Security and Privacy       

links

Security and Privacy Publications



2013

Panel on granularity in access control
Ian Molloy, Mahesh V. Tripunitara, Volkmar Lotz, Martin Kuhlmann, Casey Schaufler, Vijay Atluri
SACMAT, pp. 85-86, 2013

A bigData platform for analytics on access control policies and logs
Suresh Chari, Ted Habeck, Ian Molloy, Youngja Park, Wilfried Teiken
SACMAT, pp. 185-188, 2013

Ensuring continuous compliance through reconciling policy with usage
Suresh Chari, Ian Molloy, Youngja Park, Wilfried Teiken
SACMAT, pp. 49-60, 2013


2012

Enhancing Javascript with Transactions
Mohan Dhawan, Chung-chieh Shan, Vinod Ganapathy
26th European Conference on Object-Oriented Programming (ECOOP'12), pp. 383--408, Springer, 2012

Fathom: A Browser-based Network Measurement Platform
Mohan Dhawan, Justin Samuel, Renata Teixeira, Christian Kreibich, Mark Allman, Nicholas Weaver, Vern Paxson
12th ACM Conference on Internet Measurement Conference (IMC'12), pp. 73--86, 2012

Priv3: A Third Party Cookie Policy
Mohan Dhawan, Christian Kreibich, Nicholas Weaver
W3C Workshop: Do Not Track and Beyond, 2012

An Analysis of the Mozilla Jetpack Extension Framework
Rezwana Karim, Mohan Dhawan, Vinod Ganapathy, Chung-chieh Shan
26th European Conference on Object-Oriented Programming (ECOOP'12), pp. 333--355, Springer, 2012

Using probabilistic generative models for ranking risks of Android apps
Hao Peng, Christopher S. Gates, Bhaskar Pratim Sarma, Ninghui Li, Yuan Qi, Rahul Potharaju, Cristina Nita-Rotaru, Ian Molloy
ACM Conference on Computer and Communications Security, pp. 241-252, 2012

Android Permissions: A Perspective Combining Risks and Benefits
B. Sarma, N. Li, C. Gates, R. Potharaju, C. Nita-Rotaru, I. Molloy
ACM Symposium on Access Control Models and Technologies (SACMAT), 2012

Generative Models for Access Control Policies: Applications to Role Mining Over Logs with Attribution
Ian Molloy, Youngja Park, and Suresh Chari.
ACM Symposium on Access Control Models and Technologies (SACMAT), 2012

Slicing: A New Approach for Privacy Preserving Data Publishing
Tiancheng Li, Ninghui Li, Jian Zhang, Ian Molloy
IEEE Trans. Knowl. Data Eng. 24(3), 561--574, 2012

Learning Stochastic Models of Information Flow
Luke Dickens, Ian Molloy, Jorge Lobo, Pau-Chen Cheng, Alessandra Russo
Proceedings of the 28th IEEE International Conference on Data Engineering (ICDE), 2012

Risk-Based Security Decisions Under Uncertainty
Ian Molloy, Luke Dickens, Charles Morisset, Pau-Chen Cheng, Jorge Lobo, Alessandra Russo
Proceedings of the Second ACM Conference on Data and Application Security and Privacy (CODASPY), 2012

Biometric Authentication on a Mobile Device: A Study of User Effort, Error and Task Disruption
Shari Trewin, Cal Swart, Larry Koved, Jacquelyn Martino, Kapil Singh, Shay Ben-David
Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC), 2012

Limitations of Generating a Secret Key Using Wireless Fading Under Active Adversary
M. Zafer, D. Agrawal, M. Srivatsa
IEEE/ACM Transactions on Networking, IEEE, 2012

The Impact of TLS on SIP Server Performance: Measurement and Modeling
Charles Shen and Erich Nahum and Henning Schulzrinne and Charles P. Wright
IEEE/ACM Transactions on Networking 20(4), IEEE, 2012


Biometric authentication on a mobile device: a study of user effort, error and task disruption
Shari Trewin, Calvin Swart, Larry Koved, Jacquelyn Martino, Kapil Singh, Shay Ben-David
28th Annual Computer Security Applications Conference, ACSAC 2012, ACSA
Abstract


2011

Atlantis: Robust, Extensible Execution Environments for Web Applications
James Mickens, Mohan Dhawan
23rd ACM Symposium on Operating Systems Principles (SOSP'11), pp. 217--231, 2011

