Boneh

Results: 146



#Item
1Incentive Compatibility of Bitcoin Mining Pool Reward Functions Okke Schrijvers, Joseph Bonneau, Dan Boneh, and Tim Roughgarden Stanford University  Abstract. In this paper we introduce a game-theoretic model for reward

Incentive Compatibility of Bitcoin Mining Pool Reward Functions Okke Schrijvers, Joseph Bonneau, Dan Boneh, and Tim Roughgarden Stanford University Abstract. In this paper we introduce a game-theoretic model for reward

Add to Reading List

Source URL: www.ifca.ai

Language: English - Date: 2016-02-08 20:23:36
2StegoTorus: A Camouflage Proxy for the Tor Anonymity System Zachary Weinberg,1,2 Jeffrey Wang,3 Vinod Yegneswaran,2 Linda Briesemeister,2 Steven Cheung,2 Frank Wang,3 and Dan Boneh 3 1

StegoTorus: A Camouflage Proxy for the Tor Anonymity System Zachary Weinberg,1,2 Jeffrey Wang,3 Vinod Yegneswaran,2 Linda Briesemeister,2 Steven Cheung,2 Frank Wang,3 and Dan Boneh 3 1

Add to Reading List

Source URL: censorbib.nymity.ch

Language: English - Date: 2014-05-19 10:30:48
3Bulletproofs: Short Proofs for Confidential Transactions and More Benedikt B¨ unz∗1 , Jonathan Bootle†2 , Dan Boneh‡1 , Andrew Poelstra§3 , Pieter Wuille¶3 , and Greg Maxwellk 1

Bulletproofs: Short Proofs for Confidential Transactions and More Benedikt B¨ unz∗1 , Jonathan Bootle†2 , Dan Boneh‡1 , Andrew Poelstra§3 , Pieter Wuille¶3 , and Greg Maxwellk 1

Add to Reading List

Source URL: web.stanford.edu

Language: English - Date: 2018-06-28 10:34:47
4Deconstructing Possession Nora Boneh & Ivy Sichel, The Hebrew University of Jerusalem In this talk we argue that possession is to be decomposed, not only semantically or lexically, but also syntactically, into two indepe

Deconstructing Possession Nora Boneh & Ivy Sichel, The Hebrew University of Jerusalem In this talk we argue that possession is to be decomposed, not only semantically or lexically, but also syntactically, into two indepe

Add to Reading List

Source URL: www.cssp.cnrs.fr

Language: English - Date: 2010-11-22 10:35:31
    5Iron: Functional encryption using Intel SGX Sergey Gorbunov University of Waterloo Joint work with Ben Fisch, Dhinakaran Vinayagamurthy, Dan Boneh.

    Iron: Functional encryption using Intel SGX Sergey Gorbunov University of Waterloo Joint work with Ben Fisch, Dhinakaran Vinayagamurthy, Dan Boneh.

    Add to Reading List

    Source URL: crypto-events.di.ens.fr

    Language: English - Date: 2017-07-12 10:12:05
      6Callisto: A Cryptographic Approach To Detect Serial Predators Of Sexual Misconduct Anjana Rajan Lucy Qin Dan Boneh Tancrède Lepoint

      Callisto: A Cryptographic Approach To Detect Serial Predators Of Sexual Misconduct Anjana Rajan Lucy Qin Dan Boneh Tancrède Lepoint

      Add to Reading List

      Source URL: www.projectcallisto.org

      Language: English - Date: 2018-08-13 19:58:54
        7Mobile Device Identification via Sensor Fingerprinting Hristo Bojinov Stanford University  Dan Boneh

        Mobile Device Identification via Sensor Fingerprinting Hristo Bojinov Stanford University Dan Boneh

        Add to Reading List

        Source URL: crypto.stanford.edu

        Language: English - Date: 2014-07-02 06:21:15
          8Bulletproofs: Short Proofs for Confidential Transactions and More Benedikt B¨ unz∗1 , Jonathan Bootle†2 , Dan Boneh‡1 , Andrew Poelstra§3 , Pieter Wuille¶3 , and Greg Maxwellk 1

          Bulletproofs: Short Proofs for Confidential Transactions and More Benedikt B¨ unz∗1 , Jonathan Bootle†2 , Dan Boneh‡1 , Andrew Poelstra§3 , Pieter Wuille¶3 , and Greg Maxwellk 1

          Add to Reading List

          Source URL: web.stanford.edu

          Language: English - Date: 2018-06-28 10:34:47
            9Password Managers: Attacks and Defenses David Silver, Suman Jana, and Dan Boneh, Stanford University; Eric Chen and Collin Jackson, Carnegie Mellon University https://www.usenix.org/conference/usenixsecurity14/technical-

            Password Managers: Attacks and Defenses David Silver, Suman Jana, and Dan Boneh, Stanford University; Eric Chen and Collin Jackson, Carnegie Mellon University https://www.usenix.org/conference/usenixsecurity14/technical-

            Add to Reading List

            Source URL: www.usenix.org

            Language: English - Date: 2016-02-20 08:20:34
              10CCFI: Cryptographically Enforced Control Flow Integrity Ali José Mashtizadeh Andrea Bittau  Dan Boneh

              CCFI: Cryptographically Enforced Control Flow Integrity Ali José Mashtizadeh Andrea Bittau Dan Boneh

              Add to Reading List

              Source URL: iot.stanford.edu

              Language: English - Date: 2015-11-12 17:49:16