256-1266RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal ResponseÚlfar Erlingsson, Vasyl Pihur, Aleksandra KorolovaProceedings of the 21st ACM Conference on Computer and Communications Security, ACM, Scottsdale, Arizona (2014) (to appear)RFC7344 - Automating DNSSEC Delegation Trust MaintenanceWarren KumariIETF RFCs, Internet Engineering Task Force (2014)SSAC Advisory on Search List ProcessingWarren Kumari, Jaap Akkerhuis, Don BlumenthalICANN SSAC Reports and Advisories, ICANN (2014), pp. 17Securing the Tangled WebChristoph KernCommunications of the ACM, vol. 57, no. 9 (2014), pp. 38-47The End is Nigh: Generic Solving of Text-based CAPTCHAsElie Bursztein, Jonathan Aigrain, Angelika Moscicki, John C. MitchellWOOT'14 Proceedings of the 8th USENIX conference on Offensive Technologies, Usenix (2014)Tick Tock: Building Browser Red Pills from Timing Side ChannelsGrant Ho, Dan Boneh, Lucas Ballard, Niels Provos8th USENIX Workshop on Offensive Technologies (WOOT 14), USENIX Association (2014)Would a Privacy Fundamentalist Sell Their DNA for $1000...If Nothing Bad Happened as a Result? The Westin Categories, Behavioral Intentions, and ConsequencesAllison Woodruff, Vasyl Pihur, Sunny Consolvo, Lauren Schmidt, Laura Brandimarte, Alessandro AcquistiProceedings of the Symposium On Usable Privacy and Security: SOUPS '14, USENIX (2014)Your Reputation Precedes You: History, Reputation, and the Chrome Malware WarningHazim Almuhimedi, Adrienne Porter Felt, Robert W. Reeder, Sunny ConsolvoProceedings of the Symposium On Usable Privacy and Security: SOUPS '14, USENIX (2014)ZARATHUSTRA: Extracting WebInject Signatures from Banking TrojansClaudio Criscione, Fabio Bosatelli, Stefano Zanero, Federico MaggiTwelfth Annual International Conference on Privacy, Security and Trust, IEEE (2014), pp. 139-148“My religious aunt asked why I was trying to sell her viagra”: Experiences with account hijackingRichard Shay, Iulia Ion, Robert W. Reeder, Sunny ConsolvoProceedings of the SIGCHI Conference on Human Factors in Computing Systems: CHI '14, ACM, New York, NY, USA (2014), pp. 2657-2666Advisory on Internal Name CertificatesWarren Kumari, Steve Crocker, Patrik Fältström, Ondrej Filip, James Galvin, Danny McPherson, Ram Mohan, Doron ShikmoniICANN SSAC Reports and Advisories, ICANN (Internet Corporation for Assigned Names and Numbers) (2013)Alice in Warningland: A Large-Scale Field Study of Browser Security Warning EffectivenessDevdatta Akhawe, Adrienne Porter FeltUSENIX Security Symposium, USENIX (2013)Anti-forensic resilient memory acquisitionJohaness Stuerrgen, Michael CohenDigital Investigation, vol. 10 (2013), S105-S115Authentication at ScaleEric Grosse, Mayank UpadhyayIEEE Security and Privacy, vol. 11 (2013), pp. 15-22CAMP: Content-Agnostic Malware ProtectionMoheeb Abu Rajab, Lucas Ballard, Noe Lutz, Panayiotis Mavrommatis, Niels ProvosNetwork and Distributed Systems Security Symposium (NDSS), Network and Distributed Systems Security Symposium (NDSS), USA (2013)Cross Platform Network Access ControlPaul (Tony) WatsonRVASec 2013, RVASec 2013, RIchmond, VACrowd-Sourced Call Identification and SuppressionDaniel V. Klein, Dean K. JacksonFederal Trade Commission Robocall Challenge (2013)Design, Implementation and Verification of an eXtensible and Modular Hypervisor FrameworkAmit Vasudevan, Sagar Chaki, Limin Jia, Jonathan McCune, James Newsome, Anupam DattaIEEE Symposium on Security and Privacy (2013) (to appear)Distributed Electronic Rights in JavaScriptMark S. Miller, Tom Van Cutsem, Bill TullohESOP'13 22nd European Symposium on Programming, Springer (2013)Hunting in the Enterprise: Forensic Triage and Incident ResponseAndreas Moser, Michael CohenDigital Investigation, vol. 10 (2013), pp. 89-98Identifying and Exploiting Windows Kernel Race Conditions via Memory Access PatternsMateusz