Dan Boneh

Results: 106



#Item
1Cryptocurrencies / Bitcoin / Neuroscience / Alternative currencies / Economy / Mining pool / Money / Reward system

Incentive Compatibility of Bitcoin Mining Pool Reward Functions Okke Schrijvers, Joseph Bonneau, Dan Boneh, and Tim Roughgarden Stanford University Abstract. In this paper we introduce a game-theoretic model for reward

Add to Reading List

Source URL: www.ifca.ai

Language: English - Date: 2016-02-08 20:23:36
2Computing / Network architecture / Internet / Internet protocols / Secure communication / Internet Standards / Cryptographic protocols / Network protocols / Transmission Control Protocol / Proxy server / Deep packet inspection / Steganography

StegoTorus: A Camouflage Proxy for the Tor Anonymity System Zachary Weinberg,1,2 Jeffrey Wang,3 Vinod Yegneswaran,2 Linda Briesemeister,2 Steven Cheung,2 Frank Wang,3 and Dan Boneh 3 1

Add to Reading List

Source URL: censorbib.nymity.ch

Language: English - Date: 2014-05-19 10:30:48
3Cryptography / Cryptocurrencies / Alternative currencies / Bitcoin / Decentralization / Cryptographic protocols / Non-interactive zero-knowledge proof / Zero-knowledge proof / Proof of knowledge / NP / Soundness / IP

Bulletproofs: Short Proofs for Confidential Transactions and More Benedikt B¨ unz∗1 , Jonathan Bootle†2 , Dan Boneh‡1 , Andrew Poelstra§3 , Pieter Wuille¶3 , and Greg Maxwellk 1

Add to Reading List

Source URL: web.stanford.edu

Language: English - Date: 2018-06-28 10:34:47
4

Iron: Functional encryption using Intel SGX Sergey Gorbunov University of Waterloo Joint work with Ben Fisch, Dhinakaran Vinayagamurthy, Dan Boneh.

Add to Reading List

Source URL: crypto-events.di.ens.fr

Language: English - Date: 2017-07-12 10:12:05
    5

    Callisto: A Cryptographic Approach To Detect Serial Predators Of Sexual Misconduct Anjana Rajan Lucy Qin Dan Boneh Tancrède Lepoint

    Add to Reading List

    Source URL: www.projectcallisto.org

    Language: English - Date: 2018-08-13 19:58:54
      6

      Mobile Device Identification via Sensor Fingerprinting Hristo Bojinov Stanford University Dan Boneh

      Add to Reading List

      Source URL: crypto.stanford.edu

      Language: English - Date: 2014-07-02 06:21:15
        7

        Bulletproofs: Short Proofs for Confidential Transactions and More Benedikt B¨ unz∗1 , Jonathan Bootle†2 , Dan Boneh‡1 , Andrew Poelstra§3 , Pieter Wuille¶3 , and Greg Maxwellk 1

        Add to Reading List

        Source URL: web.stanford.edu

        Language: English - Date: 2018-06-28 10:34:47
          8

          Password Managers: Attacks and Defenses David Silver, Suman Jana, and Dan Boneh, Stanford University; Eric Chen and Collin Jackson, Carnegie Mellon University https://www.usenix.org/conference/usenixsecurity14/technical-

          Add to Reading List

          Source URL: www.usenix.org

          Language: English - Date: 2016-02-20 08:20:34
            9

            CCFI: Cryptographically Enforced Control Flow Integrity Ali José Mashtizadeh Andrea Bittau Dan Boneh

            Add to Reading List

            Source URL: iot.stanford.edu

            Language: English - Date: 2015-11-12 17:49:16
              10

              Bulletproofs: Short Proofs for Confidential Transactions and More Benedikt B¨ unz∗1 , Jonathan Bootle†2 , Dan Boneh‡1 , Andrew Poelstra§3 , Pieter Wuille¶3 , and Greg Maxwellk 1

              Add to Reading List

              Source URL: eprint.iacr.org

              Language: English - Date: 2018-07-01 19:56:57
                UPDATE