Dan Boneh

Results: 106



#Item
61Server hardware / Client–server model / Email / Representational state transfer / TSIG / Computing / Cloud standards / Server

Riposte: An Anonymous Messaging System Handling Millions of Users Henry Corrigan-Gibbs, Dan Boneh, and David Mazières Stanford University Abstract—This paper presents Riposte, a new system for anonymous broadcast mess

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2015-03-31 12:19:39
62Year of birth missing / ID-based encryption / Association for Computing Machinery / Computer science / Infosys / Pairing-based cryptography / RSA / IEEE P1363 / Cryptography / Public-key cryptography / Dan Boneh

EMBARGOED FOR RELEASE March 31, 12:01 a.m. ET Bruce Shriver ACMMarie Gentile

Add to Reading List

Source URL: awards.acm.org

Language: English - Date: 2015-03-30 18:10:52
63Year of birth missing / ID-based encryption / Association for Computing Machinery / Computer science / Infosys / Pairing-based cryptography / RSA / IEEE P1363 / Cryptography / Public-key cryptography / Dan Boneh

The Tennessee Open Meetings Act passed by the General Assembly in 1974 requires that meetings of state, city and county government bodies be open to the public and that any such governmental body give adequate public not

Add to Reading List

Source URL: health.state.tn.us

Language: English - Date: 2015-03-27 14:41:02
64Year of birth missing / ID-based encryption / Association for Computing Machinery / Computer science / Infosys / Pairing-based cryptography / RSA / IEEE P1363 / Cryptography / Public-key cryptography / Dan Boneh

EMBARGOED FOR RELEASE March 31, 12:01 a.m. ET Bruce Shriver ACMMarie Gentile

Add to Reading List

Source URL: awards.acm.org

Language: English - Date: 2015-03-30 17:41:07
65Key management / Internet protocols / Internet standards / Online Certificate Status Protocol / OCSP stapling / X.509 / Revocation list / Certificate authority / Public key certificate / Cryptography / Public-key cryptography / Cryptographic protocols

Towards Short-Lived Certificates Emin Topalovic∗ , Brennan Saeta∗ , Lin-Shung Huang† , Collin Jackson† and Dan Boneh∗ ∗ Stanford University, {emint, saeta, dabo}@cs.stanford.edu † Carnegie Mellon University

Add to Reading List

Source URL: www.w2spconf.com

Language: English - Date: 2012-05-24 01:30:01
66

Exposing Private Information by Timing Web Applications Andrew Bortz Dan Boneh

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-06-04 16:24:15
    67Software quality / Stack buffer overflow / Address space layout randomization / Buffer overflow protection / Return-to-libc attack / Buffer overflow / Stack / Shellcode / FALSE / Computing / Software bugs / Software engineering

    Hacking Blind Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazi`eres, Dan Boneh Stanford University Abstract—We show that it is possible to write remote stack buffer overflow exploits without possessing a copy of

    Add to Reading List

    Source URL: www.scs.stanford.edu

    Language: English - Date: 2014-08-24 01:28:14
    68Internet marketing / Online advertising / Behavioral targeting / Advertising network / NebuAd / DoubleClick / Click fraud / Internet privacy / HTTP cookie / Internet / Computing / Advertising

    Adnostic: Privacy Preserving Targeted Advertising∗ Vincent Toubiana Arvind Narayanan Dan Boneh

    Add to Reading List

    Source URL: www.nyu.edu

    Language: English - Date: 2005-10-16 18:59:48
    69Mathematical notation / Computational complexity theory / Asymptotic analysis / Combinatorics / Big O notation / Heap / Factorial / Randomized algorithm / Summation / Mathematics / Theoretical computer science / Analysis of algorithms

    CS161 Design and Analysis of Algorithms Dan Boneh 1

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2001-04-08 18:20:48
    70ID-based encryption / Cyberwarfare / Semantic security / Applied mathematics / Security / Cryptography / Public-key cryptography / Ciphertext indistinguishability

    Bilinear Pairings in Cryptography: Identity Based Encryption Dan Boneh Stanford University

    Add to Reading List

    Source URL: crypto.stanford.edu

    Language: English - Date: 2014-05-27 15:07:17
    UPDATE