Boneh

Results: 146



#Item
51

Privacy Preserving Ridge Regression on Hundreds of Millions of Records Valeria Nikolaenko, Dan Boneh Stanford Udi Weinsberg, Stratis Ioannidis

Add to Reading List

Source URL: sisl.caltech.edu

Language: English - Date: 2013-05-14 19:32:46
    52

    Programming Assignment 2 Winter 2015 CS 255: Intro to Cryptography Prof. Dan Boneh

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2015-02-26 12:31:17
      53

      Chosen-Ciphertext Security from Identity-Based Encryption∗ Dan Boneh† Ran Canetti‡

      Add to Reading List

      Source URL: www.cs.tau.ac.il

      - Date: 2009-04-27 14:49:47
        54

        Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

        Add to Reading List

        Source URL: www.scs.stanford.edu

        - Date: 2014-05-19 16:48:47
          55

          2013 IEEE Symposium on Security and Privacy Privacy-Preserving Ridge Regression on Hundreds of Millions of Records Valeria Nikolaenko∗ , Udi Weinsberg† , Stratis Ioannidis† , Marc Joye† , Dan Boneh∗ , Nina Taf

          Add to Reading List

          Source URL: www.ieee-security.org

          Language: English - Date: 2013-04-05 19:52:25
            56

            Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazières, Dan Boneh Stanford University Hacking buffer overflows

            Add to Reading List

            Source URL: www.scs.stanford.edu

            Language: English - Date: 2014-05-19 23:54:20
              57

              Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

              Add to Reading List

              Source URL: www.ieee-security.org

              Language: English - Date: 2014-04-21 13:48:10
                58

                Space-Efficient Identity Based Encryption Without Pairings∗ Dan Boneh† Craig Gentry‡ Michael Hamburg

                Add to Reading List

                Source URL: crypto.stanford.edu

                Language: English - Date: 2010-06-04 16:24:15
                  59

                  Asiacrypt$2012$ e:(G(×(G(⟶(G2( Pairings(and(Beyond( Dan$Boneh$

                  Add to Reading List

                  Source URL: www.iacr.org

                  Language: English - Date: 2012-12-14 06:25:26
                    60

                    Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

                    Add to Reading List

                    Source URL: ieee-security.org

                    Language: English - Date: 2014-04-21 13:48:10
                      UPDATE