During our fieldwork with real-world organizations---including those in Public Key Infrastructure (PKI), network configuration management, and the electrical power grid---we repeatedly noticed that security policies and related security artifacts...
After decades of searching we have yet to find the progenitor systems for type Ia supernovae. In fact most of what we know about this homogeneous class of supernovae is from spectral features associated with the incinerated remains of the C+O white...
Public key infrastructure (Computer security). ; Computer networks -- Security measures. ; Operating systems (Computers). ; Microcomputers.
In 1976, Whitfield Diffie and Martin Hellman demonstrated how public key cryptography could enable secure information exchange between parties that do not share secrets. In order for public key cryptography to work in modern distributed...
Human chromosome abnormalities -- Diagnosis -- Moral and ethical aspects. ; Health insurance -- United States. ; Discrimination in insurance -- United States.
Electronic mail systems -- Security measures. Electronic mail systems -- Social aspects. Trust.
A secure system that cannot be used by real users to secure real-world processes is not really secure at all. While many believe that usability and security are diametrically opposed, a growing body of research from the field of Human-Computer...
The theory community has worked on Secure Multiparty Computation (SMC) for more than two decades, and has produced many protocols for many settings. One common thread in these works is that the protocols cannot use a Trusted Third Party (TTP), even...
The inappropriate expression of Matrix Metalloproteinases (MMPs) contributes to the pathology of many cancers. Among these, melanoma is a particularly insidious disease in that it is almost completely resistant to every known the therapy, and the...
We expect wireless body-area networks of pervasive wearable devices will enable in situ health monitoring, personal assistance, entertainment personalization, and home automation. As these devices become ubiquitous, we also expect them to...
Multiresolution image transformations have become commonplace tools for analyzing images for a number of applications, including enhancement and restoration. Powerful models for these applications have been developed in the transform domain of...
A variety of forensic methods have been developed to identify falsified photos, each unified by the ability to estimate and detect properties of a photo that are perturbed by forgery. There exist, however, many photos in which the required...
This thesis approaches the problem of locating zero-day exploits used in network attacks. The hypothesis is that the advent of high-performance virtualization presents a unique opportunity to both discover these events and increase the attacker's...
Digital video -- Analysis. Forensic sciences. Image processing -- Digital techniques.
We present new forensic tools that are capable of detecting traces of tampering in digital video without the use of watermarks or specialized hardware. These tools operate under the assumption that video contain naturally occurring properties which...
We present new forensic tools that are capable of detecting traces of tampering in digital images without the use of watermarks or specialized hardware. These tools operate under the assumption that images contain natural properties from a variety...
We describe a set of natural image statistics that are built upon two multi-scale image decompositions, the quadrature mirror filter pyramid decomposition and the local angular harmonic decomposition. These image statistics consist of first- and...