Boneh

Results: 146



#Item
1Cryptocurrencies / Bitcoin / Neuroscience / Alternative currencies / Economy / Mining pool / Money / Reward system

Incentive Compatibility of Bitcoin Mining Pool Reward Functions Okke Schrijvers, Joseph Bonneau, Dan Boneh, and Tim Roughgarden Stanford University Abstract. In this paper we introduce a game-theoretic model for reward

Add to Reading List

Source URL: www.ifca.ai

Language: English - Date: 2016-02-08 20:23:36
2Computing / Network architecture / Internet / Internet protocols / Secure communication / Internet Standards / Cryptographic protocols / Network protocols / Transmission Control Protocol / Proxy server / Deep packet inspection / Steganography

StegoTorus: A Camouflage Proxy for the Tor Anonymity System Zachary Weinberg,1,2 Jeffrey Wang,3 Vinod Yegneswaran,2 Linda Briesemeister,2 Steven Cheung,2 Frank Wang,3 and Dan Boneh 3 1

Add to Reading List

Source URL: censorbib.nymity.ch

Language: English - Date: 2014-05-19 10:30:48
3Cryptography / Cryptocurrencies / Alternative currencies / Bitcoin / Decentralization / Cryptographic protocols / Non-interactive zero-knowledge proof / Zero-knowledge proof / Proof of knowledge / NP / Soundness / IP

Bulletproofs: Short Proofs for Confidential Transactions and More Benedikt B¨ unz∗1 , Jonathan Bootle†2 , Dan Boneh‡1 , Andrew Poelstra§3 , Pieter Wuille¶3 , and Greg Maxwellk 1

Add to Reading List

Source URL: web.stanford.edu

Language: English - Date: 2018-06-28 10:34:47
4

Deconstructing Possession Nora Boneh & Ivy Sichel, The Hebrew University of Jerusalem In this talk we argue that possession is to be decomposed, not only semantically or lexically, but also syntactically, into two indepe

Add to Reading List

Source URL: www.cssp.cnrs.fr

Language: English - Date: 2010-11-22 10:35:31
    5

    Iron: Functional encryption using Intel SGX Sergey Gorbunov University of Waterloo Joint work with Ben Fisch, Dhinakaran Vinayagamurthy, Dan Boneh.

    Add to Reading List

    Source URL: crypto-events.di.ens.fr

    Language: English - Date: 2017-07-12 10:12:05
      6

      Callisto: A Cryptographic Approach To Detect Serial Predators Of Sexual Misconduct Anjana Rajan Lucy Qin Dan Boneh Tancrède Lepoint

      Add to Reading List

      Source URL: www.projectcallisto.org

      Language: English - Date: 2018-08-13 19:58:54
        7

        Mobile Device Identification via Sensor Fingerprinting Hristo Bojinov Stanford University Dan Boneh

        Add to Reading List

        Source URL: crypto.stanford.edu

        Language: English - Date: 2014-07-02 06:21:15
          8

          Bulletproofs: Short Proofs for Confidential Transactions and More Benedikt B¨ unz∗1 , Jonathan Bootle†2 , Dan Boneh‡1 , Andrew Poelstra§3 , Pieter Wuille¶3 , and Greg Maxwellk 1

          Add to Reading List

          Source URL: web.stanford.edu

          Language: English - Date: 2018-06-28 10:34:47
            9

            Password Managers: Attacks and Defenses David Silver, Suman Jana, and Dan Boneh, Stanford University; Eric Chen and Collin Jackson, Carnegie Mellon University https://www.usenix.org/conference/usenixsecurity14/technical-

            Add to Reading List

            Source URL: www.usenix.org

            Language: English - Date: 2016-02-20 08:20:34
              10

              CCFI: Cryptographically Enforced Control Flow Integrity Ali José Mashtizadeh Andrea Bittau Dan Boneh

              Add to Reading List

              Source URL: iot.stanford.edu

              Language: English - Date: 2015-11-12 17:49:16
                UPDATE