Adversaries' Holy Grail: access control analytics
I Molloy, J Lobo, S Chari
Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp. 54--61, 2011

Attack on the GridCode one-time password
I Molloy, N Li
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 306--315, 2011

Data Kindness on the Internet
Christan Grant, Tyrone Grandison, Kun Liu
Richard Tapia Celebration of Diversity in Computing Conference., 2011

A Global Virtual Machine Attribute Access Control Policy for Auditing Federated Digital Identities within a Compute Cloud
Sean Thorpe, Indrajit Ray, Indrakshi Ray, Tyrone Grandison, Abbie Barbir
International Journal of Information Assurance and Security (JIAS)6, 2011

Enabling Security Uniformly Across Cloud Systems
Sean Thorpe, Indrajit Ray, Tyrone Grandison
ACM ASPLOS (Architectural Support for Programming Languages and Operating Systems) RESOLVE (Runtime Environments/Systems, Layering, and Virtualized Environments), ACM Press, 2011

PCTA: Privacy-constrained Clustering-based Transaction Data Anonymization
A. Gkoulalas-Divanis, G. Loukides
4th International Workshop on Privacy and Anonymity in the Information Society, pp. 5, ACM, 2011

Lessons Learned Building the Caernarvon High-Assurance Smart Card Operating System
P A Karger, S K McIntosh, E R Palmer, D C Toll, S M Weber
IEEE Security and Privacy pp. 99, 1--1, IEEE, 2011


2010

The Case for JavaScript Transactions: Position Paper
Mohan Dhawan, Chung-chieh Shan, Vinod Ganapathy
5th ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (PLAS'10), pp. 6, 2010

Towards an Integrated Approach to Role Engineering
Chris Giblin, Marcel Graf, Gunter Karjoth, Andreas Wespi, Ian Molloy, Jorge Lobo, Seraphin Calo
2nd ACM Workshop on Assurable & Usable Security Configuration (SafeConfig), 2010

Mining roles with noisy data
I Molloy, N Li, Y A Qi, J Lobo, L Dickens
Proceeding of the 15th ACM symposium on Access control models and technologies, pp. 45--54, ACM, 2010

Towards an integrated approach to role engineering
C Giblin, M Graf, G Karjoth, A Wespi, I Molloy, J Lobo, S Calo
Proceedings of the 3rd ACM workshop on Assurable and usable security configuration, pp. 63--70, 2010

METHOD AND SYSTEM FOR HARDWARE BASED PROGRAM FLOW MONITOR FOR EMBEDDED SOFTWARE
S McIntosh, D Brand, M Kaplan, P A Karger, M G McIntosh, E R Palmer, A M Paradkar, D Toll, S M Weber
US Patent US7861305B2
Abstract

Lessons Learned Building the Caernarvon High-Assurance Operating System
P Karger, S McIntosh, E Palmer, D Toll, S Weber
IEEE Security and Privacy, 22--30, IEEE Computer Society, 2010

A Declarative Framework for Intrusion Analysis
Matthew Fredrikson, Mihai Christodorescu, Jonathon Giffin, Somesh Jha
Cyber Situational Awareness, 179--200, Springer, 2010

Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors
Matt Fredrikson, Somesh Jha, Mihai Christodorescu, Reiner Sailer, Xifeng Yan
IEEE Symposium on Security and Privacy, pp. 45-60, 2010

AccessMiner: Using System-Centric Models for Malware Protection
Andrea Lanzi, Davide Balzarotti, Christopher Kruegel, Mihai Christodorescu, Engin Kirda
ACM Conference on Computer and Communications Security, pp. 399-412, ACM, 2010
Abstract

Almost optimal bounds for direct product threshold theorem
C Jutla
Theory of Cryptography, 37--51, Springer, 2010

Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation
Suresh Chari, Shai Halevi, Wietse Venema
17th Annual Network and Distributed System Security Symposium (NDSS), 2010

Cryptographic Extraction and Key Derivation: The HKDF Scheme
Hugo Krawczyk
2010
\urlhttp://eprint.iacr.org/2010/264

One-Pass HMQV and Asymmetric Key-Wrapping
Shai Halevi, Hugo Krawczyk
2010
\urlhttp://eprint.iacr.org/2010/638

i-hop homomorphic encryption and rerandomizable Yao circuits
C Gentry, S Halevi, V Vaikuntanathan
Advances in Cryptology--CRYPTO 2010, 155--172, Springer

