Boneh

Results: 146



#Item
31

Towards Short-Lived Certificates Emin Topalovic∗ , Brennan Saeta∗ , Lin-Shung Huang† , Collin Jackson† and Dan Boneh∗ ∗ Stanford University, {emint, saeta, dabo}@cs.stanford.edu † Carnegie Mellon University

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-05-24 01:30:01
    32

    Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham∗ Dan Boneh†

    Add to Reading List

    Source URL: omereingold.files.wordpress.com

    Language: English - Date: 2014-10-21 18:30:18
      33

      CESEL: Securing a Mote for 20 Years Kevin Kiningham, Mark Horowitz, Philip Levis, and Dan Boneh Stanford University Abstract

      Add to Reading List

      Source URL: sing.stanford.edu

      Language: English - Date: 2016-01-07 20:28:46
        34

        Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

        Add to Reading List

        Source URL: css.csail.mit.edu

        Language: English - Date: 2016-01-29 11:50:05
          35

          Overshadow: A Virtualization-Based Approach to Retrofitting Protection in Commodity Operating Systems Xiaoxin Chen Tal Garfinkel E. Christopher Lewis Pratap Subrahmanyam Dan Boneh∗

          Add to Reading List

          Source URL: www.elewis.net

          Language: English - Date: 2007-12-20 12:42:01
            36

            Incentive Compatibility of Bitcoin Mining Pool Reward Functions Okke Schrijvers, Joseph Bonneau, Dan Boneh, and Tim Roughgarden Stanford University Abstract. In this paper we introduce a game-theoretic model for reward

            Add to Reading List

            Source URL: fc16.ifca.ai

            Language: English - Date: 2016-02-08 20:23:36
              37

              Exposing Private Information by Timing Web Applications Andrew Bortz Dan Boneh

              Add to Reading List

              Source URL: crypto.stanford.edu

              Language: English - Date: 2010-06-04 16:24:15
                38

                Online Cryptography Course See also: Dan Boneh http://en.wikibooks.org/High_School_Mathematics_Extensions/Discrete_Probability

                Add to Reading List

                Source URL: spark-university.s3.amazonaws.com

                Language: English - Date: 2012-06-08 16:11:29
                  39Computing / Software bugs / Software engineering / Blind return oriented programming / Computer errors / Return-oriented programming / Stack buffer overflow / Return-to-libc attack / Address space layout randomization / Buffer overflow / Shellcode / Stack

                  Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

                  Add to Reading List

                  Source URL: www.scs.stanford.edu

                  Language: English - Date: 2016-01-02 20:09:14
                  40

                  Online Cryptography Course See also: Dan Boneh http://en.wikibooks.org/High_School_Mathematics_Extensions/Discrete_Probability

                  Add to Reading List

                  Source URL: spark-university.s3.amazonaws.com

                  Language: English - Date: 2012-06-08 16:11:45
                    UPDATE