Emergent Properties & Security: The Complexity ofSecurity as a Science | 1 | 0.35 | 2014 |
GPU and CPU parallelization of honest-but-curious secure two-party computation | 16 | 0.63 | 2013 |
Android provenance: diagnosing device disorders | 1 | 0.36 | 2013 |
The smuggling theory approach to organized digital crime. | 5 | 0.47 | 2011 |
Pythia: a privacy aware, peer-to-peer network for social search | 7 | 0.47 | 2011 |
Why mobile-to-mobile wireless malware won't cause a storm | 3 | 0.42 | 2011 |
Mobile location tracking in metro areas: malnets and others | 26 | 1.54 | 2010 |