Dan Boneh

Results: 106



#Item
21

Public Key Encryption with keyword Search Dan Boneh∗ Stanford University Giovanni Di Crescenzo Telcordia

Add to Reading List

Source URL: crypto.stanford.edu

- Date: 2010-06-04 16:24:13
    22

    2015 IEEE Symposium on Security and Privacy Riposte: An Anonymous Messaging System Handling Millions of Users Henry Corrigan-Gibbs, Dan Boneh, and David Mazières Stanford University

    Add to Reading List

    Source URL: www.ieee-security.org

    - Date: 2015-05-11 16:43:15
      23

      Bootstrapping Communications into an Anti-Censorship System Patrick Lincoln,1 Ian Mason,1 Phillip Porras,1 Vinod Yegneswaran,1 Zachary Weinberg,2 Jeroen Massar,3 William Simpson,3 Paul Vixie,3 and Dan Boneh 4 1 SRI Inte

      Add to Reading List

      Source URL: research.owlfolio.org

      - Date: 2016-04-20 11:44:16
        24

        StegoTorus: A Camouflage Proxy for the Tor Anonymity System Zachary Weinberg,1,2 Jeffrey Wang,3 Vinod Yegneswaran,2 Linda Briesemeister,2 Steven Cheung,2 Frank Wang,3 and Dan Boneh 3 1

        Add to Reading List

        Source URL: research.owlfolio.org

        Language: English - Date: 2016-04-20 11:44:16
          25Cryptography / Public-key cryptography / Identity-based cryptography / Elliptic curve cryptography / Dan Boneh / ID-based encryption / Association for Computing Machinery / Pairing-based cryptography / Boneh / Infosys / ID-based cryptography / Computer science

          EMBARGOED FOR RELEASE March 31, 12:01 a.m. ET Bruce Shriver ACMMarie Gentile

          Add to Reading List

          Source URL: fellows.acm.org

          Language: English - Date: 2015-03-30 17:41:07
          26Software engineering / Computing / Software / Hacking / Clickjacking / Framekiller / Obfuscation / JavaScript / Framing / NoScript / Content Security Policy / Cross-site scripting

          Busting Frame Busting: a Study of Clickjacking Vulnerabilities on Popular Sites Gustav Rydstedt, Elie Bursztein, Dan Boneh Collin Jackson

          Add to Reading List

          Source URL: crypto.stanford.edu

          Language: English - Date: 2010-06-04 16:24:15
          27Statistical classification / Data / Information / Computing / Geographic data and information / Global Positioning System / Biometrics / Coding theory / Fuzzy extractor / Geotagging / Support vector machine / K-nearest neighbors algorithm

          Robust Geotag Generation for Security Applications Di Qiu*, Sherman Lo, Dan Boneh and Per Enge Stanford University, Stanford, CA Why geo-security?

          Add to Reading List

          Source URL: scpnt.stanford.edu

          Language: English - Date: 2009-10-23 18:24:49
          28Bitcoin / Cryptocurrencies / Mining pool / Reinforcement learning

          Incentive Compatibility of Bitcoin Mining Pool Reward Functions Okke Schrijvers, Joseph Bonneau, Dan Boneh, and Tim Roughgarden Stanford University Abstract. In this paper we introduce a game-theoretic model for reward

          Add to Reading List

          Source URL: theory.stanford.edu

          Language: English - Date: 2016-02-14 00:07:23
          29

          Towards Short-Lived Certificates Emin Topalovic∗ , Brennan Saeta∗ , Lin-Shung Huang† , Collin Jackson† and Dan Boneh∗ ∗ Stanford University, {emint, saeta, dabo}@cs.stanford.edu † Carnegie Mellon University

          Add to Reading List

          Source URL: w2spconf.com

          Language: English - Date: 2012-05-24 01:30:01
            30

            Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham∗ Dan Boneh†

            Add to Reading List

            Source URL: omereingold.files.wordpress.com

            Language: English - Date: 2014-10-21 18:30:18
              UPDATE