20101017 program analysis_for_security_livshits_lecture03_security
The coin tree summarized 10-15
The coin tree summarized 10-13
Getting more 9s from your Cloud operations
The cointree
Technical seminar on Security
06 Vulnerabilities
01-intro-computer_security.ppt
The Sociology of Sybils: Understanding Social Network-based Sybil Defenses Krishna P. Gummadi Networked Systems Research Group MPI-SWS.
Fun with Networks: Social, Sensor, and Shape-Shifting Phillip B. Gibbons Intel Research Pittsburgh DISC’08 / Graal’08 September 24, 2008 Slides (except.
Game-based composition for key exchange Cristina Brzuska, Marc Fischlin (University of Darmstadt) Nigel Smart, Bogdan Warinschi, Steve Williams (University.
Stefan Dziembowski Why do the cryptographic currencies need a solid theory? Forum Informatyki Teoretycznej, Warsaw 30.1.2015.