Michael Reiter

Results: 71



#Item
1Computing / Information and communications technology / Computer network security / Networking hardware / Computer networking / Data transmission / Computer security / Firewall software / Middlebox / Computer appliance / Packet processing / Computer network

Design and Implementation of a Consolidated Middlebox Architecture Vyas Sekar∗ , Norbert Egi†† , Sylvia Ratnasamy† , Michael K. Reiter? , Guangyu Shi †† ∗ Intel Labs, † UC Berkeley, ? UNC Chapel Hill, †

Add to Reading List

Source URL: www3.cs.stonybrook.edu

Language: English - Date: 2013-04-22 15:35:26
2

Stealing Machine Learning Models via Prediction APIs Florian Tramèr, École Polytechnique Fédérale de Lausanne (EPFL); Fan Zhang, Cornell University; Ari Juels, Cornell Tech; Michael K. Reiter, The University of North

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-08-10 03:07:36
    3

    The Effect of Repeated Login Prompts on Phishing Susceptibility Peter Snyder and Chris Kanich Michael K. Reiter Department of Computer Science

    Add to Reading List

    Source URL: www.cs.uic.edu

    - Date: 2017-02-03 11:20:48
      4

      Efficient, Compromise Resilient and Append-only Cryptographic Schemes for Secure Audit Logging Attila A. Yavuz and Peng Ning Michael K. Reiter Department of Computer Science, North Carolina State University

      Add to Reading List

      Source URL: web.engr.oregonstate.edu

      - Date: 2012-01-10 09:45:41
        5

        A Software Approach to Defeating Side Channels in Last-Level Caches Ziqiao Zhou Michael K. Reiter

        Add to Reading List

        Source URL: cs.unc.edu

        - Date: 2016-10-30 07:37:42
          6

          Studying Access Control Usability in the Lab: Lessons Learned From Four Studies Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor Michael K. Reiter

          Add to Reading List

          Source URL: www.ece.cmu.edu

          - Date: 2012-06-20 09:03:04
            7

            Low-Overhead Byzantine Fault-Tolerant Storage James Hendricks, Gregory R. Ganger Carnegie Mellon University Michael K. Reiter

            Add to Reading List

            Source URL: www.sosp2007.org

            - Date: 2016-06-15 13:09:51
              8Transmission Control Protocol / Cryptographic nonce / Checksum

              Low-Overhead Byzantine Fault-Tolerant Storage James Hendricks Gregory R. Ganger Michael K. Reiter

              Add to Reading List

              Source URL: www.sosp2007.org

              Language: English - Date: 2016-06-15 13:09:51
              9Systemic risk / Economy / Journal of Political Economy / Monetary economics / Financial crisis / Macroeconomics / Fellows of the Econometric Society / Economics / Markus Brunnermeier

              Macroeconomics With Financial Frictions and Heterogeneous Agents Michael Reiter Institute for Advanced Studies, Vienna VGSE, Winter

              Add to Reading List

              Source URL: www.vgse.at

              Language: English - Date: 2015-09-09 07:53:35
              10Economics / Heterogeneity in economics / Macroeconomic model / Economic model / Agent / Macroeconomics / General equilibrium theory / Heterogeneity / New Keynesian economics / Economic equilibrium / Representative agent

              Heterogeneous Agent Models in Macroeconomics Michael Reiter Institute for Advanced Studies, Vienna VGSE, Summer 2012 The aim of the course is to study the most important models with heterogeneous agents and incomplete ma

              Add to Reading List

              Source URL: www.vgse.at

              Language: English - Date: 2012-03-05 04:24:52
              UPDATE