Boneh

Results: 146



#Item
101Radio navigation / Technology systems / Dynamic time warping / Time series analysis / Global Positioning System / Power analysis / Bluetooth / Levenshtein distance / Algorithm / Technology / Dynamic programming / Satellite navigation systems

arXiv:1502.03182v1 [cs.CR] 11 Feb[removed]PowerSpy: Location Tracking using Mobile Device Power Analysis Yan Michalevsky, Dan Boneh and Aaron Schulman

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2015-02-11 20:43:24
102Cyberwarfare / DNS rebinding / DNS hijacking / DNS spoofing / Computer network security / Computing / Computer security

Protecting Browsers from DNS Rebinding Attacks COLLIN JACKSON, ADAM BARTH, ANDREW BORTZ, WEIDONG SHAO, and DAN BONEH Stanford University

Add to Reading List

Source URL: www.adambarth.com

Language: English - Date: 2009-08-02 18:55:07
103Internet standards / Data / Secure communication / Internet protocols / HTTP / Transport Layer Security / HTTP Secure / Password / Challenge-response authentication / Computing / Cryptographic protocols / Internet

Programming Assignment 2 Winter 2015 CS 255: Intro to Cryptography Prof. Dan Boneh

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-02-26 12:31:17
104Design of experiments / Hypothesis testing / Statistical classification / Bayesian statistics / Statistical inference / Receiver operating characteristic / Bayesian network / Terminal aerodrome forecast / Statistical hypothesis testing / Statistics / Science / Information

Risk assessment using Bayesian decision networks Tali Boneh Ann Nicholson, Kevin Korb (Monash University)

Add to Reading List

Source URL: www.acera.unimelb.edu.au

Language: English - Date: 2012-04-04 21:47:34
105Climate of Australia / Statistical forecasting / Oceanography / Bureau of Meteorology / Fog / Commonwealth Scientific and Industrial Research Organisation / Forecasting / Influence diagram / Rain / Meteorology / Atmospheric sciences / Science

Fog forecasting at Perth Airport – application of a Bayesian Decision Network R Potts, T Boneh, Y Miao, R Rivett, (G Weymouth) CAWCR + WARO

Add to Reading List

Source URL: www.cawcr.gov.au

Language: English - Date: 2011-12-13 22:29:18
106ID-based encryption / Advantage / Paillier cryptosystem / Boneh/Franklin scheme / Random oracle / Cryptography / Public-key cryptography / Ciphertext indistinguishability

An extended abstract of this paper appears in Victor Shoup, editor, Advances in Cryptology – CRYPTO 2005, Volume 3621 of Lecture Notes in Computer Science, pages 205–222, Santa Barbara, California, August 14 – 18,

Add to Reading List

Source URL: www.ippari.unict.it

Language: English - Date: 2009-01-08 04:52:18
107Elliptic curves / Finite fields / Modular arithmetic / Integer factorization algorithms / Elliptic curve / Supersingular elliptic curve / Prime number / Quadratic reciprocity / Primality test / Abstract algebra / Mathematics / Number theory

FINDING COMPOSITE ORDER ORDINARY ELLIPTIC CURVES USING THE COCKS-PINCH METHOD D. BONEH, K. RUBIN, AND A. SILVERBERG Abstract. We apply the Cocks-Pinch method to obtain pairing-friendly composite order groups with prescri

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-05-03 13:25:59
108Computing / Mobile browser / Mobile Web / .mobi

Who Killed My Battery: Analyzing Mobile Browser Energy Consumption Narendran Thiagarajan¹, Gaurav Aggarwal¹, Angela Nicoara² Dan Boneh¹, Jatinder Pal Singh³ ¹Department of Computer Science, Stanford University, CA

Add to Reading List

Source URL: cdn.oreillystatic.com

Language: English - Date: 2012-07-02 16:43:54
109Elliptic curves / Analytic number theory / Elliptic curve / Group theory / Oracle machine / Boneh/Franklin scheme / Supersingular elliptic curve / Prime number / Algebraic curve / Abstract algebra / Cryptography / Mathematics

Efficient Indifferentiable Hashing into Ordinary Elliptic Curves⋆ Eric Brier1 , Jean-S´ebastien Coron2 , Thomas Icart2⋆⋆ , David Madore3 , Hugues Randriam3 , and Mehdi Tibouchi2,4⋆ ⋆ ⋆ 1 Ingenico

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-06-03 09:18:30
110Pairing / Boneh/Franklin scheme / Elliptic curve cryptography / Diffie–Hellman problem / Elliptic curve / ID-based encryption / Tate pairing / BLS / Supersingular elliptic curve / Cryptography / Abstract algebra / Algebra

An Introduction to Pairing-Based Cryptography Alfred Menezes Abstract. Bilinear pairings have been used to design ingenious protocols for such tasks as one-round three-party key agreement, identity-based encryption, and

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2013-10-27 06:53:30
UPDATE