Deanonymizing mobility traces: Using social networks as a side-channelMudhakar SrivatsaMike Hicks2012CCS 2012
Practical yet universally composable two-server password-authenticated secret sharingJan CamenischAnna Lysyanskayaet al.2012CCS 2012
Second workshop on building analysis datasets and gathering experience returns for security (BADGERS'12)Mihai Christodorescu2012CCS 2012