Export 22 results:
Filters: Author is Dan Boneh  [Clear All Filters]
Tramèr F, Boneh D, Paterson K.  2020.  Remote Side-Channel Attacks on Anonymous Transactions. 29th USENIX Security Symposium (USENIX Security 20). :2739--2756.
Ozdemir A, Wahby R, Whitehat B, Boneh D.  2020.  Scaling Verifiable Computation Using Efficient Set Accumulators. 29th USENIX Security Symposium (USENIX Security 20). :2075--2092.
Corrigan-Gibbs H, Boneh D.  2017.  Prio: Private, Robust, and Scalable Computation of Aggregate Statistics. 14th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 17). :259--282.
Michalevsky Y, Boneh D, Nakibly G.  2014.  Gyrophone: Recognizing Speech from Gyroscope Signals. 23rd {USENIX} Security Symposium ({USENIX} Security 14). :1053--1067.
Silver D, Jana S, Boneh D, Chen E, Jackson C.  2014.  Password Managers: Attacks and Defenses. 23rd {USENIX} Security Symposium ({USENIX} Security 14). :449--464.
Ho G, Boneh D, Ballard L, Provos N.  2014.  Tick Tock: Building Browser Red Pills from Timing Side Channels. 8th {USENIX} Workshop on Offensive Technologies ({WOOT} 14).
Aggarwal G, Bursztein E, Jackson C, Boneh D.  2010.  An Analysis of Private Browsing Modes in Modern Browsers. 19th {USENIX} Security Symposium ({USENIX} Security 10).
Bittau A, Hamburg M, Handley M, Mazières D, Boneh D.  2010.  The Case for Ubiquitous Transport-Level Encryption. 19th {USENIX} Security Symposium ({USENIX} Security 10).
Bursztein E, Gourdin B, Fabry C, Bau J, Rydstedt G, Bojinov H, Boneh D, Mitchell JC.  2010.  Webseclab Security Education Workbench. 3rd Workshop on Cyber Security Experimentation and Test ({CSET} 10).
Jackson C, Boneh D, Mitchell J.  2007.  Transaction Generators: Root Kits for Web . 2nd {USENIX} Workshop on Hot Topics in Security (HotSec 07).
Casado M, Garfinkel T, Akella A, Freedman MJ, Boneh D, McKeown N.  2006.  SANE: A Protection Architecture for Enterprise Networks. 15th {USENIX} Security Symposium ({USENIX} Security 06).
Ross B, Jackson C, Miyake N, Boneh D, Mitchell JC.  2005.  Stronger Password Authentication Using Browser Extensions. 14th {USENIX} Security Symposium ({USENIX} Security 05).
Garfinkel T, Rosenblum M, Boneh D.  2003.  Flexible OS Support and Applications for Trusted Computing. 9th Workshop on Hot Topics in Operating Systems (HotOS {IX}).
Brumley D, Boneh D.  2003.  Remote Timing Attacks Are Practical. 12th {USENIX} Security Symposium ({USENIX} Security 03).
Wu T, Malkin M, Boneh D.  1999.  Building Intrusion-Tolerant Applications. 8th {USENIX} Security Symposium ({USENIX} Security 99).
Boneh D, Lipton RJ.  1996.  A Revocable Backup System. 6th {USENIX} Security Symposium ({USENIX} Security 96).