USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 23 results:
Filters: Author is Dan Boneh [Clear All Filters]
Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets. 31st USENIX Security Symposium (USENIX Security 22). :4291--4308.
.
2022. Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy. 30th USENIX Security Symposium (USENIX Security 21). :1775--1792.
.
2021. Remote Side-Channel Attacks on Anonymous Transactions. 29th USENIX Security Symposium (USENIX Security 20). :2739--2756.
.
2020. Scaling Verifiable Computation Using Efficient Set Accumulators. 29th USENIX Security Symposium (USENIX Security 20). :2075--2092.
.
2020. Protecting accounts from credential stuffing with password breach alerting. 28th USENIX Security Symposium (USENIX Security 19). :1556--1571.
.
2019. Prio: Private, Robust, and Scalable Computation of Aggregate Statistics. 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17). :259--282.
.
2017. PowerSpy: Location Tracking Using Mobile Device Power Analysis. 24th USENIX Security Symposium (USENIX Security 15). :785--800.
.
2015. Gyrophone: Recognizing Speech from Gyroscope Signals. 23rd USENIX Security Symposium (USENIX Security 14). :1053--1067.
.
2014. Password Managers: Attacks and Defenses. 23rd USENIX Security Symposium (USENIX Security 14). :449--464.
.
2014. Tick Tock: Building Browser Red Pills from Timing Side Channels. 8th USENIX Workshop on Offensive Technologies (WOOT 14).
.
2014. Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks. 21st USENIX Security Symposium (USENIX Security 12). :129--141.
.
2012. An Analysis of Private Browsing Modes in Modern Browsers. 19th USENIX Security Symposium (USENIX Security 10).
.
2010. The Case for Ubiquitous Transport-Level Encryption. 19th USENIX Security Symposium (USENIX Security 10).
.
2010. Webseclab Security Education Workbench. 3rd Workshop on Cyber Security Experimentation and Test (CSET 10).
.
2010. Transaction Generators: Root Kits for Web . 2nd USENIX Workshop on Hot Topics in Security (HotSec 07).
.
2007. SANE: A Protection Architecture for Enterprise Networks. 15th USENIX Security Symposium (USENIX Security 06).
.
2006. Stronger Password Authentication Using Browser Extensions. 14th USENIX Security Symposium (USENIX Security 05).
.
2005. Flexible OS Support and Applications for Trusted Computing. 9th Workshop on Hot Topics in Operating Systems (HotOS IX).
.
2003. Remote Timing Attacks Are Practical. 12th USENIX Security Symposium (USENIX Security 03).
.
2003. A Method for Fast Revocation of Public Key Certificates and Security Capabilities. 10th USENIX Security Symposium (USENIX Security 01).
.
2001. Building Intrusion-Tolerant Applications. 8th USENIX Security Symposium (USENIX Security 99).
.
1999. SWAPEROO: A Simple Wallet Architecture for Payments, Exchanges, Refunds, and Other Operations. 3rd USENIX Workshop on Electronic Commerce (EC 98).
.
1998. A Revocable Backup System. 6th USENIX Security Symposium (USENIX Security 96).
.
1996.