<--- Back to Details
First PageDocument Content
Lorrie Cranor / CUPS / Michael Reiter / Carnegie Mellon CyLab / Soup / Women in computing / Carnegie Mellon School of Computer Science / Carnegie Mellon University / Ambient intelligence / Microsoft Research / Privacy
Date: 2016-03-08 08:27:28
Lorrie Cranor
CUPS
Michael Reiter
Carnegie Mellon CyLab
Soup
Women in computing
Carnegie Mellon School of Computer Science
Carnegie Mellon University
Ambient intelligence
Microsoft Research
Privacy

Kami Vaniea Kami Vaniea The University of Edinburgh Informatics ForumCrichton St.

Add to Reading List

Source URL: vaniea.com

Download Document from Source Website

File Size: 154,37 KB

Share Document on Facebook

Similar Documents

Design and Implementation of a Consolidated Middlebox Architecture Vyas Sekar∗ , Norbert Egi†† , Sylvia Ratnasamy† , Michael K. Reiter? , Guangyu Shi †† ∗ Intel Labs, † UC Berkeley, ? UNC Chapel Hill, †

Design and Implementation of a Consolidated Middlebox Architecture Vyas Sekar∗ , Norbert Egi†† , Sylvia Ratnasamy† , Michael K. Reiter? , Guangyu Shi †† ∗ Intel Labs, † UC Berkeley, ? UNC Chapel Hill, †

DocID: 1xUlO - View Document

Stealing Machine Learning Models via Prediction APIs Florian Tramèr, École Polytechnique Fédérale de Lausanne (EPFL); Fan Zhang, Cornell University; Ari Juels, Cornell Tech; Michael K. Reiter, The University of North

Stealing Machine Learning Models via Prediction APIs Florian Tramèr, École Polytechnique Fédérale de Lausanne (EPFL); Fan Zhang, Cornell University; Ari Juels, Cornell Tech; Michael K. Reiter, The University of North

DocID: 1u2rV - View Document

The Effect of Repeated Login Prompts on Phishing Susceptibility Peter Snyder and Chris Kanich Michael K. Reiter  Department of Computer Science

The Effect of Repeated Login Prompts on Phishing Susceptibility Peter Snyder and Chris Kanich Michael K. Reiter Department of Computer Science

DocID: 1tFzz - View Document

Efficient, Compromise Resilient and Append-only Cryptographic Schemes for Secure Audit Logging Attila A. Yavuz and Peng Ning Michael K. Reiter Department of Computer Science, North Carolina State University

Efficient, Compromise Resilient and Append-only Cryptographic Schemes for Secure Audit Logging Attila A. Yavuz and Peng Ning Michael K. Reiter Department of Computer Science, North Carolina State University

DocID: 1t4fM - View Document

A Software Approach to Defeating Side Channels in Last-Level Caches Ziqiao Zhou Michael K. Reiter

A Software Approach to Defeating Side Channels in Last-Level Caches Ziqiao Zhou Michael K. Reiter

DocID: 1sZqb - View Document