Toward basing fully homomorphic encryption on worst-case hardness
C Gentry
Advances in Cryptology--CRYPTO 2010, 116--137, Springer


Computing arbitrary functions of encrypted data
C Gentry
Communications of the ACM 53(3), 97--105, ACM, 2010

A simple BGN-type cryptosystem from LWE
C Gentry, S Halevi, V Vaikuntanathan
Advances in Cryptology--EUROCRYPT 2010, 506--522, Springer

Fully homomorphic encryption over the integers
M Van Dijk, C Gentry, S Halevi, V Vaikuntanathan
Advances in Cryptology--EUROCRYPT 2010, 24--43, Springer

Security for Signcryption: The Two-User Model
J H An, T Rabin
Practical Signcryption, 21--42, Springer, 2010

Designing a side channel resistant random number generator
S Chari, V Diluoffo, P Karger, E Palmer, T Rabin, J Rao, P Rohotgi, H Scherzer, M Steiner, D Toll
Smart Card Research and Advanced Application, 49--64, Springer, 2010

Protecting circuits from leakage: The computationally-bounded and noisy cases
S Faust, T Rabin, L Reyzin, E Tromer, V Vaikuntanathan
Advances in Cryptology--EUROCRYPT 2010, 135--156, Springer

A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack
Y Desmedt, R Gennaro, K Kurosawa, V Shoup
Journal of cryptology 23(1), 91--120, Springer, 2010

Constructing certificateless encryption and id-based encryption from id-based key agreement
D Fiore, R Gennaro, N Smart
4th International Conference,, pp. 167--186, Springer, 2010

Identity-based key exchange protocols without pairings
D Fiore, R Gennaro
Transactions on computational science X, 42--77, Springer, 2010

Text search protocols with simulation based security
R Gennaro, C Hazay, J Sorensen
Public Key Cryptography--PKC 2010, 332--350, Springer

Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead"
R Gennaro, H Krawczyk, T Rabin
Applied Cryptography and Network Security: 8th International Conference, ACNS 2010, , pp. 309

Making the Diffie-Hellman protocol identity-based
D Fiore, R Gennaro
Topics in Cryptology-CT-RSA 2010, 165--178, Springer

Non-interactive verifiable computing: Outsourcing computation to untrusted workers
R Gennaro, C Gentry, B Parno
Advances in Cryptology--CRYPTO 2010, 465--482, Springer

The Impact of TLS on SIP Server Performance
C. Shen, E. Nahum, H. Schulzrinne, C.P. Wright
IPTComm 2010: Principles, Systems and Applications of IP Telecommunications, pp. 59--70, Springer

Social-Aware Data Diffusion in Delay Tolerant MANETs
Y Zhang, W Gao, G Cao, T La Porta, B Krishnamachari, A Iyengar
Technical Report, 2010

Providing K-Anonymity in Location Based Services
A Gkoulalas-Divanis, P Kalnis, and V S Verykios
ACM SIGKDD Explorations 12(1), 3--10, ACM, 2010

Towards a Formal Definition of a Computing Cloud
Tyrone Grandison, E Michael Maximilien, Sean Thorpe, Alfredo Alba
The IEEE World Congress on Services (SERVICES), pp. 191--192, 2010

Making Privacy a Fundamental Component of Web Resources
Thomas Duebendorfer, Christoph Renner, Tyrone Grandison, Michael Maximilien, Mark Weitzel
W3C Workshop on Privacy for Advanced Web APIs, 2010

There's Something Stuck In My Shoe
Koved, Larry
Security & Privacy Usability Technology Transfer: Emerging Research (SPUTTER) Workshop, Carnegie Mellon CyLab and Microsoft, 2010

Physical layer enhanced wireless secret key exchange
C. Capar, M. Zafer, D. Goeckel, D. Towsley, D. Agrawal
Annual conference of ITA, 2010

Checkpointing virtual machines against transient errors
L Wang, Z Kalbarczyk, R K Iyer, A Iyengar
On-Line Testing Symposium (IOLTS), 2010 IEEE 16th International, pp. 97--102

HIPAA Compliance and Patient Privacy Protection
T Grandison, R Bhatti
13th World Congress on Medical and Health Informatics (MEDINFO), Citeseer, 2010

