Harlan Yu
Harlan Yu
Department of Computer Science and the Center for Information Technology Policy, Princeton University
Verified email at cs.princeton.edu
Cited by
Cited by
OpenDHT: a public DHT service and its uses
S Rhea, B Godfrey, B Karp, J Kubiatowicz, S Ratnasamy, S Shenker, ...
Proceedings of the 2005 conference on Applications, technologies …, 2005
Accountable algorithms
JA Kroll, S Barocas, EW Felten, JR Reidenberg, DG Robinson, H Yu
U. Pa. L. Rev. 165, 633, 2016
The New Ambiguity of "Open Government"
H Yu, D Robinson
UCLA Law Review Discourse 59, 178-208, 2012
Government Data and the Invisible Hand
D Robinson, H Yu, W Zeller, E Felten
Yale Journal of Law & Technology, Vol. 11, p. 160, 2009, 2009
Source Code Review of the Diebold Voting System
JA Calandrino, AJ Feldman, JA Halderman, D Wagner, H Yu, WP Zeller
California Secretary of State, 2007
A Distributed Reputation Approach to Cooperative Internet Routing Protection
H Yu, J Rexford, EW Felten
Secure Network Protocols, 2005.(NPSec). 1st IEEE ICNP Workshop on, 73-78, 2005
Accountable algorithms’(2017)
JA Kroll, J Huey, S Barocas, EW Felten, JR Reidenberg, DG Robinson, ...
University of Pennsylvania Law Review 165, 633, 0
The new ambiguity of “open government”. 59 UCLA L
H Yu, DG Robinson
Rev. Disc 178, 179-208, 2012
The New Ambiguity of “Open Government”. Princeton CITP
H Yu, D Robinson
Yale ISP Working Paper, 2012
Enabling innovation for civic engagement
DG Robinson, H Yu, EW Felten
Open government: Collaboration, transparency and participation in practice …, 2010
Data brokers in an open society
A Rieke, H Yu, D Robinson, J van Hoboken
LondonOpen Society Foundation, 2016
Designing Software to Shape Open Government Policy
H Yu
Princeton University, 2012
Using Software to Liberate U.S. Case Law
H Yu, S Schultze
XRDS: Crossroads, The ACM Magazine for Students 18 (2), 12-15, 2011
8: 00 am Registration 8: 45 am-9: 00 am Opening Remarks: The State of the Internet Economy: Lawrence E. Strickling, Assistant Secretary of Commerce for Communications and …
H Yu
Efficient collision search attacks on SHA-0.
T Qin, H Chen, IF Akyildiz, W Su, Y Sankarasubramaniam, E Cayirci, ...
Information Technology Journal 11 (1), 393-422, 2002
Workshop on Technology and Consumer Protection (ConPro’17)
J Calandrino, A Narayanan, A Acquisti, S Afroz, A Alva, L Banks, ...
A Distributed Reputation Approach to Cooperative Interdomain Routing Protection
H Yu, J Rexford, EW Felten
The system can't perform the operation now. Try again later.
Articles 1–17