Jurczyk, Gynvael ColdwindBochspwn: Exploiting Kernel Race Conditions Found via Memory Access Patterns, The Symposium on Security for Asia Network, 102F Pasir Panjang Road, #08-02, Singapore 118530 (2013), pp. 69Making programs forget: Enforcing Lifetime for Sensitive DataJayanthkumar Kannan, Gautam Altekar, Petros Maniatis, Byung-Gon ChunProceedings of the 13th USENIX conference on Hot topics in operating systems, USENIX Association, Berkeley, CA, USA (2013)Rogue Femtocell Owners: How Mallory Can Monitor My DevicesDavid Malone, Darren F Kavanagh, Niall Richard Murphy2013 Proceedings IEEE INFOCOM, IEEE, New Jersey, USA, pp. 3553-3558S-links: Why distributed security policy requires secure introductionJoseph BonneauWeb 2.0 Security & Privacy 2013, IEEESAC062 - SSAC Advisory Concerning the Mitigation of Name Collision RiskWarren KumariICANN SSAC Reports and Advisories, ICANN (2013)Sok: The Evolution of Sybil Defense via Social NetworksLorenzo Alvisi, Allen Clement, Alessandro Epasto, Silvio Lattanzi, Alessandro Panconesi2013 IEEE Symposium on Security and Privacy, SP 2013Strato: A Retargetable Framework for Low-level Inlined Reference MonitorsBin Zeng, Gang Tan, Úlfar ErlingssonProceedings of the 22nd USENIX Conference on Security, USENIX Association, Berkeley, CA, USA (2013), pp. 369-382The Dangers of Composing Anonymous ChannelsEmilia Kasper, George DanezisInformation Hiding - 14th International Conference, IH 2012, Revised Selected Papers, Springer, Lecture notes in Computer Science (2013), pp. 191-206Trustworthy Proxies: Virtualizing Objects with InvariantsTom Van Cutsem, Mark S. MillerECOOP 2013Verified Boot on Chrome OS and How to do it yourselfSimon GlassEmbedded Linux Conference Europe, Linux Foundation, 660 York Street, Suite 102, San Francisco, CA 94110, USA (2013)Verifying Cloud Services: Present and FutureSara Bouchenak, Gregory Chockler, Hana Chockler, Gabriela Gheorghe, Nuno Santos, Alexander ShraerOperating Systems Review (2013)A taste of Capsicum: practical capabilities for UNIXRobert N. M. Watson, Jonathan Anderson, Ben Laurie, Kris KennawayCommunications of the ACM, vol. 55(3) (2012), pp. 97-104Advisory on Impacts of Content Blocking via the Domain Name SystemWarren Kumari, Alain Aina, Jaap Akkerhuis, Don Blumenthal, KC Claffy, David Conrad, Patrik Fältström, James Galvin, Jason Livingood, Danny McPherson, Ram Mohan, Paul VixieICANN SSAC Reports and Advisories, ICANN (Internet Corporation for Assigned Names and Numbers) (2012)Browser Exploits as a Service: The Monetization of Driveby DownloadsC. Grier, L. Ballard, J. Caballero, N. Chachra, C. Dietrich, K. Levchenko, P. Mavrommatis, D. McCoy, A. Nappa, A. Pitsillidis, N. Provos, Z. Rafique, M. Rajab, C. Rossow, K. Thomas, V. Paxson, S. Savage, G. VoelkerProceedings of 19th ACM Conference on Computer and Communications Security (2012)Cloud Data Protection for the MassesDawn Song, Elaine Shi, Ian Fischer, Umesh ShankarComputer, vol. 45, no. 1 (2012), pp. 39-45Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware TokensAssaf Ben-David, Omer Berkman, Yossi Matias, Sarvar Patel, Cem Paya, Moti YungApplied Cryptography and Network Security - 10th International Conference, ACNS 2012, Springer, pp. 30-47Enhanced multi-factor authenticationLantian ZhengPatent (2012)How well can congestion pricing neutralize denial of service attacks?Ashish Vulimiri, Gul A. Agha, Philip Brighten Godfrey, Karthik LakshminarayananProceedings of the 12th ACM SIGMETRICS/PERFORMANCE joint international conference on Measurement and Modeling of Computer Systems, ACM, New York, NY, USA (2012), pp. 137-150Let's Parse to Prevent PwnageMike Samuel, Úlfar ErlingssonUSENIX workshop on Large-Scale Exploits and Emergent Threats, USENIX (2012)Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity PlatformsAmit Vasudevan, Bryan