default search action
Bryan Parno
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Zhengyao Lin, Joshua Gancher, Bryan Parno:
FlowCert: Translation Validation for Asynchronous Dataflow via Dynamic Fractional Permissions. Proc. ACM Program. Lang. 8(OOPSLA2): 499-526 (2024) - [c67]Chanhee Cho, Yi Zhou, Jay Bosamiya, Bryan Parno:
A Framework for Debugging Automated Program Verification Proofs via Proof Actions. CAV (1) 2024: 348-361 - [c66]Tony Nuda Zhang, Travis Hance, Manos Kapritsos, Tej Chajed, Bryan Parno:
Inductive Invariants That Spark Joy: Using Invariant Taxonomies to Streamline Distributed Protocol Proofs. OSDI 2024: 837-853 - [c65]Andrea Lattuada, Travis Hance, Jay Bosamiya, Matthias Brun, Chanhee Cho, Hayley LeBlanc, Pranav Srinivasan, Reto Achermann, Tej Chajed, Chris Hawblitzel, Jon Howell, Jacob R. Lorch, Oded Padon, Bryan Parno:
Verus: A Practical Foundation for Systems Verification. SOSP 2024: 438-454 - 2023
- [j13]Andrea Lattuada, Travis Hance, Chanhee Cho, Matthias Brun, Isitha Subasinghe, Yi Zhou, Jon Howell, Bryan Parno, Chris Hawblitzel:
Verus: Verifying Rust Programs using Linear Ghost Types. Proc. ACM Program. Lang. 7(OOPSLA1): 286-315 (2023) - [j12]Travis Hance, Jon Howell, Oded Padon, Bryan Parno:
Leaf: Modularity for Temporary Sharing in Separation Logic. Proc. ACM Program. Lang. 7(OOPSLA2): 31-58 (2023) - [j11]Alexandra E. Michael, Anitha Gollamudi, Jay Bosamiya, Evan Johnson, Aidan Denlinger, Craig Disselkoen, Conrad Watt, Bryan Parno, Marco Patrignani, Marco Vassena, Deian Stefan:
MSWasm: Soundly Enforcing Memory-Safe Execution of Unsafe Code. Proc. ACM Program. Lang. 7(POPL): 425-454 (2023) - [c64]Yi Zhou, Sydney Gibson, Sarah Cai, Menucha Winchell, Bryan Parno:
Galápagos: Developing Verified Low Level Cryptography on Heterogeneous Hardwares. CCS 2023: 2113-2127 - [c63]Arvind Arasu, Tahina Ramananandro, Aseem Rastogi, Nikhil Swamy, Aymeric Fromherz, Kesha Hietala, Bryan Parno, Ravi Ramamurthy:
FastVer2: A Provably Correct Monitor for Concurrent, Key-Value Stores. CPP 2023: 30-46 - [c62]Abhiram Kothapalli, Bryan Parno:
Algebraic Reductions of Knowledge. CRYPTO (4) 2023: 669-701 - [c61]Yi Zhou, Jay Bosamiya, Yoshiki Takashima, Jessica Li, Marijn Heule, Bryan Parno:
Mariposa: Measuring SMT Instability in Automated Program Verification. FMCAD 2023: 178-188 - [c60]James Larisch, Waqar Aqeel, Taejoong Chung, Eddie Kohler, Dave Levin, Bruce M. Maggs, Bryan Parno, Christo Wilson:
No Root Store Left Behind. HotNets 2023: 295-301 - [c59]Travis Hance, Yi Zhou, Andrea Lattuada, Reto Achermann, Alex Conway, Ryan Stutsman, Gerd Zellweger, Chris Hawblitzel, Jon Howell, Bryan Parno:
Sharding the State Machine: Automated Modular Reasoning for Complex Concurrent Systems. OSDI 2023: 911-929 - [c58]Joshua Gancher, Sydney Gibson, Pratap Singh, Samvid Dharanikota, Bryan Parno:
Owl: Compositional Verification of Security Protocols via an Information-Flow Type System. SP 2023: 1130-1147 - [i28]Andrea Lattuada, Travis Hance, Chanhee Cho, Matthias Brun, Isitha Subasinghe, Yi Zhou, Jon Howell, Bryan Parno, Chris Hawblitzel:
Verus: Verifying Rust Programs using Linear Ghost Types (extended version). CoRR abs/2303.05491 (2023) - [i27]Travis Hance, Jon Howell, Oded Padon, Bryan Parno:
Leaf: Modularity for Temporary Sharing in Separation Logic (Extended Version). CoRR abs/2309.04851 (2023) - [i26]Zhengyao Lin, Joshua Gancher, Bryan Parno:
WaveCert: Formal Compiler Validation for Asynchronous Dataflow Programs. CoRR abs/2312.09326 (2023) - [i25]Joshua Gancher, Sydney Gibson, Pratap Singh, Samvid Dharanikota, Bryan Parno:
