We present a method to compile Yao’s two-player garbled circuit protocol into one that is secure against malicious adversaries that relies on witness indistinguishability. Our ap...
Languages such as C and C++ use unsafe manual memory management, allowing simple bugs (i.e., accesses to an object after deallocation) to become the root cause of exploitable secu...
Santosh Nagarakatte, Milo M. K. Martin, Steve Zdan...
The need for personalized summaries of media content has been driven by the recent and anticipated explosive growth in the media world. In this paper we present a methodology and ...
Lalitha Agnihotri, John R. Kender, Nevenka Dimitro...
People share pictures online to increase their social presence. However, recent studies have shown that most of the content shared in social networks is not looked at by peers. Pr...
Mauro Cherubini, Alejandro Gutierrez, Rodrigo de O...
The Peer Sampling Service (PSS) has been proposed as a method to initiate and maintain the set of connections between nodes in unstructured peer to peer (P2P) networks. The PSS us...
Gian Paolo Jesi, Edoardo Mollona, Srijith K. Nair,...