-
2
-
-
78651548586
-
Phishing forbidden
-
AGARWAL, N., RENFRO, S., AND BEJAR, A. Phishing forbidden. Queue 5, 5 (2007), 28-32.
-
(2007)
Queue
, vol.5
, Issue.5
, pp. 28-32
-
-
Agarwal, N.1
Renfro, S.2
Bejar, A.3
-
4
-
-
70549111101
-
Format-preserving encryption
-
BELLARE, M., RISTENPART, T., ROGAWAY, P., AND STEGERS, T. Format-preserving encryption. In Selected Areas in Cryptography (2009), pp. 295-312.
-
(2009)
Selected Areas in Cryptography
, pp. 295-312
-
-
Bellare, M.1
Ristenpart, T.2
Rogaway, P.3
Stegers, T.4
-
5
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
SP '07
-
BETHENCOURT, J., SAHAI, A., AND WATERS, B. Ciphertext-policy attribute-based encryption. In Proceedings of the 2007 IEEE Symposium on Security and Privacy (2007), SP '07, pp. 321-334.
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
6
-
-
79953230454
-
Functional encryption: Definitions and challenges
-
TCC'11
-
BONEH, D., SAHAI, A., AND WATERS, B. Functional encryption: Definitions and challenges. In Proceedings of the 8th Conference on Theory of Cryptography (2011), TCC'11, pp. 253-273.
-
(2011)
Proceedings of the 8th Conference on Theory of Cryptography
, pp. 253-273
-
-
Boneh, D.1
Sahai, A.2
Waters, B.3
-
7
-
-
84884472579
-
Highly-scalable searchable symmetric encryption with support for boolean queries
-
CASH, D., JARECKI, S., JUTLA, C. S., KRAWCZYK, H., ROSU, M.-C., AND STEINER, M. Highly-scalable searchable symmetric encryption with support for boolean queries. In CRYPTO (2013), pp. 353-373.
-
(2013)
CRYPTO
, pp. 353-373
-
-
Cash, D.1
Jarecki, S.2
Jutla, C.S.3
Krawczyk, H.4
Rosu, M.-C.5
Steiner, M.6
-
14
-
-
84868107467
-
Confidentiality as a service-usable security for the cloud
-
IEEE
-
FAHL, S., HARBACH, M., MUDERS, T., AND SMITH, M. Confidentiality as a service-usable security for the cloud. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on (2012), IEEE, pp. 153-162.
-
(2012)
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
, pp. 153-162
-
-
Fahl, S.1
Harbach, M.2
Muders, T.3
Smith, M.4
-
16
-
-
70350642087
-
Fully homomorphic encryption using ideal lattices
-
GENTRY, C. Fully homomorphic encryption using ideal lattices. In STOC (2009), pp. 169-178.
-
(2009)
STOC
, pp. 169-178
-
-
Gentry, C.1
-
17
-
-
85041431588
-
Hails: Protecting data privacy in untrusted web applications
-
GIFFIN, D. B., LEVY, A., STEFAN, D., TEREI, D., MAZIERES, D., MITCHELL, J., AND RUSSO, A. Hails: Protecting data privacy in untrusted web applications. In 10th Symposium on Operating Systems Design and Implementation (OSDI) (2012), pp. 47-60.
-
(2012)
10th Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 47-60
-
-
Giffin, D.B.1
Levy, A.2
Stefan, D.3
Terei, D.4
Mazieres, D.5
Mitchell, J.6
Russo, A.7
-
21
-
-
0030149547
-
Software protection and simulation on oblivious RAMs
-
GOLDREICH, O., AND OSTROVSKY, R. Software protection and simulation on oblivious RAMs. J. ACM (1996).
-
(1996)
J. ACM
-
-
Goldreich, O.1
Ostrovsky, R.2
-
23
-
-
84869456660
-
Secure two-party computation in sublinear (amortized) time
-
GORDON, S. D., KATZ, J., KOLESNIKOV, V., KRELL, F., MALKIN, T., RAYKOVA, M., AND VAHLIS, Y. Secure two-party computation in sublinear (amortized) time. In ACM Conference on Computer and Communications Security (CCS) (2012).
-
(2012)
ACM Conference on Computer and Communications Security (CCS)
-
-
Gordon, S.D.1
Katz, J.2
Kolesnikov, V.3
Krell, F.4
Malkin, T.5
Raykova, M.6
Vahlis, Y.7
-
24
-
-
84869439440
-
Scriptless attacks: Stealing the pie without touching the sill
-
ACM
-
HEIDERICH, M., NIEMIETZ, M., SCHUSTER, F., HOLZ, T., AND SCHWENK, J. Scriptless attacks: stealing the pie without touching the sill. In Proceedings of the 2012 ACM conference on Computer and communications security (2012), ACM, pp. 760-771.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security
, pp. 760-771
-
-
Heiderich, M.1
Niemietz, M.2
Schuster, F.3
Holz, T.4
Schwenk, J.5
-
25
-
-
84940382117
-
Clickjacking: Attacks and defenses
-
(Berkeley, CA, USA), Security'12, USENIX Association
-
HUANG, L.-S., MOSHCHUK, A., WANG, H. J., SCHECHTER, S., AND JACKSON, C. Clickjacking: Attacks and defenses. In Proceedings of the 21st USENIX Conference on Security Symposium (Berkeley, CA, USA, 2012), Security'12, USENIX Association, pp. 22-22.