Owl: Compositional Verification of Security Protocols via an Information-Flow Type System. IACR Cryptol. ePrint Arch. 2023: 473 (2023) - 2022
- [j10]Jialin Li, Andrea Lattuada, Yi Zhou, Jonathan Cameron, Jon Howell, Bryan Parno, Chris Hawblitzel:
Linear types for large-scale systems verification. Proc. ACM Program. Lang. 6(OOPSLA1): 1-28 (2022) - [j9]Klas Leino, Chi Zhang, Ravi Mangal, Matt Fredrikson, Bryan Parno, Corina S. Pasareanu:
Degradation Attacks on Certifiably Robust Neural Networks. Trans. Mach. Learn. Res. 2022 (2022) - [j8]Jacob R. Lorch, Yixuan Chen, Manos Kapritsos, Haojun Ma, Bryan Parno, Shaz Qadeer, Upamanyu Sharma, James R. Wilcox, Xueyuan Zhao:
Armada: Automated Verification of Concurrent Code with Sound Semantic Extensibility. ACM Trans. Program. Lang. Syst. 44(2): 12:1-12:39 (2022) - [c57]Klas Leino, Aymeric Fromherz, Ravi Mangal, Matt Fredrikson, Bryan Parno, Corina S. Pasareanu:
Self-correcting Neural Networks for Safe Classification. NSV/FoMLAS@CAV 2022: 96-130 - [c56]James Larisch, Waqar Aqeel, Michael Lum, Yaelle Goldschlag, Leah Kannan, Kasra Torshizi, Yujie Wang, Taejoong Chung, Dave Levin, Bruce M. Maggs, Alan Mislove, Bryan Parno, Christo Wilson:
Hammurabi: A Framework for Pluggable, Logic-Based X.509 Certificate Validation Policies. CCS 2022: 1857-1870 - [c55]Ioanna Tzialla, Abhiram Kothapalli, Bryan Parno, Srinath T. V. Setty:
Transparency Dictionaries with Succinct Proofs of Correct Operation. NDSS 2022 - [c54]Vipul Goyal, Abhiram Kothapalli, Elisaweta Masserova, Bryan Parno, Yifan Song:
Storing and Retrieving Secrets on a Blockchain. Public Key Cryptography (1) 2022: 252-282 - [c53]Jay Bosamiya, Wen Shih Lim, Bryan Parno:
Provably-Safe Multilingual Software Sandboxing using WebAssembly. USENIX Security Symposium 2022: 1975-1992 - [i24]Alexandra E. Michael, Anitha Gollamudi, Jay Bosamiya, Craig Disselkoen, Aidan Denlinger, Conrad Watt, Bryan Parno, Marco Patrignani, Marco Vassena, Deian Stefan:
MSWasm: Soundly Enforcing Memory-Safe Execution of Unsafe Code. CoRR abs/2208.13583 (2022) - [i23]Abhiram Kothapalli, Bryan Parno:
Algebraic Reductions of Knowledge. IACR Cryptol. ePrint Arch. 2022: 9 (2022) - [i22]Elisaweta Masserova, Deepali Garg, Ken Mai, Lawrence T. Pileggi, Vipul Goyal, Bryan Parno:
Logic Locking - Connecting Theory and Practice. IACR Cryptol. ePrint Arch. 2022: 545 (2022) - 2021
- [c52]Daming D. Chen, Wen Shih Lim, Mohammad Bakhshalipour, Phillip B. Gibbons, James C. Hoe, Bryan Parno:
HerQules: securing programs via hardware-enforced message queues. ASPLOS 2021: 773-788 - [c51]Aymeric Fromherz, Klas Leino, Matt Fredrikson, Bryan Parno, Corina S. Pasareanu:
Fast Geometric Projections for Local Robustness Certification. ICLR 2021 - [c50]Travis Hance, Marijn Heule, Ruben Martins, Bryan Parno:
Finding Invariants of Distributed Systems: It's a Small (Enough) World After All. NSDI 2021: 115-131 - [c49]Guyue Liu, Hugo Sadok, Anne Kohlbrenner, Bryan Parno, Vyas Sekar, Justine Sherry:
Don't Yank My Chain: Auditable NF Service Chaining. NSDI 2021: 155-173 - [c48]Manuel Barbosa, Gilles Barthe, Karthik Bhargavan, Bruno Blanchet, Cas Cremers, Kevin Liao, Bryan Parno:
SoK: Computer-Aided Cryptography. SP 2021: 777-795 - [c47]Antoine Delignat-Lavaud, Cédric Fournet, Bryan Parno, Jonathan Protzenko, Tahina Ramananandro, Jay Bosamiya, Joseph Lallemand, Itsaka Rakotonirina, Yi Zhou:
