Abstract is missing.
- Popularity Is Everything: A New Approach to Protecting Passwords from Statistical-Guessing AttacksStuart E. Schechter, Cormac Herley, Michael Mitzenmacher. [doi]
- Scalable Anonymous Communication with Provable SecurityPrateek Mittal, Nikita Borisov, Carmela Troncoso, Alfredo Rial. [doi]
- Scalable Web Object Inspection and Malfease CollectionCharalampos Andrianakis, Paul Seymer, Angelos Stavrou. [doi]
- Moving from Logical Sharing of Guest OS to Physical Sharing of Deduplication on Virtual MachineKuniyasu Suzaki, Toshiki Yagi, Kengo Iijima, Anh-Quynh Nguyen, Cyrille Artho, Yoshihito Watanebe. [doi]
- Visual Security Policy for the WebTerri Oda, Anil Somayaji. [doi]
- Retroactive Detection of Malware with Applications to Mobile PlatformsMarkus Jakobsson, Karl-Anders Johansson. [doi]
- Embedded Firmware Diversity for Smart Electric MetersStephen E. McLaughlin, Dmitry Podkuiko, Adam Delozier, Sergei Miadzvezhanka, Patrick McDaniel. [doi]
- Challenges in Access Right Assignment for Secure Home NetworksTiffany Hyun-Jin Kim, Lujo Bauer, James Newsome, Adrian Perrig, Jesse Walker. [doi]
- Cybercasing the Joint: On the Privacy Implications of Geo-TaggingGerald Friedland, Robin Sommer. [doi]
- On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud ComputingMarten van Dijk, Ari Juels. [doi]
- Evading Cellular Data Monitoring with Human Movement NetworksAdam J. Aviv, Micah Sherr, Matt Blaze, Jonathan M. Smith. [doi]