Parno, Ning Qu, Virgil D. Gligor, Adrian PerrigTRUST 2012, Lecture Notes in Computer Science, pp. 21Manufacturing Compromise: The Emergence of Exploit-as-a-ServiceChris Grier, Lucas Ballard, Juan Caballero, Neha Chachra, Christian J. Dietrich, Kirill Levchenko, Panayiotis Mavrommatis, Damon McCoy, Antonio Nappa, Andreas Pitsillidis, Niels Provos, M. Zubair Rafique, Moheeb Abu Rajab, Christian Rossow, Kurt Thomas, Vern Paxson, Stefan Savage, Geoffrey M. VoelkerProceedings of 19th ACM Conference on Computer and Communications Security (2012)Non-interactive CCA-Secure threshold cryptosystems with adaptive security: new framework and constructionsBenoit Libert, Moti YungProceedings of the 9th international conference on Theory of Cryptography, Springer-Verlag, Berlin, Heidelberg (2012), pp. 75-93Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the WebMichael Dietz, Alexei Czeskis, Dirk Balfanz, Dan Wallach21st USENIX Security Symposium, The USENIX Association (2012), pp. 317-332RFC6583 - Operational Neighbor Discovery ProblemsWarren Kumari, Igor Gashinsky, Yahoo!, Joel Jaeggli, ZyngaIETF RFCs, Internet Engineering Task Force (2012)Robust Trait Composition for JavaScriptTom Van Cutsem, Mark S. MillerScience of Computer Programming: Special Issue on Advances in Dynamic Languages (2012)Scalable group signatures with revocationBenoit Libert, Thomas Peters, Moti YungProceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques, Springer-Verlag, Berlin, Heidelberg (2012), pp. 609-627Security and TestingKurt RosenfeldIntroduction to Hardware Security and Trust, Springer (2012) (to appear)Vanity or Privacy? Social Media as a Facilitator of Privacy and TrustJessica StaddonCSCW Workshop: Reconciling Privacy with Social Media (2012)Address space randomization for mobile devicesHristo Bojinov, Dan Boneh, Rich Cannings, Iliyan MalchevWiSec '11 - Proceedings of the fourth ACM conference on wireless network security, ACM, New York, NY (2011)App Isolation: Get the Security of Multiple Browsers with Just OneEric Y. Chen, Jason Bau, Charles Reis, Adam Barth, Collin Jackson18th ACM Conference on Computer and Communications Security, ACM (2011)Automated Analysis of Security-Critical JavaScript APIsAnkur Taly, Úlfar Erlingsson, John C. Mitchell, Mark S. Miller, Jasvir NagraIEEE Symposium on Security & Privacy (SP), IEEE (2011)Digital Forensics with Open Source ToolsCory Altheide, Harlan CarveySyngress (2011)Distributed forensics and incident response in the enterpriseMichael Cohen, Darren Bilby, Germano CaronniJournal of Digital Investigation, vol. 8 (2011), S101-S110Fast Elliptic Curve Cryptography in OpenSSLEmilia KasperFinancial Cryptography and Data Security: FC 2011 Workshops, RLCPS and WECSR, SpringerHardware Trojan Detection Solutions and Design-for-Trust ChallengesKurt RosenfeldIEEE Computer (2011), pp. 64-72Indirect Content Privacy Surveys: Measuring Privacy Without Asking About ItAlex Braunstein, Laura Granka, Jessica StaddonSymposium on Usable Privacy and Security (SOUPS), ACM SIGCHI (2011)Public vs. Publicized: Content Use Trends and Privacy ExpectationsJessica Staddon, Andrew Swerdlow6th USENIX Workshop on Hot Topics in Security (HotSec '11), USENIX (2011)Rootkits in your web applicationArtur Janc28C3: Chaos Communications Congress, Berlin, Germany (2011)Security Challenges During VLSI TestKurt RosenfeldProceedings of 2011 IEEE NEWCAS Conference, IEEESecurity-Aware SoC Test Access MechanismsKurt RosenfeldProceedings of the 2011 IEEE VLSI Test SymposiumShellOS: Enabling fast detection and forensic analysis of code injection attacksKevin Snow, Srinivas Krishnan, Fabian Monrose, Niels ProvosUSENIX Security Symposium (2011)Third International Symposium on Engineering Secure Software and Systems, ESSoS 2011Úlfar Erlingsson, Roel Wieringa, Nicola Zannone, editors.Springer