Revocation Systems with Very Small Private Keys. [Citation Graph (, )][DBLP]
Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures. [Citation Graph (, )][DBLP]
Outside the Closed World: On Using Machine Learning for Network Intrusion Detection. [Citation Graph (, )][DBLP]
All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask). [Citation Graph (, )][DBLP]
State of the Art: Automated Black-Box Web Application Vulnerability Testing. [Citation Graph (, )][DBLP]
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size. [Citation Graph (, )][DBLP]
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. [Citation Graph (, )][DBLP]
How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation. [Citation Graph (, )][DBLP]