Privacy for Healthcare Social Networks
E M Maximilien, T Grandison
13th World Congress on Medical and Health Informatics (MEDINFO), Citeseer, 2010

Hardware Based Mandatory Access Control
W E Hall, G H D Hunt, P A Karger, M F Mergen, D R Safford, D C Toll
2010 - freepatentsonline.com

ROADTRACK: Scaling Location Updates for Mobile Clients on Road Networks with Query Awareness
P Pesti, L Liu, B Bamba, A Iyengar, M Weber
Proceedings of the VLDB Endowment 3(2), 2010

Exploiting cryptography for privacy-enhanced access control
Claudio A.~Ardagna, Jan Camenisch, Markulf Kohlweiss, Ronald Leenes, Gregory Neven, Bart Priem, Pierangela Samarati, Dieter Sommer, Mario Verdicchio
Journal of Computer Security 18(1), 123--160, 2010

Robust Encryption
Michel Abdalla, Mihir Bellare, Gregory Neven
7th Theory of Cryptography Conference, Springer-Verlag, 2010

Scalable integrity monitoring in virtualized environments
Kenneth Goldman, Reiner Sailer, Dimitrios Pendarakis, Deepa Srinivasan
Proceedings of the fifth ACM workshop on Scalable trusted computing, pp. 73--78, 2010

Evaluation of a just-in-time compiler retrofitted for PHP
Michiaki Tatsubori, Akihiko Tozawa, Toyotaro Suzumura, Scott Trent, Tamiya Onodera
Proceedings of the 6th International Conference on Virtual Execution Environments, VEE 2010, Pittsburgh, Pennsylvania, USA, March 17-19, 2010, pp. 121--132

Implementing a High-Assurance Smart-Card OS
P Karger, D Toll, E Palmer, S McIntosh, S Weber, J Edwards
Financial Cryptography and Data Security, 51--65, Springer, 2010

Anonymization of Electronic Medical Records for Validating Genome-Wide Association Studies
G Loukides, A Gkoulalas-Divanis, B Malin
Proceedings of the National Academy of Sciences 107(17), 7898, National Acad Sciences, 2010


2009

Analyzing Information Flow in JavaScript-based Browser Extensions
Mohan Dhawan, Vinod Ganapathy
25th AnnualComputer Security Applications Conference (ACSAC'09), pp. 382--391, 2009

Evaluating Role Mining Algorithms
Ian Molloy and Ninghui Li and Tiancheng Li and Ziqing Mao and Qihua Wang and Jorge Lobo
Proceedings of the Fourteenth ACM Symposium on Access Control Models and Technologies (SACMAT'09), 2009

Evaluating role mining algorithms
I Molloy, N Li, T Li, Z Mao, Q Wang, J Lobo
Proceedings of the 14th ACM symposium on Access control models and technologies, pp. 95--104, 2009

Defeating cross-site request forgery attacks with browser-enforced authenticity protection
Z Mao, N Li, I Molloy
Financial Cryptography and Data Security, 238--255, Springer, 2009


Slicing: A New Approach for Privacy Preserving Data Publishing
T Li, N Li, J Zhang, I Molloy
Knowledge and Data Engineering, IEEE Transactions on pp. 99, 1--1, IEEE, 2009

Using Recommenders for Discretionary Access Control
Suresh Chari, Larry Koved, and Mary Ellen Zurko
Web 2.0 Security and Privacy, 2009


Stealthy Deployment and Execution of In-Guest Kernel Agents
T. Chiueh, M. Conover, M. Lu, B. Montague
Proc. of The Black Hat, USA, 2009

Method, Apparatus and System for Resistance to Side Channel Attacks on Random Number Generators
S N Chari, V V Diluoffo, P A Karger, E R Palmer, T Rabin, J R Rao, P Rohatgi, H Scherzer, M Steiner, D C Toll
US Patent US7496616B2
Abstract

A Note on Information-theoretic Secret Key Exchange over Wireless Channels
M. Zafer, D. Agrawal, and M. Srivatsa
47th Annual Allerton Conference on Communication, Control and Computing, 2009

Secure Network Coding Over the Integers
Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin
2009
\urlhttp://eprint.iacr.org/2009/569


2008

Enforcing Authorization Policies using Transactional Memory Introspection
Arnar Birgisson, Mohan Dhawan, Ulfar Erlingsson, Vinod Ganapathy, Liviu Iftode
15th ACM Conference on Computer and Communications Security (CCS'08), pp. 223--234, 2008

