Ristenpart

Results: 57



#Item
1Abuse / Human behavior / Behavior / Crime / Domestic violence / Intimate partner violence / Restraining order / Spyware / Cyberbullying / Stalking

“A Stalker’s Paradise”: How Intimate Partner Abusers Exploit Technology Diana Freed† Jackeline Palmer‡ Diana MinchalaΨ Karen LevyΦ Thomas Ristenpart† Nicola Dell† † Cornell Tech

Add to Reading List

Source URL: rist.tech.cornell.edu

Language: English - Date: 2018-01-14 09:13:55
2

Thomas Ristenpart Updated February 20, 2018 Associate Professor Cornell Tech

Add to Reading List

Source URL: rist.tech.cornell.edu

Language: English - Date: 2018-08-14 15:08:21
    3

    Honey Encryption: Security Beyond the Brute-Force Bound Ari Juels Thomas Ristenpart

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2014-02-28 19:09:23
      4

      Cracking-Resistant Password Vaults using Natural Language Encoders Rahul Chatterjee∗ , Joseph Bonneau† , Ari Juels‡ , Thomas Ristenpart∗ ∗ University of Wisconsin–Madison, Email: {rchat,rist}@cs.wisc.edu †

      Add to Reading List

      Source URL: www.jbonneau.com

      Language: English - Date: 2018-05-15 14:47:19
        5

        Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds Thomas Ristenpart∗ ∗

        Add to Reading List

        Source URL: www.cs.tau.ac.il

        Language: English - Date: 2009-08-19 10:54:42
          6

          “A Stalker’s Paradise”: How Intimate Partner Abusers Exploit Technology Diana Freed† Jackeline Palmer‡ Diana MinchalaΨ Karen LevyΦ Thomas Ristenpart† Nicola Dell† † Cornell Tech

          Add to Reading List

          Source URL: www.nixdell.com

          - Date: 2018-01-13 08:21:00
            7

            pASSWORD tYPOS and How to Correct Them Securely Rahul Chatterjee∗ , Anish Athalye†‡ , Devdatta Akhawe‡ , Ari Juels∗ , Thomas Ristenpart∗ ∗ Cornell Tech,

            Add to Reading List

            Source URL: www.arijuels.com

            - Date: 2016-07-11 20:49:32
              8

              Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing Matthew Fredrikson∗ , Eric Lantz∗ , Somesh Jha∗ , Simon Lin† , David Page∗ , Thomas Ristenpart∗ University of Wisconsin∗

              Add to Reading List

              Source URL: www.cs.cmu.edu

              - Date: 2015-12-03 10:28:31
                9

                pASSWORD tYPOS and How to Correct Them Securely Rahul Chatterjee∗ , Anish Athalye†‡ , Devdatta Akhawe‡ , Ari Juels∗ , Thomas Ristenpart∗ ∗ Cornell Tech,

                Add to Reading List

                Source URL: www.cs.cornell.edu

                - Date: 2016-06-04 13:31:53
                  10Cloud infrastructure / Cloud computing / Domain name system / Web services / Web hosting / Amazon Elastic Compute Cloud / Amazon Web Services / CNAME record / Microsoft Azure / Subdomain / DNS zone / Platform as a service

                  Next Stop, the Cloud: Understanding Modern Web Service Deployment in EC2 and Azure Keqiang He, Alexis Fisher, Liang Wang, Aaron Gember, Aditya Akella, Thomas Ristenpart University of Wisconsin – Madison {keqhe,afisher

                  Add to Reading List

                  Source URL: pages.cs.wisc.edu

                  Language: English - Date: 2013-08-28 12:57:04
                  UPDATE