Verlag, Berlin / HeidelbergTransparency and Choice: Protecting Consumer Privacy in an Online WorldAlma Whitten, Sean Harvey, Ian Fette, Betsy Masiello, Jochen Eisinger, Jane HorvathW3C Workshop on Web Tracking and User Privacy, W3C (2011), pp. 3Automata Evaluation and Text Search Protocols with Simulation Based SecurityCarmit Hazay, Rosario Gennaro, Jeffrey SorensenGoogle, Inc. (2010)Dagstuhl Seminar 09141: Web Application Security (Abstracts collection)Dan Boneh, Úlfar Erlingsson, Martin Johns, Benjamin LivshitsDagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany, Dagstuhl, Germany (2010)Drac: An Architecture for Anonymous Low-Volume CommunicationsGeorge Danezis, Claudia Diaz, Carmela Troncosco, Ben LauriePETS 2010 (to appear)Engineering Privacy in an Age of Information AbundanceBetsy Masiello, Alma WhittenIntelligent Privacy Management Symposium (2010)Group Message AuthenticationBartosz Przydatek, Douglas WikströmSecurity and Cryptography for Networks, SCN 2010, Springer Verlag, pp. 399-417Improving users' security choices on home wireless networksJustin T. Ho, David Dearman, Khai N. TruongProceedings of the Sixth Symposium on Usable Privacy and Security, ACM, New York, NY, USA (2010), 12:1-12:12Large-Scale Automatic Classification of Phishing PagesColin Whittaker, Brian Ryner, Marria NazifNDSS '10 (2010)Making Privacy a Fundamental Component of Web ResourcesThomas Duebendorfer, Christoph Renner, Tyrone Grandison, Michael Maximilien, Mark WeitzelW3C Workshop on Privacy for Advanced Web APIs, W3C (2010), pp. 5Practical Privacy Concerns in a Real World BrowserIan Fette, Jochen EisingerW3C Workshop on Privacy for Advanced Web APIs, W3C (2010), pp. 4Protecting Browsers from Extension VulnerabilitiesAdam Barth, Adrienne Porter Felt, Prateek Saxena, Aaron BoodmanNetwork and Distributed System Security Symposium (2010)PseudoID: Enhancing Privacy in Federated LoginArkajit Dey, Stephen WeisHot Topics in Privacy Enhancing Technologies (2010), pp. 95-107Public-Key Encryption in the Bounded-Retrieval ModelJoel Alwen, Yevgeniy Dodis, Moni Naor, Gil Segev, Shabsi Walfish, Daniel WichsAdvances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010. Proceedings, Springer, pp. 113-134Technology Companies are Best Positioned to Offer Health Record TrustsShirley Gaw, Umesh ShankarHealthSec '10 Position Paper (2010)The Nocebo Effect on the Web: An Analysis of Fake Anti-Virus DistributionMoheeb Abu Rajab, Lucas Ballard, Panayiotis Marvrommatis, Niels Provos, Xin ZhaoLarge-Scale Exploits and Emergent Threats, USENIX (2010)Trustworthy Hardware: Identifying and Classifying Hardware TrojansKurt RosenfeldIEEE Design and Test of Computers (2010), pp. 39-46Universally optimal privacy mechanisms for minimax agentsMangesh Gupte, Mukund SundararajanProc. ACM SIGMOD, ACM, Indianapolis, Indiana (2010), pp. 135-146Using the Wave Protocol to Represent Individuals’ Health RecordsShirley Gaw, Umesh ShankarHealthSec '10 Position Paper (2010)Web Application ObfuscationEduardo Alberto Vela NavaSyngress (2010), pp. 282A New Randomness Extraction Paradigm for Hybrid EncryptionEike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti YungEUROCRYPT '09: Proceedings of the 28th Annual International Conference on Advances in Cryptology, Springer-Verlag, Berlin, Heidelberg (2009), pp. 590-609A Unified Framework for the Analysis of Side-Channel Key Recovery AttacksFrançois-Xavier Standaert, Tal G. Malkin, Moti YungEUROCRYPT '09: Proceedings of the 28th Annual International Conference on Advances in Cryptology, Springer-Verlag, Berlin, Heidelberg (2009), pp. 443-461Balancing Usability and Security in a Video CAPTCHAKurt Alfred Kluever, Richard ZanibbiProceedings of the 5th Symposium on Usable Privacy and Security (SOUPS '09), ACM Press (2009)Browser Security: Lessons from Google ChromeCharles