Bryan Parno
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
R Gennaro, C Gentry, B Parno
Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010
Pinocchio: Nearly practical verifiable computation
B Parno, J Howell, C Gentry, M Raykova
Communications of the ACM 59 (2), 103-112, 2016
Quadratic span programs and succinct NIZKs without PCPs
R Gennaro, C Gentry, B Parno, M Raykova
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
Flicker: An execution infrastructure for TCB minimization
JM McCune, BJ Parno, A Perrig, MK Reiter, H Isozaki
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer …, 2008
Distributed detection of node replication attacks in sensor networks
B Parno, A Perrig, V Gligor
2005 IEEE symposium on security and privacy (S&P'05), 49-63, 2005
Challenges in securing vehicular networks
B Parno, A Perrig
Workshop on hot topics in networks (HotNets-IV), 1-6, 2005
Securing anti-virus software with virtualization
JH Wang, JR Lorch, BJ Parno
US Patent 8,307,443, 2012
How to delegate and verify in public: Verifiable computation from attribute-based encryption
B Parno, M Raykova, V Vaikuntanathan
Theory of Cryptography: 9th Theory of Cryptography Conference, TCC 2012 …, 2012
IronFleet: proving practical distributed systems correct
C Hawblitzel, J Howell, M Kapritsos, JR Lorch, B Parno, ML Roberts, ...
Proceedings of the 25th Symposium on Operating Systems Principles, 1-17, 2015
Permacoin: Repurposing bitcoin work for data preservation
A Miller, A Juels, E Shi, B Parno, J Katz
2014 IEEE Symposium on Security and Privacy, 475-490, 2014
Phoolproof phishing prevention
B Parno, C Kuo, A Perrig
Financial Cryptography and Data Security: 10th International Conference, FC …, 2006
User-driven access control: Rethinking permission granting in modern operating systems
F Roesner, T Kohno, A Moshchuk, B Parno, HJ Wang, C Cowan
2012 IEEE Symposium on Security and Privacy, 224-238, 2012
Geppetto: Versatile verifiable computation
C Costello, C Fournet, J Howell, M Kohlweiss, B Kreuter, M Naehrig, ...
2015 IEEE Symposium on Security and Privacy, 253-270, 2015
Portcullis: Protecting connection setup from denial-of-capability attacks
B Parno, D Wendlandt, E Shi, A Perrig, B Maggs, YC Hu
ACM SIGCOMM Computer Communication Review 37 (4), 289-300, 2007
Ironclad apps:{End-to-End} security via automated {Full-System} verification
C Hawblitzel, J Howell, JR Lorch, A Narayan, B Parno, D Zhang, B Zill
11th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2014
Bootstrapping trust in commodity computers
B Parno, JM McCune, A Perrig
2010 IEEE Symposium on Security and Privacy, 414-429, 2010
Komodo: Using verification to disentangle secure-enclave hardware from software
A Ferraiuolo, A Baumann, C Hawblitzel, B Parno
Proceedings of the 26th Symposium on Operating Systems Principles, 287-305, 2017
Vale: Verifying {High-Performance} Cryptographic Assembly Code
B Bond, C Hawblitzel, M Kapritsos, KRM Leino, JR Lorch, B Parno, ...
26th USENIX security symposium (USENIX security 17), 917-934, 2017
Bootstrapping Trust in a "Trusted" Platform.
B Parno
HotSec, 2008
SoK: Computer-aided cryptography
M Barbosa, G Barthe, K Bhargavan, B Blanchet, C Cremers, K Liao, ...
2021 IEEE symposium on security and privacy (SP), 777-795, 2021
Sustav trenutno ne može provesti ovu radnju. Pokušajte ponovo kasnije.
Članci 1–20