Mining Roles with Semantic Meanings
Ian Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin Calo, Jorge Lobo
Proceedings of the Thirteenth ACM Symposium on Access Control Models and Technologies (SACMAT'08), 2008

Trading in Risk: Using Markets to Improve Access Control
Ian Molloy, Pau-Chen Cheng, Pankaj Rohatgi
Proceedings of the Fifteenth New Security Paradigms Workshop (NSPW'08), 2008

Mining roles with semantic meanings
I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino, S Calo, J Lobo
Proceedings of the 13th ACM symposium on Access control models and technologies, pp. 21--30, 2008

Secure Delegation for Web 2.0 and Mashups
P.Austel S. Bhola, S. Chari, L. Koved, M. McIntosh, M. Steiner, S. Weber
Web 2.0 Security and Privacy, Citeseer, 2008

Secure Delegation for Web 2.0 and Mashups
S Chari, L Koved, M Mcintosh, M Steiner, S Weber
W2SP 2008: Web 2.0 Security and Privacy

SWORD4J: Security WORkbench Development environment 4 Java
Ted Habeck; Larry Koved; Marco Pistoia
IBM Research Report RC24554, P.O. Box 704, Yorktown Heights, NY 10598, IBM T. J. Watson Research Center, 2008

The Caernarvon secure embedded operating system
D C Toll, P A Karger, E R Palmer, S K McIntosh, S Weber
ACM SIGOPS Operating Systems Review 42(1), 32--39, ACM, 2008

Tooling in support of Common Criteria evaluation of a high assurance operating system
DC Toll, S Weber, PA Karger, ER Palmer, SK McIntosh
IBM Thomas J. Watson Research Center Report, 2008

The Feasibility of Automated Feedback-Directed Specification-Based Test Generation: A Case Study of a High-Assurance Operating System
S Weber, A Paradkar, S K McIntosh, D C Toll, P A Karger, M Kaplan, E R Palmer
19th International Symposium on Software Reliability Engineering, pp. 229--238, 2008


Design of a Secure Smart Card Operating System for Pervasive Applications
P A Karger, D C Toll, E R Palmer, S K McIntosh, S M Weber
Technical Report RC 24687, 2008

Designing a Secure Smart Card Operating System
P A Karger, D C Toll, E R Palmer, S K McIntosh, S M Weber
Technical Report RC 24531, 2008


2007

Secure Distributed Key Generation for Discrete-Log Based Cryptosystems
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
Journal of Cryptology 20(1), 51--83, Springer, Heidelberg, Germany, 2007


Dynamic virtual credit card numbers
I Molloy, J Li, N Li
Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security, pp. 208--223, 2007

Cryptographic strength of SSL/TLS servers: Current and recent practices
H K Lee, T Malkin, E Nahum
Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, pp. 83--92, 2007

Used trusted co-servers to enhance security of web interaction
D M Chess, J Dyer, N Itoi, J Kravitz, E R Palmer, R Perez, S W Smith, others
US Patent US7194759B1
Abstract


2006

The case for analysis preserving language transformation
X Zhang, L Koved, M Pistoia, S Weber, T Jaeger, G Marceau, L Zeng
Proceedings of the 2006 international symposium on Software testing and analysis, pp. 202, ACM
Abstract


2005

Interprocedural analysis for privileged code placement and tainted variable detection
M. Pistoia, R. Flynn, L. Koved, V. Sreedhar
ECOOP 2005-Object-Oriented Programming, 734--734, Springer

System and method to grant or refuse access to a system
H Scherzer, E Palmer
US Patent App. 11/274,619


2004

Experiences with Building Security Checking and Understanding Tool
T Habeck, L Koved, O Marquez, VC Sreedhar, M Steiner, W Venema, S Weber
domino.research.ibm.com, IBM Research, 2004

Applying Static Analysis to Verifying Security Properties
X Zhang, T Jaegert, L Koved
Proceedings of the 2004 Grace Hopper Celebration of Women in Computing Conference

Enterprise Java 2 Security: Building Secure and Robust J2EE Applications
M Pistoia, N Nagaratnam, L Koved, A Nadalin
2004 - portal.acm.org, Addison Wesley Longman Publishing Co., Inc. Redwood City, CA, USA
Abstract

