Biblio
We at USENIX assert that Black lives matter: Read the USENIX Statement on Racism and Black, African-American, and African Diaspora Inclusion.
Export 21 results:
Filters: Author is Dan Boneh [Clear All Filters]
Remote Side-Channel Attacks on Anonymous Transactions. 29th {USENIX} Security Symposium ({USENIX} Security 20). :2739--2756.
.
2020. Scaling Verifiable Computation Using Efficient Set Accumulators. 29th {USENIX} Security Symposium ({USENIX} Security 20). :2075--2092.
.
2020. Protecting accounts from credential stuffing with password breach alerting. 28th {USENIX} Security Symposium ({USENIX} Security 19). :1556--1571.
.
2019. Prio: Private, Robust, and Scalable Computation of Aggregate Statistics. 14th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 17). :259--282.
.
2017. PowerSpy: Location Tracking Using Mobile Device Power Analysis. 24th {USENIX} Security Symposium ({USENIX} Security 15). :785--800.
.
2015. Gyrophone: Recognizing Speech from Gyroscope Signals. 23rd {USENIX} Security Symposium ({USENIX} Security 14). :1053--1067.
.
2014. Password Managers: Attacks and Defenses. 23rd {USENIX} Security Symposium ({USENIX} Security 14). :449--464.
.
2014. Tick Tock: Building Browser Red Pills from Timing Side Channels. 8th {USENIX} Workshop on Offensive Technologies ({WOOT} 14).
.
2014. Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks. 21st {USENIX} Security Symposium ({USENIX} Security 12). :129--141.
.
2012. An Analysis of Private Browsing Modes in Modern Browsers. 19th {USENIX} Security Symposium ({USENIX} Security 10).
.
2010. The Case for Ubiquitous Transport-Level Encryption. 19th {USENIX} Security Symposium ({USENIX} Security 10).
.
2010. Webseclab Security Education Workbench. 3rd Workshop on Cyber Security Experimentation and Test ({CSET} 10).
.
2010. Transaction Generators: Root Kits for Web . 2nd {USENIX} Workshop on Hot Topics in Security (HotSec 07).
.
2007. SANE: A Protection Architecture for Enterprise Networks. 15th {USENIX} Security Symposium ({USENIX} Security 06).
.
2006. Stronger Password Authentication Using Browser Extensions. 14th {USENIX} Security Symposium ({USENIX} Security 05).
.
2005. Flexible OS Support and Applications for Trusted Computing. 9th Workshop on Hot Topics in Operating Systems (HotOS {IX}).
.
2003. Remote Timing Attacks Are Practical. 12th {USENIX} Security Symposium ({USENIX} Security 03).
.
2003. A Method for Fast Revocation of Public Key Certificates and Security Capabilities. 10th {USENIX} Security Symposium ({USENIX} Security 01).
.
2001. Building Intrusion-Tolerant Applications. 8th {USENIX} Security Symposium ({USENIX} Security 99).
.
1999. SWAPEROO: A Simple Wallet Architecture for Payments, Exchanges, Refunds, and Other Operations. 3rd {USENIX} Workshop on Electronic Commerce ({EC} 98).
.
1998. A Revocable Backup System. 6th {USENIX} Security Symposium ({USENIX} Security 96).
.
1996.