Getting Fit for the Future: Optimizing Energy Usage in Existing Buildings by Adding Non-Invasive Sensor Networks. | 0 | 0.34 | 2018 |
Prepose: Privacy, Security, and Reliability for Gesture-Based Programming. | 7 | 0.54 | 2017 |
SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems | 1 | 0.38 | 2015 |
SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser | 11 | 0.65 | 2015 |
SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems. | 0 | 0.34 | 2015 |
Program Boosting: Program Synthesis via Crowd-Sourcing | 10 | 0.59 | 2015 |
Data-Parallel String-Manipulating Programs | 6 | 0.43 | 2015 |
A Framework for Understanding and Designing Telepresence | 25 | 0.98 | 2015 |
Security and privacy for augmented reality systems | 40 | 1.57 | 2014 |
Zero-effort payments: design, deployment, and lessons | 2 | 0.52 | 2014 |
Fast: a transducer-based language for tree manipulation | 15 | 0.67 | 2014 |
World-Driven Access Control for Continuous Sensing | 29 | 1.24 | 2014 |
Operating system support for augmented reality applications | 4 | 0.51 | 2013 |
Enabling fine-grained permissions for augmented reality applications with recognizers | 27 | 1.26 | 2013 |
Billions and billions of constraints: whitebox fuzz testing in production | 27 | 0.99 | 2013 |
Symbolic finite state transducers: algorithms and applications | 57 | 1.61 | 2012 |
SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applications | 46 | 1.55 | 2011 |
Fast and precise sanitizer analysis with BEK | 73 | 2.27 | 2011 |
Enabling security in cloud storage SLAs with CloudProof | 91 | 2.91 | 2011 |
Please Continue to Hold: An Empirical Study on User Tolerance of Security Delays. | 6 | 0.53 | 2010 |
This is your data on drugs: lessons computer security can learn from the drug war | 3 | 0.66 | 2010 |
Dynamic test generation to find integer bugs in x86 binary linux programs | 95 | 3.77 | 2009 |
Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate | 86 | 4.44 | 2009 |
RFID security and privacy: long-term research or short-term tinkering? | 3 | 0.47 | 2008 |
From weak to strong watermarking | 14 | 0.63 | 2007 |
Generic on-line/off-line threshold signatures | 14 | 0.74 | 2006 |
Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract) | 19 | 1.85 | 2006 |
Security and Privacy Issues in E-passports | 126 | 11.89 | 2005 |
Efficient designated confirmer signatures without random oracles or general zero-knowledge proofs | 19 | 0.67 | 2005 |
Privacy for RFID through trusted computing | 17 | 0.85 | 2005 |
The program counter security model: automatic detection and removal of control-flow side channel attacks | 52 | 2.10 | 2005 |
A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags | 125 | 10.35 | 2005 |
An analysis of empirical PMF based tests for least significant bit image steganography | 2 | 0.44 | 2005 |
Privacy and security in library RFID: issues, practices, and architectures | 341 | 26.79 | 2004 |