Reis, Adam Barth, Carlos PizanoACM Queue, vol. 7, no. 5 (2009), pp. 3Capacity of Steganographic ChannelsJeremiah Harmsen, William PearlmanIEEE Transactions on Information Theory, vol. 55 (2009), pp. 1775-1792Composability and On-Line Deniability of AuthenticationYevgeniy Dodis, Jonathan Katz, Adam Smith, Shabsi WalfishSpringer, pp. 146-162Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPsDebra L. Cook, Moti Yung, Angelos KeromytisInformation Security and Cryptology, Springer-Verlag, Berlin, Heidelberg (2009), pp. 157-180E Unum Pluribus - Google Network Filtering ManagementPaul (Tony) Watson, Peter MoodyLISA'09 23rd Large Installation System Administration Conference (2009)Efficient Robust Private Set IntersectionDana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti YungACNS '09: Proceedings of the 7th International Conference on Applied Cryptography and Network Security, Springer-Verlag, Berlin, Heidelberg (2009), pp. 125-142Efficient Traceable Signatures in the Standard ModelBenoît Libert, Moti YungPairing '09: Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography, Springer-Verlag, Berlin, Heidelberg (2009), pp. 187-205Efficient and secure authenticated key exchange using weak passwordsJonathan Katz, Rafail Ostrovsky, Moti YungJ. ACM, vol. 57 (2009), pp. 1-39Elastic block ciphers: method, security and instantiationsDebra L. Cook, Moti Yung, Angelos D. KeromytisInt. J. Inf. Secur., vol. 8 (2009), pp. 211-231Expecting the Unexpected: Towards Robust Credential InfrastructureShouhuai Xu, Moti YungFinancial Cryptography and Data Security, Springer-Verlag, Berlin, Heidelberg (2009), pp. 201-221Firefox (In)Security Update Dynamics ExposedStefan Frei, Thomas Duebendorfer, Bernhard PlattnerACM Sigcomm Comput. Commun. Rev., vol. 39 Issue 1 (2009), pp. 16-22Generative usability: security and user centered design beyond the applianceLuke Church, Alma WhittenNew Security Paradigms Workshop (2009)Key Evolution Systems in Untrusted Update EnvironmentsBenoît Libert, Jean-Jacques Quisquater, Moti YungInformation Security and Cryptology, Springer-Verlag, Berlin, Heidelberg (2009), pp. 12-21MAC ReforgeabilityJohn Black, Martin CochranFast Software Encryption, Springer (2009), pp. 345-362On the Portability of Generalized Schnorr ProofsJan Camenisch, Aggelos Kiayias, Moti YungEUROCRYPT '09: Proceedings of the 28th Annual International Conference on Advances in Cryptology, Springer-Verlag, Berlin, Heidelberg (2009), pp. 425-442Plinko: polling with a physical implementation of a noisy channelChris Alexander, Joel Reardon, Ian GoldbergWPES '09: Proceedings of the 8th ACM workshop on Privacy in the electronic society, ACM, New York, NY, USA (2009), pp. 109-112Privacy-Preserving Information Markets for Computing Statistical DataAggelos Kiayias, Bülent Yener, Moti YungFinancial Cryptography and Data Security, Springer-Verlag, Berlin, Heidelberg (2009), pp. 32-50Privacy-preserving indexing of documents on the networkMayank Bawa, Roberto J. Bayardo, Rakesh Agrawal, Jaideep VaidyaThe VLDB Journal, vol. 18 (2009), pp. 837-856Redirects to login pages are bad, or are they?Eric SachsSOUPS '09: Proceedings of the 5th Symposium on Usable Privacy and Security, ACM, New York, NY, USA (2009), pp. 1-1Secure EPC Gen2 Compliant Radio Frequency IdentificationMike Burmester, Breno Medeiros, Jorge Munilla, Alberto PeinadoADHOC-NOW '09: Proceedings of the 8th International Conference on Ad-Hoc, Mobile and Wireless Networks, Springer-Verlag, Berlin, Heidelberg (2009), pp. 227-240Secure Function Collection with Sublinear StorageMaged H. Ibrahim, Aggelos Kiayias, Moti Yung, Hong-Sheng ZhouICALP '09: Proceedings of the 36th Internatilonal Collogquium on Automata, Languages and Programming, Springer-Verlag, Berlin, Heidelberg (2009), pp. 534-545The Goals and Challenges of Click Fraud