Publication Click Fraud Resistant Methods for Learning Click-Through Rates Kamal Jain, Kunal Talwar WINE | January 2005 ISBN: 3-540-30900-4
Publication Security Analysis of KEA Authenticated Key Exchange Protocol Kristin Lauter IACR Cryptology ePrint Archive | January 2005, Vol 2005: pp. 265
Publication Fine Granularity Scalability Encryption of MPEG-4 FGS Bitstreams Bin Benjamin Zhu, Yang Yang, Chang Wen Chen, Shipeng Li IEEE Int. Workshop Multimedia Signal Processing (MMSP) 2005 | January 2005
Publication Smooth Projective Hashing and Two-Message Oblivious Transfer Yael Tauman Kalai In EUROCRYPT 2005, Springer-Verlag (LNCS 3494) | January 2005
Publication Designing Human Friendly Human Interaction Proofs (HIPS) Kumar Chellapilla, Kevin Larson, Patrice Simard, Mary Czerwinski ACM’s CHI 2005 | January 2005
Publication Can we contain Internet worms? Manuel Costa, Jon Crowcroft, Miguel Castro, Ant Rowstron Proceedings of the Third Workshop on Hot Topics in Networks (HotNets III) | November 2004 Proceedings of the Third Workshop on Hot Topics in Networks (HotNets III)
Publication Secure Sessions for Web Services Karthik Bhargavan, Ricardo Corin, Cédric Fournet, Andy Gordon MSR-TR-2004-114 | October 2004 ISBN: 1-58113-973-X 2004 ACM Workshop on Secure Web Services (SWS 2004)
Publication Verifying Policy-Based Security for Web Services Karthik Bhargavan, Cédric Fournet, Andy Gordon MSR-TR-2004-84 | October 2004 ISBN: 1-58113-961-6 CCS '04 Proceedings of the 11th ACM conference on Computer and communications security
Microsoft Research Blog Show and Tell October 19, 2004 By Suzanne Ross Remember when you brought your favorite toy, household object or bug and shared it with the class on Show and Tell day? Most kids were excited about sharing anything and everything with…
Publication Detection and Deterrence of Counterfeiting of Valuable Documents Cormac Herley October 2004