Password Hashing

Applications of Depth-Robust Graphs

Usable and Secure Human Authentication

Privacy Preserving Data Analysis

Game Theory and Security