Penetration Testing SystemsCarmelo Kintana, David Turner, Jia-Yu Pan, Ahmed Metwally, Neil Daswani, Erika Chin, Andrew BortzInternational Symposium on Software Reliability Engineering, International Symposium on Software Reliability Engineering (2009)The Kurosawa-Desmedt key encapsulation is not chosen-ciphertext secureSeung Geol Choi, Javier Herranz, Dennis Hofheinz, Jung Yeon Hwang, Eike Kiltz, Dong Hoon Lee, Moti YungInf. Process. Lett., vol. 109 (2009), pp. 897-901Why Silent Updates Boost SecurityThomas Duebendorfer, Stefan FreiETH Zurich (2009), pp. 1-9xBook: Redesigning Privacy Control in Social Networking PlatformsKapil Singh, Sumeer Bhola, Wenke Lee18th Usenix Security Symposium, Usenix (2009)(Under)mining Privacy in Social NetworksMonica Chew, Dirk Balfanz, Ben LaurieW2SP 2008: Web 2.0 Security and Privacy 2008A block cipher based pseudo random number generator secure against side-channel key recoveryChristophe Petit, François-Xavier Standaert, Olivier Pereira, Tal G. Malkin, Moti YungASIACCS '08: Proceedings of the 2008 ACM symposium on Information, computer and communications security, ACM, New York, NY, USA, pp. 56-65Access ControlBen LaurieGoogle, Inc. (2008)All Your iFrames Point to UsNiels Provos, Panayiotis Mavrommatis, Moheeb Rajab, Fabian Monrose17th USENIX Security Symposium (2008)Anonymous RFID authentication supporting constant cost key lookup against active adversariesM. Burmester, B. De Medeiros, R. MottaInt. J. Appl. Cryptol., vol. 1 (2008), pp. 79-90Asynchronous Multi-Party Computation with Quadratic CommunicationMartin Hirt, Jesper Buus Nielsen, Bartosz PrzydatekInternational Colloquium on Automata, Languages and Programming, ICALP 2008, Springer Verlag, pp. 473-485Choose the Red Pill and the Blue PillBen Laurie, Abe SingerNew Security Paradigms Workshop 2008Competition and Fraud in Online Advertising MarketsBob Mungamuru, Stephen A. WeisFinancial Cryptography (2008)Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution AuthorityDavid Dagon, Chris Lee, Wenke Lee, Niels ProvosProc. 15th Network and Distributed System Security Symposium (NDSS), Internet Society, San Diego, CA (2008)Distributed divide-and-conquer techniques for effective DDoS attack defensesMuthuprasanna Muthusrinivasan, Manimaran GovindarasuIEEE International Conference on Distributed Computing Systems (ICDCS) (2008)Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk)François-Xavier Standaert, Tal G. Malkin, Moti YungICITS '08: Proceedings of the 3rd international conference on Information Theoretic Security, Springer-Verlag, Berlin, Heidelberg (2008), pp. 70-70Efficient Constructions of Composable Commitments and Zero-Knowledge ProofsYevgeniy Dodis, Victor Shoup, Shabsi WalfishProceedings of Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008, pp. 515-535Error-Tolerant Combiners for Oblivious PrimitivesBartosz Przydatek, Jürg WullschlegerInternational Colloquium on Automata, Languages and Programming, ICALP 2008, Springer Verlag, pp. 461-472Fair Traceable Multi-Group SignaturesVicente Benjumea, Seung Geol Choi, Javier Lopez, Moti YungFinancial Cryptography, Springer-Verlag, Berlin, Heidelberg (2008), pp. 231-246Ghost Turns Zombie: Exploring the Life Cycle of Web-based MalwareMichalis Polychronakis, Panayiotis Mavrommatis, Niels ProvosProceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET) (2008)Insecure Context Switching: Innoculating regular expressions for survivabilityWill Drewry, Tavis Ormandy2nd USENIX Workshop on Offensive Technologies (WOOT '08) (2008)Methods for Linear and Differential Cryptanalysis of Elastic Block CiphersDebra L. Cook, Moti Yung, Angelos D. KeromytisACISP '08: Proceedings of the 13th Australasian conference on Information Security and Privacy, Springer-Verlag, Berlin, Heidelberg (2008), pp. 187-202On the Evolution of User