Publication Some Things Algorithms Cannot Do Dean Rosenzweig, Davor Runje MSR-TR-2005-52 | April 2005
Video Clustering Algorithms for Perceptual Image Hashing February 2, 2005 | Jeff Running A perceptual image hash function maps an image to a short binary string based on an image’s appearance to the human eye. Perceptual hashing is useful in image databases, watermarking, and content authentication in adversarial… 50:44
Publication Detecting Stealth Software with Strider GhostBuster Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, Chad Verbowski MSR-TR-2005-25 | February 2005
Publication Toward Privacy in Public Databases , Cynthia Dwork, Frank McSherry, Adam Smith, Hoeteck Wee Second Theory of Cryptography Conference, (TCC 2005) | February 2005 Second Theory of Cryptography Conference, (TCC 2005) Project
Publication Hold Your Sessions: an Attack on Java Servlet Session-id Generation Zvi Gutterman, Dahlia Malkhi Cryptographers’ Track, RSA Conference (CT-RSA ’05) | February 2005 Cryptographers' Track, RSA Conference (CT-RSA '05)
Publication Adaptation: Tracking the Ecologies of Music and Peer-to-Peer Networks Kate Crawford Media International Australia/Special Issue | February 2005, Vol 114: pp. 30-39
Publication Secrecy and Group Creation Luca Cardelli, Giorgio Ghelli, Andy Gordon Information and Computation | January 2005, Vol 196(2): pp. 127-155
Publication A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network Xiaoming Wang, Bin Benjamin Zhu, Shipeng Li Int. Conf. on Digital Rights Management: Technology, Issues, Challenges and Systems | January 2005
Publication On the Impossibility of Obfuscation with Auxiliary Input Shafi Goldwasser, Yael Tauman Kalai In Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS’05) | January 2005