Publication How to Leak a Secret Ronald L. Rivest, Adi Shamir, Yael Tauman Kalai Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology | January 2001
Publication Mobile Values, New Names, and Secure Communication Martın Abadi, Cédric Fournet 28th ACM Symposium on Principles of Programming Languages (POPL’01) | January 2001
Publication Computer Security in the Real World Butler Lampson Annual Computer Security Applications Conference | December 2000 ISBN 0-7695-0859-6. Slides
Publication Robust Image Hashing Ramarathnam Venkatesan, S.-M. Koon, Mariusz Jakubowski, P. Moulin IEEE International Conference on Image Processing: ICIP 2000 | September 2000
Publication Secrecy and Group Creation Luca Cardelli, Giorgio Ghelli, Andy Gordon CONCUR ’00 Proceedings of the 11th International Conference on Concurrency Theory | August 2000 ISBN: 3-540-67897-2
Publication Okapi/Keenbow at TREC-8 Stephen Robertson, S. Walker The Eighth Text REtrieval Conference (TREC-8) | January 2000 The Eighth Text REtrieval Conference (TREC–8)
Group Constructive Security The Constructive Security Group at Microsoft Research Cambridge seeks robust solutions to real-world large-scale security and privacy problems.
Publication Securing Ad Hoc Networks Lidong Zhou, Zygmunt J. Haas IEEE Networks Special Issue on Network Security | November 1999
Publication Information Systems Security Thomas Berson, Richard Kemmerer, Butler Lampson Realizing the Potential of C4I: Fundamental Challenges, 3 | Published by National Academy Press | 1999 ISBN: 978-0-309-06485-9
Publication Designing Presentations for On-Demand Viewing Jonathan Grudin, Anoop Gupta, Li-wei He MSR-TR-99-69 | September 1999