Detecting Unwanted Synchronization in Java Programs
Leeman, G., Kershenbaum, A., Koved, L., and Reimer, D.
Software Engineering and Applications (SEA 2004). Sponsored by International Association of Science and Technology for Development (IASTED)., MIT

Enterprise Java ™ Security: Building Secure and Robust J2EE Applications
M. Pistoia, N. Nagaratnam, L. Koved, A. Nadalin
2004 - books.google.com, Addison-Wesley Professional


2003

Template attacks
Suresh Chari, Josyula R Rao, Pankaj Rohatgi
Cryptographic Hardware and Embedded Systems-CHES 2002, pp. 13--28, Springer, 2003

Authenticated electronic coupon issuing and redemption
C C Palmer, E R Palmer, S W Smith
US Patent 6,505,773, European Patent EP1068581B1, Germany Patent DE69902454D1
Abstract

Method and system for processing electronic documents
M Anderson, F Jaffe, C Hibbert, J Virkki, J Kravitz, S Chang, E Palmer, others
US Patent 6,609,200
Abstract


2002

Access rights analysis for Java
L. Koved, M. Pistoia, A. Kershenbaum
ACM SIGPLAN Notices, pp. 359--372, ACM, 2002

User authentication and authorization in the Java platform
C Lai, L Gong, L Koved, A Nadalin, R Schemers
Computer Security Applications Conference, 1999, pp. 285--290, 2002

METHOD AND APPARATUS FOR COLLECTING INFORMATION ASSOCIATED WITH MOVEMENT BETWEEN LOCATIONS
Lawrence E Ashery, Kenneth Alan Goldman, Elaine Rivette Palmer, Pankaj Rohatgi, Sean William Smith
European Patent EP1076872B1, Germany Patent DE69903805D1
Abstract

Vehicle customization, restriction, and data logging
Kenneth Alan Goldman, Charles Campbell Palmer, Elaine Rivette Palmer
US Patent 6,430,488
Abstract


2001

Security challenges for Enterprise Java in an e-business environment
L Koved, A Nadalin, N Nagaratnam, M Pistoia, T Shrader
IBM Systems Journal 40(1), 130--152, International Business Machines, 2001


1999

Towards sound approaches to counteract power-analysis attacks
Suresh Chari, Charanjit S Jutla, Josyula R Rao, Pankaj Rohatgi
Advances in Cryptology—CRYPTO’99, pp. 398--412, 1999

Adaptive Security for Threshold Cryptosystems
Ran Canetti, Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
Advances in Cryptology -- CRYPTO" "'99, pp. 98--115, springer, 1999

Secure hash-and-sign signatures without the random oracle
Rosario Gennaro, Shai Halevi, Tal Rabin
Advances in Cryptology—EUROCRYPT’99, pp. 123--139, 1999

Identification bracelet for child and guardian matching
J K Kravitz, E R Palmer
US Patent 5,978,493
Abstract


1998

Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
Rosario Gennaro, Michael O Rabin, Tal Rabin
Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing, pp. 101--111, 1998

The evolution of Java security
L Koved, AJ Nadalin, D Neal, T Lawson
IBM Systems Journal 37(3), 349-364, International Business Machines Corporation, 1998

Using a high-performance, programmable secure coprocessor
S Smith, E Palmer, S Weingart
Financial Cryptography, pp. 73--89, 1998


1996

Robust Threshold DSS Signatures
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
EUROCRYPT'96, 1996

Robust and Efficient Sharing of RSA Functions
Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin
CRYPTO'96, 1996

Parallelized network security protocols
E Nahum, D Yates, SOMalley, H Orman, R &
ISOC Symposium on Networked and Distributed System Security (NDSS), 1996


1995

Towards High Performance Cryptographic Software
E Nahum, SOMalley, H Orman, R Schroeppel
Third IEEE Workshop on the Architecture and Implementation of High Performance Communications Subsystems (HPCS), 1995


1991

Introduction to the Citadel architecture: Security in physically exposed environments
S R White, S H Weingart, W C Arnold, E R Palmer
Technical Report RC 16672, IBM Research, 1991

An Introduction to Citadel: a secure crypto coprocessor for workstations
Elaine Palmer
Technical Report RC 18373, IBM TJ Watson Research Center, 1991


Year Unknown

Role Mining for Engineering and Optimizing Role Based Access Control Systems
N L T L I Molloy, Q W E Bertino, S C J Lobo
cerias.purdue.edu, 0