-
(2012)
Proceedings of the 21st USENIX Conference on Security Symposium
, pp. 22-22
-
-
Huang, L.-S.1
Moshchuk, A.2
Wang, H.J.3
Schechter, S.4
Jackson, C.5
-
30
-
-
84910654722
-
How to garble ram programs
-
LU, S., AND OSTROVSKY, R. How to garble ram programs. In EUROCRYPT (2013).
-
(2013)
EUROCRYPT
-
-
Lu, S.1
Ostrovsky, R.2
-
31
-
-
84888986199
-
Do you know where your data are?: Secure data capsules for deployable data protection
-
(Berkeley, CA, USA), HotOS'13, USENIX Association
-
MANIATIS, P., AKHAWE, D., FALL, K., SHI, E., MCCAMANT, S., AND SONG, D. Do you know where your data are?: Secure data capsules for deployable data protection. In Proceedings of the 13th USENIX Conference on Hot Topics in Operating Systems (Berkeley, CA, USA, 2011), HotOS'13, USENIX Association, pp. 22-22.
-
(2011)
Proceedings of the 13th USENIX Conference on Hot Topics in Operating Systems
, pp. 22-22
-
-
Maniatis, P.1
Akhawe, D.2
Fall, K.3
Shi, E.4
McCamant, S.5
Song, D.6
-
32
-
-
84918515359
-
-
MAONE, G., HUANG, D. L.-S., GONDROM, T., AND HILL, B. User interface security directives for content security policy. http://www.w3.org/TR/UISecurity/.
-
User Interface Security Directives for Content Security Policy
-
-
Maone, G.1
Huang, D.L.-S.2
Gondrom, T.3
Hill, B.4
-
36
-
-
77955180941
-
Bootstrapping trust in commodity computers
-
PARNO, B., MCCUNE, J., AND PERRIG, A. Bootstrapping trust in commodity computers. In Security and Privacy (SP), 2010 IEEE Symposium on (2010), pp. 414-429.
-
(2010)
Security and Privacy (SP), 2010 IEEE Symposium on
, pp. 414-429
-
-
Parno, B.1
McCune, J.2
Perrig, A.3
-
37
-
-
82655162816
-
Cryptdb: Protecting confidentiality with encrypted query processing
-
(New York, NY, USA), SOSP '11, ACM
-
POPA, R. A., REDFIELD, C. M. S., ZELDOVICH, N., AND BALAKRISHNAN, H. Cryptdb: Protecting confidentiality with encrypted query processing. In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles (New York, NY, USA, 2011), SOSP '11, ACM, pp. 85-100.
-
(2011)
Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
, pp. 85-100
-
-
Popa, R.A.1
Redfield, C.M.S.2
Zeldovich, N.3
Balakrishnan, H.4
-
38
-
-
84962226288
-
Securing web applications by blindfolding the server
-
POPA, R. A., STARK, E., VALDEZ, S., HELFER, J., ZELDOVICH, N., AND BALAKRISHNAN, H. Securing web applications by blindfolding the server. NDSI (2014).
-
(2014)
NDSI
-
-
Popa, R.A.1
Stark, E.2
Valdez, S.3
Helfer, J.4
Zeldovich, N.5
Balakrishnan, H.6
-
41
-
-
84874840847
-
User-driven access control: Rethinking permission granting in modern operating systems
-
IEEE
-
ROESNER, F., KOHNO, T., MOSHCHUK, A., PARNO, B., WANG, H. J., AND COWAN, C. User-driven access control: Rethinking permission granting in modern operating systems. In Security and Privacy (SP), 2012 IEEE Symposium on (2012), IEEE, pp. 224-238.
-
(2012)
Security and Privacy (SP), 2012 IEEE Symposium on
, pp. 224-238
-
-
Roesner, F.1
Kohno, T.2
Moshchuk, A.3
Parno, B.4
Wang, H.J.5
Cowan, C.6
-
42
-
-
24944554962
-
Fuzzy identity-based encryption
-
SAHAI, A., AND WATERS, B. Fuzzy identity-based encryption. In EUROCRYPT (2005), pp. 457-473.
-
(2005)
EUROCRYPT
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
44
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
(Washington, DC, USA), IEEE Computer Society
-
SONG, D. X., WAGNER, D., AND PERRIG, A. Practical techniques for searches on encrypted data. In Proceedings of the 2000 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2000), IEEE Computer Society.
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
45
-
-
77950845925
-
Symmetric cryptography in javascript
-
IEEE
-
STARK, E., HAMBURG, M., AND BONEH, D. Symmetric cryptography in javascript. In Computer Security Applications Conference, 2009. ACSAC'09. Annual (2009), IEEE, pp. 373-381.
-
(2009)
Computer Security Applications Conference, 2009. ACSAC'09. Annual
, pp. 373-381
-
-
Stark, E.1
Hamburg, M.2
Boneh, D.3
-
48
-
-
84910592953
-
-
Virtru. http://www.virtru.com.
-
Virtru
-
-
-
50
-
-
84863166434
-
A language for automatically enforcing privacy policies
-
YANG, J., YESSENOV, K., AND SOLAR-LEZAMA, A. A language for automatically enforcing privacy policies. ACM SIGPLAN Notices 47, 1 (2012), 85-96.
-
(2012)
ACM SIGPLAN Notices
, vol.47
, Issue.1
, pp. 85-96
-
-
Yang, J.1
Yessenov, K.2
Solar-Lezama, A.3
|