Carnegie Mellon CyLab

Results: 24



#Item
11

A Framework for Reasoning About the Human in the Loop Lorrie Faith Cranor Carnegie Mellon University January 24, 2008

Add to Reading List

Source URL: www.cylab.cmu.edu

Language: English - Date: 2015-01-06 12:41:50
    12

    Adaptive Steganography and Steganalysis with Fixed-Size Embedding Benjamin Johnsonae , Pascal Sch¨ottleb , Aron Laszkac , Jens Grossklagsd , and Rainer B¨ohmeb a Cylab, Carnegie Mellon University, USA

    Add to Reading List

    Source URL: aronlaszka.com

    Language: English - Date: 2015-04-29 16:35:46
      13Computer security / Trusted computing / Windows Vista / Cryptography / Trusted Platform Module / Key management / Volume license key

      KISS: “Key it Simple and Secure” Corporate Key Management Zongwei Zhou, Jun Han, Yue-Hsun Lin, Adrian Perrig, Virgil Gligor CyLab and Carnegie Mellon University, Pittsburgh, Pennsylvania, United States {stephenzhou,

      Add to Reading List

      Source URL: www.netsec.ethz.ch

      Language: English - Date: 2015-06-01 09:06:14
      14Transport Layer Security / Key management / Public key infrastructure / Public-key cryptography / Certificate authority / Public key certificate / Root certificate / Extended Validation Certificate / X.509 / Online Certificate Status Protocol / Self-signed certificate / DNS-based Authentication of Named Entities

      Accountable Key Infrastructure (AKI): ∗ A Proposal for a Public-Key Validation Infrastructure Tiffany Hyun-Jin Kim Lin-Shung Huang Adrian Perrig Collin Jackson Virgil Gligor CyLab / Carnegie Mellon University

      Add to Reading List

      Source URL: www.netsec.ethz.ch

      Language: English - Date: 2015-06-01 09:06:13
      15

      Accountable Key Infrastructure (AKI): ∗ A Proposal for a Public-Key Validation Infrastructure Tiffany Hyun-Jin Kim Lin-Shung Huang Adrian Perrig Collin Jackson Virgil Gligor CyLab / Carnegie Mellon University

      Add to Reading List

      Source URL: www2013.wwwconference.org

      Language: English - Date: 2014-07-21 08:47:08
        16

        2013 IEEE Symposium on Security and Privacy The Crossfire Attack Min Suk Kang ECE Department and CyLab Carnegie Mellon University

        Add to Reading List

        Source URL: www.ieee-security.org

        - Date: 2013-04-05 19:56:16
          17

          Automatically Detecting Vulnerable Sites Before They Turn Malicious Kyle  Soska   Carnegie  Mellon  University   ECE  /  Cylab    

          Add to Reading List

          Source URL: www.usenix.org

          Language: English - Date: 2014-08-27 19:15:57
            18

            Investigating Age Invariant Face Recognition Based on Periocular Biometrics Felix Juefei-Xu∗ 1 , Khoa Luu∗1,2 , Marios Savvides1 , Tien D. Bui2 , and Ching Y. Suen2 1 CyLab Biometrics Center, Carnegie Mellon Univers

            Add to Reading List

            Source URL: users.ece.cmu.edu

            Language: English - Date: 2011-10-04 23:16:46
              19Internet privacy / Medical privacy / Personally identifiable information / Privacy / Ethics / Privacy policy

              Privacy through Accountability Anupam Datta Associate Professor CSD, ECE, CyLab Carnegie Mellon University

              Add to Reading List

              Source URL: www.cylab.cmu.edu

              Language: English - Date: 2014-11-18 14:47:26
              20Internet protocols / Domain name system / Internet fraud / Spamming / Phishing / Whois / Click fraud / Identity theft / Domain name registrar / Internet / Fraud / Crimes

              Dissecting One Click Frauds∗ Nicolas Christin Carnegie Mellon INI/CyLab

              Add to Reading List

              Source URL: www.andrew.cmu.edu

              Language: English - Date: 2015-04-24 16:32:15
              UPDATE