Dan Boneh

Results: 106



#Item
51

Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazières, Dan Boneh Stanford University Hacking buffer overflows

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2014-05-19 23:54:20
    52

    Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

    Add to Reading List

    Source URL: www.ieee-security.org

    Language: English - Date: 2014-04-21 13:48:10
      53

      Space-Efficient Identity Based Encryption Without Pairings∗ Dan Boneh† Craig Gentry‡ Michael Hamburg

      Add to Reading List

      Source URL: crypto.stanford.edu

      Language: English - Date: 2010-06-04 16:24:15
        54

        Asiacrypt$2012$ e:(G(×(G(⟶(G2( Pairings(and(Beyond( Dan$Boneh$

        Add to Reading List

        Source URL: www.iacr.org

        Language: English - Date: 2012-12-14 06:25:26
          55

          Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

          Add to Reading List

          Source URL: ieee-security.org

          Language: English - Date: 2014-04-21 13:48:10
            56

            2013 IEEE Symposium on Security and Privacy Privacy-Preserving Ridge Regression on Hundreds of Millions of Records Valeria Nikolaenko∗ , Udi Weinsberg† , Stratis Ioannidis† , Marc Joye† , Dan Boneh∗ , Nina Taf

            Add to Reading List

            Source URL: ieee-security.org

            Language: English - Date: 2013-04-05 19:52:25
              57Symbol / RSA / Structure / Cryptography / Model theory / Advantage

              Conjunctive, Subset, and Range Queries on Encrypted Data Dan Boneh ∗ Brent Waters

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2007-03-21 13:19:19
              58Software architecture / World Wide Web / Model–view–controller / Web developer / Web application / Sandbox / Form / Ruby on Rails / Software / Computing / Web development

              Bridging the Security Gap with Decentralized Information Flow Control Adam Belay, Andrea Bittau, Dan Boneh, Pablo Buiras*, Daniel Giffin, Amit Levy, Ali Mashtizadeh, David Mazieres, John Mitchell, Alejandro Russo*, Amy S

              Add to Reading List

              Source URL: www.amitlevy.com

              Language: English - Date: 2012-11-15 17:46:54
              59Cryptography / ID-based encryption / Dan Boneh

              Overview of the results The Framework Work in progress Simple Functional Encryption Schemes for Inner Products

              Add to Reading List

              Source URL: www.iacr.org

              Language: English - Date: 2015-03-27 08:27:56
              60Computing / Ambient intelligence / Internet of Things / Tcpcrypt / Secure multi-party computation / Dan Boneh / Cloud computing / Computer security / Cryptography / Cryptographic protocols / Computer network security

              IoT: a Security and Privacy Perspective! Dan Boneh! Stanford University! Secure Internet of Things Project Workshop! Stanford University!

              Add to Reading List

              Source URL: iot.stanford.edu

              Language: English - Date: 2014-11-10 17:36:07
              UPDATE