Authentication: Non-bilateral FactorsMoti YungInformation Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Springer-Verlag, Berlin, Heidelberg (2008), pp. 5-10Peeking Through the CloudMoheeb Abu Rajab, Fabian Monrose, Andreas Terzis, Niels Provos6th Conference on Applied Cryptography and Network Security (2008)Plan 9 Authentication in LinuxAshwin GantiACM SIGOPS OSR special issue on Research and Developments in the Linux Kernel, vol. 42, Issue 5 (July 2008) (2008)Please Permit Me: Stateless Delegated Authorization in MashupsRagib Hasan, Marianne Winslett, Richard Conlan, Brian Slesinsky, Nandakumar RamaniProceedings of the Annual Computer Security Applications Conference, IEEE Press, Anaheim, CA (2008), pp. 173-182Privacy Preserving Data Mining within Anonymous Credential SystemsAggelos Kiayias, Shouhuai Xu, Moti YungSCN '08: Proceedings of the 6th international conference on Security and Cryptography for Networks, Springer-Verlag, Berlin, Heidelberg (2008), pp. 57-76Provably Secure Grouping-Proofs for RFID TagsMike Burmester, Breno Medeiros, Rossana MottaCARDIS '08: Proceedings of the 8th IFIP WG 8.8/11.2 international conference on Smart Card Research and Advanced Applications, Springer-Verlag, Berlin, Heidelberg (2008), pp. 176-190Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstractAggelos Kiayias, Moti YungDRM '08: Proceedings of the 8th ACM workshop on Digital rights management, ACM, New York, NY, USA (2008), pp. 9-18Real Electronic Cash Versus Academic Electronic Cash Versus Paper Cash (Panel Report)Jon Callas, Yvo Desmedt, Daniel Nagy, Akira Otsuka, Jean-Jacques Quisquater, Moti YungFinancial Cryptography and Data Security, Springer-Verlag, Berlin, Heidelberg (2008), pp. 307-313Securing Nonintrusive Web Encryption through Information FlowLantian Zheng, Andrew C. MyersProceedings of the 2008 workshop on programming languages and analysis for securitySecurity aspects of the Authentication used in Quantum CryptographyJörgen Cederlöf, Jan-Åke LarssonIEEE Transactions on Information Theory, vol. 54 (2008), pp. 1735-1741To Catch a Predator: A Natural Language Approach for Eliciting Protocol InteractionSam Small, Joshua Mason, Fabian Monrose, Niels Provos, Adam Stubblefield17th USENIX Security Symposium (2008)Understanding the Web browser threatStefan Frei, Thomas Duebendorfer, Gunter Ollmann, Martin MayETH ZurichVideo CAPTCHAs: Usability vs. SecurityKurt Alfred Kluever, Richard ZanibbiProceedings of the IEEE Western New York Image Processing Workshop (WNYIP '08), IEEE Press (2008)A Framework for Detection and Measurement of Phishing AttacksSujata Garera, Niels Provos, Monica Chew, Aviel D. RubinWORM'07, ACM, Alexandria, VA (2007)An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized EnvironmentsTavis OrmandyCanSecWest 2007Byzantine Attacks on Anonymity SystemsNikita Borisov, George Danezis, Parisa TabrizDigital Privacy: Theory, Technologies, and Practices (2007)Cyberassault on EstoniaMarc DonnerIEEE Security and Privacy, vol. 5, no. 4 (2007), pp. 4Defining Strong Privacy for RFIDAri Juels, Stephen A. WeisProc. 5th International Conf. on Pervasive Computing and Communications Workshops, IEEE (2007), pp. 342-347Delegating Responsibility in Digital Systems: Horton'sMark S. Miller, Jed Donnelley, Alan H. Karp2nd USENIX Workshop on Hot Topics in Security, USENIX (2007), pp. 5Denial of Service or Denial of Security? How Attacks can Compromize AnonymityNikita Borisov, George Danezis, Prateek Mittal, Parisa TabrizConference on Computer and Communications Security, ACM, Alexandria, VA (2007)Dynamic Pharming Attacks and Locked Same-Origin Policies for Web BrowsersChris Karlof, Umesh Shankar, J. D. Tygar, David WagnerConference on Computer and Communications Security, ACM, Alexandria, VA (2007)Flayer: Exposing Application InternalsWill Drewry, Tavis