Password Hashing

Coding Theory and Cryptography

Usable and Secure Human Authentication

Privacy Preserving Data Analysis

Game Theory and Security