Boneh

Results: 146



#Item
121Input/output / Smartphones / Accelerometers / IOS / ITunes / Fingerprint / Device fingerprint / Acoustic fingerprint / Mobile Web / Computing / IPhone / Technology

Mobile Device Identification via Sensor Fingerprinting Hristo Bojinov Stanford University Dan Boneh

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2014-07-02 06:21:15
122Electronic commerce / ID-based encryption / ID-based cryptography / Clifford Cocks / Key / RSA / Public key infrastructure / Boneh/Franklin scheme / Certificate-based encryption / Cryptography / Key management / Public-key cryptography

Identity-Based Encryption with Conventional Public-Key Cryptography

Add to Reading List

Source URL: middleware.internet2.edu

Language: English - Date: 2005-02-23 11:34:53
123Software quality / Stack buffer overflow / Address space layout randomization / Buffer overflow protection / Return-to-libc attack / Buffer overflow / Stack / Shellcode / FALSE / Computing / Software bugs / Software engineering

Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2014-05-19 16:48:47
124Software bugs / C programming language / C++ / Sizeof / Stack / Address space layout randomization / C / Buffer overflow / Computing / Software engineering / Computer programming

Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazières, Dan Boneh Stanford University Hacking buffer overflows

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2014-05-19 23:54:20
125Boneh/Franklin scheme / Standard model / Digital signature / Secure channel / Information security / Key distribution / Cryptography / ID-based encryption / Public-key cryptography

NEW SECURITY NOTIONS FOR IDENTITY BASED ENCRYPTION By Sriramkrishnan Srinivasan

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2010-04-11 06:48:31
126Public-key cryptography / Signcryption / Digital signature / Cipher / Pairing-based cryptography / Key / Proxy re-encryption / Boneh/Franklin scheme / Cryptography / ID-based encryption / ID-based cryptography

Pairing-based Cryptography: Identity Based Encryption and Beyond

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-09 09:22:20
127RSA / Boneh/Franklin scheme / Cipher / Advantage / Chosen-ciphertext attack / Cryptography / ID-based encryption / Ciphertext

New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts Allison Lewko ∗ University of Texas at Austin [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-08-29 23:19:39
128Internet protocols / Public-key cryptography / Internet standards / Cipher suite / Transport Layer Security / HTTP Secure / Diffie–Hellman key exchange / Elliptic curve Diffie–Hellman / Key size / Cryptography / Cryptographic protocols / Secure communication

An Experimental Study of TLS Forward Secrecy Deployments Lin-Shung Huang∗ , Shrikant Adhikarla† , Dan Boneh‡ , Collin Jackson∗ Mellon University, {linshung.huang, collin.jackson}@sv.cmu.edu † Microsoft, shrikan

Add to Reading List

Source URL: www.linshunghuang.com

Language: English - Date: 2014-04-16 17:21:09
129Talmud / Culture / Harvest / Rosh Hashanah / Bereavement in Judaism

Boneh Olam Brochure2k13 FINAL2:Layout[removed]:41 PM Page 1 Boneh Olam 2013 Annual Giving Program[removed]This year I / we want to participate in the Jewish Home Foundation’s Boneh Olam – Builders of the World An

Add to Reading List

Source URL: jewishhomerockleigh.org

Language: English - Date: 2012-11-27 09:48:21
130Cross-platform software / Scripting languages / Software testing / Web applications / Cross-site scripting / OWASP / Vulnerability / Web application security / JavaScript / Software / Computing / Computer network security

Webseclab Security Education Workbench Elie Bursztein, Baptiste Gourdin, Celine Fabry, Jason Bau, Gustav Rydstedt, Hristo Bojinov, Dan Boneh, John C. Mitchell Stanford University elie,bgourdin,jbau,rydstedt,hristo,dabo,m

Add to Reading List

Source URL: bojinov.org

Language: English - Date: 2011-01-05 14:09:03
UPDATE