Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Boneh'
Boneh published presentations and documents on DocSlides.
Public Key Encryption with eyw ord Searc Dan Boneh Gio anni Di Crescenzo Stanfor
by test
Consider user Bob who sends email to user Alice e...
Hacking Blind Andrea Bittau Adam Belay Ali Mashtizadeh David Mazi eres Dan Boneh Stanford University Abstract We show that it is possible to write remote stack buffer overow exploits without possessin
by danika-pritchard
This makes it possible to hack proprietary closed...
Remote iming Attacks ar Practical Da vid Brumle Dan Boneh Stanfor Univer sity Stanfor Univer sity dbrumle ycs
by liane-varnes
stanfordedu dabocsstanfordedu Abstract iming attac...
Short Group Signatures Dan Boneh dabocs
by trish-goza
stanfordedu Xavier Boyen xbboyenorg Hovav Shacham ...
Aggregate and eriably Encrypted Signatures from Bilinear Maps Dan Boneh dabocs
by faustina-dinatale
stanfordedu Craig Gen try cgentrydocomolabsusacom ...
Gyrophone Recognizing Speech From Gyroscope Signals Yan Michalevsky Dan Boneh Computer Science Department Stanford University Gabi Nakibly National Research Simulation Center Rafael Ltd
by liane-varnes
Abstract We show that the MEMS gyroscopes found o...
An Analysis of Private Browsing Modes in Modern Browsers Gaurav Aggarwal Elie Bursztein Stanford University Collin Jackson CMU Dan Boneh Stanford University Abstract We study the security and privacy
by jane-oiler
We 64257rst pro pose a clean de64257nition of the...
Location Privacy via Private Proximity Testing Arvind Narayanan Narendran Thiagarajan Mugdha Lakhani Michael Hamburg Dan Boneh Stanford University Abstract We study privacypreserving tests for proxim
by briana-ranney
We describe several secure protocols that support...
Hacking Blind Andrea Bittau Adam Belay Ali Mashtizadeh David Mazi eres Dan Boneh Stanford University Abstract We show that it is possible to write remote stack buffer overow exploits without possessi
by alexa-scheidler
This makes it possible to hack proprietary closed...
Exposing Private Information by Timing Web Application
by min-jolicoeur
stanfordedu Dan Boneh Stanford University dabocsst...
Overshadow: A Virtualization-Based Approach toRetrofitting Protection
by pamella-moone
Dan Boneh Jeffrey Dwoskin Dan R.K. Ports Ca...
Online/Offline
by lindy-dunigan
Attribute-Based Encryption. Brent Waters. Susan H...
StronglyUnforgeableSignaturesBasedonComputationalDie-HellmanDanBoneh,
by tatiana-dople
230D.Boneh,E.Shen,andB.Watersasignaturesystemthati...
Dan Boneh , Yuval Ishai
by olivia-moreira
, . Alain Passelègue. , Amit . Sahai. , and Davi...
TherearecurrentlytwoprincipalapplicationsforHIBEThe12rstduetoCane
by okelly
t).ByusingupdateablepublicstorageasinCHK[9],privat...
15gisageneratorofG15eG2GG1isane14cientlycomputablemapwi
by winnie
4.1TheRestricted-DelegationGameforFullHIBEInthesta...
Load More...