Learn More
Mobile phones are increasingly equipped with a range of highly responsive sensors. From cameras and GPS receivers to three-axis accelerometers, applications running on these devices are able to experience rich interactions with their environment. Unfortunately, some applications may be able to use such sensors to monitor their surroundings in unintended(More)
percent of the population had incomes below the poverty line, and 31 percent had incomes below 200 percent of the poverty line. Compared to the overall population, a far higher share of those in single-mother families are poor or near-poor, with 67 percent below 200 percent of the poverty line in 2005. A shockingly high 24 percent of those in single-mother(More)
Insulin-like growth factors (IGFs) may play a role in prostate growth, hyperplasia, and malignancy. High plasma IGF-I has been associated with increased prostate cancer risk. In a prospective, cohort, case-control study in the Baltimore Longitudinal Study on Aging population, we examined prostate volume by magnetic resonance imaging, and prostate-specific(More)
Garbled circuits provide a powerful tool for jointly evaluating functions while preserving the privacy of each user's inputs. While recent research has made the use of this primitive more practical, such solutions generally assume that participants are symmetrically provisioned with massive computing resources. In reality, most people on the planet only(More)
Garbled circuits offer a powerful primitive for computation on a user's personal data while keeping that data private. Despite recent improvements, constructing and evaluating circuits of any useful size remains expensive on the limited hardware resources of a smartphone, the primary computational device available to most users around the world. In this(More)
Secure multiparty computation (SMC) offers a technique to preserve functionality and data privacy in mobile applications. Current protocols that make this costly cryptographic construction feasible on mobile devices securely outsource the bulk of the computation to a cloud provider. However, these outsourcing techniques are built on specific secure(More)
PURPOSE Transrectal ultrasound guided prostate biopsy results rely on physician ability to target the gland according to the biopsy schema. However, to our knowledge it is unknown how accurately the freehand, transrectal ultrasound guided biopsy cores are placed in the prostate and how the geometric distribution of biopsy cores may affect the prostate(More)
OAuth 2.0 provides an open framework for the authorization of users across the web. While the standard enumerates mandatory security protections for a variety of attacks, many embodiments of this standard allow these protections to be optionally implemented. In this paper, we analyze the extent to which one particularly dangerous vulnerability, Cross Site(More)