What CTOs Need to Know About Security
Much ado about randomness. What is really a random number?
Threshold and Proactive Pseudo-Random Permutations
Business Case Studies
"Managing software development" by Peter Bell
Number theory lecture (part 1)
Inoculation strategies for victims of viruses
Recruiting Great Engineers in Six Easy Steps
Towards a theory of data entangelement
Secure information aggregation in sensor networks
A verifiable random function with short proofs and keys
Price of anarchy is independent of network topology
You Too Can Be a Radio Host Or How We Scaled a .NET Startup And Had Fun Doing It
New York REDIS Meetup Welcome Session
Privacy and E-Commerce
Spreading Rumors Quietly and the Subgroup Escape Problem