Export 23 results:
Filters: Author is Dan Boneh  [Clear All Filters]
Ozdemir A, Boneh D.  2022.  Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets. 31st USENIX Security Symposium (USENIX Security 22). :4291--4308.
Tramèr F, Boneh D, Paterson K.  2020.  Remote Side-Channel Attacks on Anonymous Transactions. 29th USENIX Security Symposium (USENIX Security 20). :2739--2756.
Ozdemir A, Wahby R, Whitehat B, Boneh D.  2020.  Scaling Verifiable Computation Using Efficient Set Accumulators. 29th USENIX Security Symposium (USENIX Security 20). :2075--2092.
Corrigan-Gibbs H, Boneh D.  2017.  Prio: Private, Robust, and Scalable Computation of Aggregate Statistics. 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). :259--282.
Michalevsky Y, Boneh D, Nakibly G.  2014.  Gyrophone: Recognizing Speech from Gyroscope Signals. 23rd USENIX Security Symposium (USENIX Security 14). :1053--1067.
Silver D, Jana S, Boneh D, Chen E, Jackson C.  2014.  Password Managers: Attacks and Defenses. 23rd USENIX Security Symposium (USENIX Security 14). :449--464.
Ho G, Boneh D, Ballard L, Provos N.  2014.  Tick Tock: Building Browser Red Pills from Timing Side Channels. 8th USENIX Workshop on Offensive Technologies (WOOT 14).
Aggarwal G, Bursztein E, Jackson C, Boneh D.  2010.  An Analysis of Private Browsing Modes in Modern Browsers. 19th USENIX Security Symposium (USENIX Security 10).
Bittau A, Hamburg M, Handley M, Mazières D, Boneh D.  2010.  The Case for Ubiquitous Transport-Level Encryption. 19th USENIX Security Symposium (USENIX Security 10).
Bursztein E, Gourdin B, Fabry C, Bau J, Rydstedt G, Bojinov H, Boneh D, Mitchell JC.  2010.  Webseclab Security Education Workbench. 3rd Workshop on Cyber Security Experimentation and Test (CSET 10).
Jackson C, Boneh D, Mitchell J.  2007.  Transaction Generators: Root Kits for Web . 2nd USENIX Workshop on Hot Topics in Security (HotSec 07).
Ross B, Jackson C, Miyake N, Boneh D, Mitchell JC.  2005.  Stronger Password Authentication Using Browser Extensions. 14th USENIX Security Symposium (USENIX Security 05).
Garfinkel T, Rosenblum M, Boneh D.  2003.  Flexible OS Support and Applications for Trusted Computing. 9th Workshop on Hot Topics in Operating Systems (HotOS IX).
Brumley D, Boneh D.  2003.  Remote Timing Attacks Are Practical. 12th USENIX Security Symposium (USENIX Security 03).
Wu T, Malkin M, Boneh D.  1999.  Building Intrusion-Tolerant Applications. 8th USENIX Security Symposium (USENIX Security 99).
Boneh D, Lipton RJ.  1996.  A Revocable Backup System. 6th USENIX Security Symposium (USENIX Security 96).