Topics · Papers
Access control
Let’s go in for a closer look: Observing passwords in their natural habitatSarah Pearman (Carnegie Mellon University), Jeremy Thomas (Carnegie Mellon University), Pardis Emami Naeini (Carnegie Mellon University), Hana Habib (Carnegie Mellon University), Lujo Bauer (Carnegie Mellon University), Nicolas Christin (Carnegie Mellon University), Lorrie Faith Cranor (Carnegie Mellon University), Serge Egelman (University of California, Berkeley), Alain Forget (Google)
AUTHSCOPE: Towards Automatic Discovery of Vulnerable Access Control in Online ServicesChaoshun Zuo (University of Texas at Dallas), Qingchuan Zhao (University of Texas at Dallas), Zhiqiang Lin (University of Texas at Dallas)
Practical Graphs for Optimal Side-Channel Resistant Memory-Hard FunctionsJoel Alwen (IST Austria), Jeremiah Blocki (Purdue University), Ben Harsha (Purdue University)
Iron: Functional Encryption using Intel SGXBen Fisch (Stanford University), Dhinakaran Vinayagamurthy (University of Waterloo), Dan Boneh (Stanford University), Sergey Gorbunov (University of Waterloo)
FAME: Fast Attribute-based Message EncryptionShashank Agrawal (Visa Research), Melissa Chase (Microsoft Research)