|Binh Vo, 2015:
"Private, Distributed, and Searchable Content
|Mariana Raykova, 2012:
"Secure Computation in Heterogeneous Environments: How to Bring Multiparty Computation Closer to Practice?",
|Hang Zhao, 2012: "Security Policy Definition and Enforcement in Distributed Systems"|
|Maritza Johnson, 2012:
"Toward Usable Access Control for End-users: A Case Study of Facebook Privacy Settings"
|Elli Androulaki, 2010:
"A Privacy Preserving ECommerce Oriented
Identity Management Architecture"
(IBM Research, Zurich)
|Shivani Vikuntam (Barnard College, Columbia University), 2016: "How Should Computers Be Searched With Respect to the Fourth Amendment?"|
| ||Zoe Wood (Columbia College, Columbia University), 2016: "Synthesizing and Restructuring the Conversation Around the Use of Robots in the Education and Therapy of Individuals with Autism Spectrum Disorders"|