60 results on '"David Molnar"'
Search Results
2. CyberSecEval 2: A Wide-Ranging Cybersecurity Evaluation Suite for Large Language Models.
3. An Analysis of Different Notions of Effectiveness in k-Anonymity.
4. Getting Fit for the Future: Optimizing Energy Usage in Existing Buildings by Adding Non-Invasive Sensor Networks.
5. Prepose: Privacy, Security, and Reliability for Gesture-Based Programming.
6. Prepose: Privacy, Security, and Reliability for Gesture-Based Programming.
7. A Framework for Understanding and Designing Telepresence.
8. SurroundWeb: Mitigating Privacy Concerns in a 3D Web Browser.
9. Program Boosting: Program Synthesis via Crowd-Sourcing.
10. Data-Parallel String-Manipulating Programs.
11. Zero-effort payments: design, deployment, and lessons.
12. Fast: a transducer-based language for tree manipulation.
13. Coupling of Existing Simulations using Bottom-up Modeling of Choreographies.
14. World-Driven Access Control for Continuous Sensing.
15. Enabling Fine-Grained Permissions for Augmented Reality Applications with Recognizers.
16. Symbolic finite state transducers: algorithms and applications.
17. Using Services and Service Compositions to Enable the Distributed Execution of Legacy Simulation Applications.
18. Workflow-based Distributed Environment for Legacy Simulation Applications.
19. SCRIPTGARD: automatic context-sensitive sanitization for large-scale legacy web applications.
20. This is your data on drugs: lessons computer security can learn from the drug war.
21. Fast: A Transducer-Based Language for Tree Manipulation.
22. Dynamic Test Generation to Find Integer Bugs in x86 Binary Linux Programs.
23. Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate.
24. From Weak to Strong Watermarking.
25. Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage-or-How to Store Ballots on a Voting Machine (Extended Abstract).
26. Generic On-Line/Off-Line Threshold Signatures.
27. Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs.
28. An Analysis of Empirical PMF Based Tests for Least Significant Bit Image Steganography.
29. Towards understanding algorithmic factors affecting energy consumption: switching complexity, randomness, and preliminary experiments.
30. A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags.
31. The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks.
32. Privacy for RFID through trusted computing.
33. Security and Privacy Issues in E-passports.
34. Towards a model of energy complexity for algorithms [mobile wireless applications].
35. Privacy and security in library RFID: issues, practices, and architectures.
36. Why We Can't Be Bothered to Read Privacy Policies - Models of Privacy Economics as a Lemons Market.
37. Security and privacy for augmented reality systems.
38. Why we can't be bothered to read privacy policies models of privacy economics as a lemons market.
39. SURROGATES: Enabling Near-Real-Time Dynamic Analyses of Embedded Systems.
40. Homomorphic Signature Schemes.
41. A Reputation System to Increase MIX-Net Reliability.
42. The Free Haven Project: Distributed Anonymous Storage Service.
43. Operating System Support for Augmented Reality Applications.
44. Enabling Security in Cloud Storage SLAs with CloudProof.
45. Fast and Precise Sanitizer Analysis with BEK.
46. Self Hosting vs. Cloud Hosting: Accounting for the Security Impact of Hosting in the Cloud.
47. Please Continue to Hold: An Empirical Study on User Tolerance of Security Delays.
48. On patrol: resource allocation, proofs of work, and consequences.
49. Detection of pulmonary nodule growth with dose reduced chest tomosynthesis: a human observer study using simulated nodules.
50. Radio frequency Id and privacy with information goods.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.