Chad S. Spensky

Bauer, L., Liang, Y., Reiter, M. K., Spensky, C., Discovering access-control misconfigurations: New approaches and evaluation methodologies, Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy (CODASPY), pages 95–104, February 2012.

Reiter, M. K., Sekar V., Spensky C., Zhang Z., Making peer-assisted content distribution robust to collusion using bandwidth puzzles, Information Systems Security, 5th International Conference (ICISS), pages 132–147, December 2009.

 

 

 

 

 

 

 

 

top of page