OrmandyFirst USENIX Workshop on Offensive Technologies (WOOT '07), Online Proceedings, First USENIX Workshop on Offensive Technologies (WOOT '07) (2007)Foundations of Security: What Every Programmer Needs to KnowNeil Daswani, Christoph Kern, Anita KesavanAPress, New York (2007)Memsherlock: An Automated Debugger for Unknown Memory Corruption VulnerabilitiesEmre C. Sezer, Peng Ning, ChongKyung Kil, Jun XuConference on Computer and Communication Security, ACM, Alexandria, VA (2007)Provable Data Possession at Untrusted StoresGiuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, Dawn SongConference on Computer and Communications Security, ACM, Alexandria, VA (2007)Selective DisclosureBen LaurieBen Laurie (2007)The Ghost In The Browser: Analysis of Web-based MalwareNiels Provos, Dean McNamee, Panayiotis Mavrommatis, Ke Wang, Nagendra ModaduguFirst Workshop on Hot Topics in Understanding Botnets (HotBots '07), Online Proceedings, First Workshop on Hot Topics in Understanding Botnets (HotBots '07) (2007)Tradeoffs in Retrofitting Security: An Experience ReportMark S. MillerDynamic Languages Symposium, ACM (2007)Virtual Honeypots: From Botnet Tracking to Intrusion DetectionNiels Provos, Thorsten HolzAddison Wesley (2007)A Method for Making Password-Based Key Exchange Resilient to Server CompromiseCraig Gentry, Philip MacKenzie, Zulfikar RamzanAdvances in Cryptology - CRYPTO 2006, Springer, pp. 142-159Cookies Along Trust-Boundaries (CAT): Accurate and Deployable Flood ProtectionMartin Casado, Aditya Akella, Pei Cao, Niels Provos, Scott ShenkerIn Proceedings of Steps To Reduce Unwated Traffic From The Internet (2006)Flow-Cookies: Using Bandwidth Amplification to Defend Against DDoS Flooding AttacksMartin Casado, Pei Cao, Aditya Akella, Niels ProvosProceedings of the IEEE Workshop on QoS (2006)Language Modeling and Encryption on Packet Switched NetworksKevin S. McCurleyAdvances in Cryptology: Proc. Eurocrypt 2006, Springer, St. Petersburg, pp. 359-372Limits to Anti PhishingJeff Nelson, David JeskeProceedings of the W3c Security and Usability Workshop (2006), pp. 5Packet vaccine: black-box exploit detection and signature generationXiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reiter, Chongkyung Kil, Jong Youl ChoiProc. 13th ACM Conference on Computer and Communications Security, ACM, Alexandria, VA (2006), pp. 37-46Privacy-Enhancing TechnologiesStephen A. WeisIEEE Security and Privacy, vol. 4 (2006), pp. 59Resource Fairness and Composability of Cryptographic ProtocolsJuan Garay, Philip MacKenzie, Manoj Prabhakaran, Ke YangTheory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, Springer, pp. 404-428Search WormsNiels Provos, Joe McClain, Ke WangWORM '06: Proceedings of the 4th ACM workshop on Recurring malcode, ACM Press, Alexandria, Virginia, USA (2006), pp. 1-8A Virtual Honeypot FrameworkNiels ProvosUSENIX Security Symposium (2004), pp. 1-14Cygnus - An Approach for Large Scale Network Security MonitoringPaul (Tony) WatsonSyscan 2004, SingaporeImproving Host Security with System Call PoliciesNiels Provos12th USENIX Security Symposium (2003)Preventing Privilege EscalationNiels Provos, Markus Friedl, Peter Honeyman12th USENIX Security Symposium (2003)Defending Against Statistical SteganalysisNiels Provos10th USENIX Security Symposium (2001)Encrypting Virtual MemoryNiels Provos9th USENIX Security Symposium (2000)A Future-Adaptable Password SchemeNiels Provos, David Mazi{\`e}resUSENIX Annual Technical Conference, FREENIX Track (1999)Cryptography in OpenBSD: An OverviewTheo de Raadt, Niklas Hallqvist, Artur Grabowski, Angelos D. Keromytis, Niels ProvosUSENIX Annual Technical Conference, FREENIX Track (1999)

People Like Us

So far I love everything about eversion. It's very user friendly and I love that I can setup and layout templates to save me time

Justin Miller