Crossing the Line

file

Visible to the public Spam Economics

file

Visible to the public Rubber Hose Resistant Cryptography

Dr. Boneh heads the applied crypto group at the Computer Science department at Stanford University. Dr. Boneh's research focuses on applications of cryptography to computer security. His work includes cryptosystems with novel properties, security for handheld devices, web security, digital copyright protection, and cryptanalysis. He is the author of over a hundred publications in the field and is a recipient of the Packard Award, the Alfred P. Sloan Award, the RSA award in mathematics, and the Okawa foundation award. In 2011 Dr.

file

Visible to the public Now Do Voters Notice Review Screen Anomalies?

Mike Byrne is a Professor of Psychology and Computer Science at Rice University. His primary research areas are concerned with usability of technological systems and mathematical/computational models of human cognition and performance with a strong interest in understanding human error. This includes basic scientific work on theories of human cognition and performance as well as applied usability testing efforts, particularly in the area of voting. His research has been funded by NASA, the Office of Naval Research, NIST, and the NSF. Mike received a B.S.

file

Visible to the public Learning to Read Encrypted VoIP Conversations

Fabian Monrose is a Professor in the Computer Science Department at University of North Carolina at Chapel Hill. He has been an active computer security researcher for over 12 years, and has held positions in both industry and academia. He received his Ph.D. from the Courant Institute of Mathematical Sciences, New York University.

file

Visible to the public A Perspective on Transitioning Reserach to an Open Source Product

Vern Paxson is a Professor in Electrical Engineering and Computer Sciences at the University of California, Berkeley, USA, and also has affiliations with the International Computer Science Institute and the Lawrence Berkeley National Laboratory. His research focuses on network measurement and analysis, high-performance monitoring of Internet traffic to detect malicious activity, and addressing the threat of botnets and the underground economy that they fuel.