Michael Reiter

Results: 71



#Item
1Design and Implementation of a Consolidated Middlebox Architecture Vyas Sekar∗ , Norbert Egi†† , Sylvia Ratnasamy† , Michael K. Reiter? , Guangyu Shi †† ∗ Intel Labs, † UC Berkeley, ? UNC Chapel Hill, †

Design and Implementation of a Consolidated Middlebox Architecture Vyas Sekar∗ , Norbert Egi†† , Sylvia Ratnasamy† , Michael K. Reiter? , Guangyu Shi †† ∗ Intel Labs, † UC Berkeley, ? UNC Chapel Hill, †

Add to Reading List

Source URL: www3.cs.stonybrook.edu

Language: English - Date: 2013-04-22 15:35:26
2Stealing Machine Learning Models via Prediction APIs Florian Tramèr, École Polytechnique Fédérale de Lausanne (EPFL); Fan Zhang, Cornell University; Ari Juels, Cornell Tech; Michael K. Reiter, The University of North

Stealing Machine Learning Models via Prediction APIs Florian Tramèr, École Polytechnique Fédérale de Lausanne (EPFL); Fan Zhang, Cornell University; Ari Juels, Cornell Tech; Michael K. Reiter, The University of North

Add to Reading List

Source URL: www.usenix.org

Language: English - Date: 2016-08-10 03:07:36
    3The Effect of Repeated Login Prompts on Phishing Susceptibility Peter Snyder and Chris Kanich Michael K. Reiter  Department of Computer Science

    The Effect of Repeated Login Prompts on Phishing Susceptibility Peter Snyder and Chris Kanich Michael K. Reiter Department of Computer Science

    Add to Reading List

    Source URL: www.cs.uic.edu

    - Date: 2017-02-03 11:20:48
      4Efficient, Compromise Resilient and Append-only Cryptographic Schemes for Secure Audit Logging Attila A. Yavuz and Peng Ning Michael K. Reiter Department of Computer Science, North Carolina State University

      Efficient, Compromise Resilient and Append-only Cryptographic Schemes for Secure Audit Logging Attila A. Yavuz and Peng Ning Michael K. Reiter Department of Computer Science, North Carolina State University

      Add to Reading List

      Source URL: web.engr.oregonstate.edu

      - Date: 2012-01-10 09:45:41
        5A Software Approach to Defeating Side Channels in Last-Level Caches Ziqiao Zhou Michael K. Reiter

        A Software Approach to Defeating Side Channels in Last-Level Caches Ziqiao Zhou Michael K. Reiter

        Add to Reading List

        Source URL: cs.unc.edu

        - Date: 2016-10-30 07:37:42
          6Studying Access Control Usability in the Lab: Lessons Learned From Four Studies Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor  Michael K. Reiter

          Studying Access Control Usability in the Lab: Lessons Learned From Four Studies Kami Vaniea, Lujo Bauer, Lorrie Faith Cranor Michael K. Reiter

          Add to Reading List

          Source URL: www.ece.cmu.edu

          - Date: 2012-06-20 09:03:04
            7Low-Overhead Byzantine Fault-Tolerant Storage James Hendricks, Gregory R. Ganger Carnegie Mellon University  Michael K. Reiter

            Low-Overhead Byzantine Fault-Tolerant Storage James Hendricks, Gregory R. Ganger Carnegie Mellon University Michael K. Reiter

            Add to Reading List

            Source URL: www.sosp2007.org

            - Date: 2016-06-15 13:09:51
              8Low-Overhead Byzantine Fault-Tolerant Storage James Hendricks Gregory R. Ganger  Michael K. Reiter

              Low-Overhead Byzantine Fault-Tolerant Storage James Hendricks Gregory R. Ganger Michael K. Reiter

              Add to Reading List

              Source URL: www.sosp2007.org

              Language: English - Date: 2016-06-15 13:09:51
              9Macroeconomics With Financial Frictions and Heterogeneous Agents Michael Reiter Institute for Advanced Studies, Vienna VGSE, Winter

              Macroeconomics With Financial Frictions and Heterogeneous Agents Michael Reiter Institute for Advanced Studies, Vienna VGSE, Winter

              Add to Reading List

              Source URL: www.vgse.at

              Language: English - Date: 2015-09-09 07:53:35
              10Heterogeneous Agent Models in Macroeconomics Michael Reiter Institute for Advanced Studies, Vienna VGSE, Summer 2012 The aim of the course is to study the most important models with heterogeneous agents and incomplete ma

              Heterogeneous Agent Models in Macroeconomics Michael Reiter Institute for Advanced Studies, Vienna VGSE, Summer 2012 The aim of the course is to study the most important models with heterogeneous agents and incomplete ma

              Add to Reading List

              Source URL: www.vgse.at

              Language: English - Date: 2012-03-05 04:24:52