A brief glimpse into my actual job
On consulting
Publications update: RFC6278
So, how bad is the gender gap in CS?
STEMing the tide: using ingroup experts to inoculate women's self-concept in science, technology, engineering, and mathematics
This is the captain speaking
Ambient belonging 2: return of the Star Trek poster
So you've decided to become a professor
Should you become a professor?
Should you go to grad school?
On pricing stocks
Sex differences in math-intensive fields
Gender count: Hovav Shacham talk on voting systems, MIT, Oct. 29
No, really: looking for computer security experts
Seeking congruity between goals and roles : a new look at why women opt out of science, technology, engineering, and mathematics careers
Instant ciphertext-only cryptanalysis of gsm encrypted communication
Ambient belonging: how stereotypical environments impact gender participation in computer science
Requested: video game suggestions
World's lamest use of free time
Public service announcement: CSF 2010
Side-channel leaks in web applications: a reality today, a challenge tomorrow
More links about women in CS
(Still) looking to hire computer-security experts
Publication update: two draft-standards
Happy Ada Lovelace Day!
Publication update: using attestation to lift crash resilience to byzantine resilience
Announcement: SSS 2010
The oddly high impact of 'security' conferences
More tax dollars at work
Well, mostly victorious
Opportunity for cryptographic consultant / expert witness
Your tax dollars at work
Victory is mine
Personality tests; hogwash?
Robust signatures for kernel data structures
Announcement: CSF 2010
Understanding scam victims: seven principles for system security
Site update: quick overview
Upcoming technical changes to commenting
Best spam ev-- well, so far
Your botnet is my botnet: analysis of a botnet takeover
English shellcode
Oblivious transfer with access control (or, how to query a database anonymously)
Site-building for academics (and librarians) just got easier
I know someone famous!
Lovely spam
An extremely subjective survey of security conferences
Why we need journals (dammit)
Modern website construction for dumm-- i mean, academics
It's No Secret: Measuring the Security and Reliability of Authentication via ‘Secret’ Questions
RSS problems solved(?)
Publication update: fall 2009
Gender count: boston haskell users meeting, 21 October 2009
CCS 2009
looking to hire computer-security experts
Gender count: 'lincoln at tufts' seminar series, 13 October 2009
Other blogers on: women in cs
Where are all the female computer scientists?
So, about this 'poker' thing...
Gender count: Silverman talk, 2 Oct. 2009
Crypto News: Vanish
I give in: a blog