A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer. SP 2021: 1162-1178 - [c46]Vipul Goyal, Elisaweta Masserova, Bryan Parno, Yifan Song:
Blockchains Enable Non-interactive MPC. TCC (2) 2021: 162-193 - [i21]Klas Leino, Aymeric Fromherz, Ravi Mangal, Matt Fredrikson, Bryan Parno, Corina S. Pasareanu:
Self-Repairing Neural Networks: Provable Safety for Deep Networks via Dynamic Repair. CoRR abs/2107.11445 (2021) - [i20]Vipul Goyal, Elisaweta Masserova, Bryan Parno, Yifan Song:
Blockchains Enable Non-Interactive MPC. IACR Cryptol. ePrint Arch. 2021: 1233 (2021) - [i19]Ioanna Tzialla, Abhiram Kothapalli, Bryan Parno, Srinath T. V. Setty:
Transparency Dictionaries with Succinct Proofs of Correct Operation. IACR Cryptol. ePrint Arch. 2021: 1263 (2021) - 2020
- [c45]Raymond Cheng, William Scott, Elisaweta Masserova, Irene Zhang, Vipul Goyal, Thomas E. Anderson, Arvind Krishnamurthy, Bryan Parno:
Talek: Private Group Messaging with Hidden Access Patterns. ACSAC 2020: 84-99 - [c44]Stephanos Matsumoto, Jay Bosamiya, Yucheng Dai, Paul C. van Oorschot, Bryan Parno:
CAPS: Smoothly Transitioning to a More Resilient Web PKI. ACSAC 2020: 655-668 - [c43]Travis Hance, Andrea Lattuada, Chris Hawblitzel, Jon Howell, Rob Johnson, Bryan Parno:
Storage Systems are Distributed Systems (So Verify Them That Way!). OSDI 2020: 99-115 - [c42]Jacob R. Lorch, Yixuan Chen, Manos Kapritsos, Bryan Parno, Shaz Qadeer, Upamanyu Sharma, James R. Wilcox, Xueyuan Zhao:
Armada: low-effort verification of high-performance concurrent programs. PLDI 2020: 197-210 - [c41]Jonathan Protzenko, Bryan Parno, Aymeric Fromherz, Chris Hawblitzel, Marina Polubelova, Karthikeyan Bhargavan, Benjamin Beurdouche, Joonwon Choi, Antoine Delignat-Lavaud, Cédric Fournet, Natalia Kulatova, Tahina Ramananandro, Aseem Rastogi, Nikhil Swamy, Christoph M. Wintersteiger, Santiago Zanella Béguelin:
EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider. SP 2020: 983-1002 - [c40]Jay Bosamiya, Sydney Gibson, Yao Li, Bryan Parno, Chris Hawblitzel:
Verified Transformations and Hoare Logic: Beautiful Proofs for Ugly Assembly Language. VSTTE 2020: 106-123 - [i18]Raymond Cheng, William Scott, Elisaweta Masserova, Irene Zhang, Vipul Goyal, Thomas E. Anderson, Arvind Krishnamurthy, Bryan Parno:
Talek: Private Group Messaging with Hidden Access Patterns. CoRR abs/2001.08250 (2020) - [i17]Aymeric Fromherz, Klas Leino, Matt Fredrikson, Bryan Parno, Corina S. Pasareanu:
Fast Geometric Projections for Local Robustness Certification. CoRR abs/2002.04742 (2020) - [i16]Raymond Cheng, William Scott, Elisaweta Masserova, Irene Zhang, Vipul Goyal, Thomas E. Anderson, Arvind Krishnamurthy, Bryan Parno:
Talek: Private Group Messaging with Hidden Access Patterns. IACR Cryptol. ePrint Arch. 2020: 66 (2020) - [i15]Antoine Delignat-Lavaud, Cédric Fournet, Bryan Parno, Jonathan Protzenko, Tahina Ramananandro, Jay Bosamiya, Joseph Lallemand, Itsaka Rakotonirina, Yi Zhou:
A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer. IACR Cryptol. ePrint Arch. 2020: 114 (2020) - [i14]Vipul Goyal, Abhiram Kothapalli, Elisaweta Masserova, Bryan Parno, Yifan Song:
Storing and Retrieving Secrets on a Blockchain. IACR Cryptol. ePrint Arch. 2020: 504 (2020) - [i13]Abhiram Kothapalli, Elisaweta Masserova, Bryan Parno:
A Direct Construction for Asymptotically Optimal zkSNARKs. IACR Cryptol. ePrint Arch. 2020: 1318 (2020)
2010 – 2019
- 2019
- [j7]Aymeric Fromherz, Nick Giannarakis, Chris Hawblitzel, Bryan Parno, Aseem Rastogi, Nikhil Swamy:
A verified, efficient embedding of a verifiable assembly language. Proc. ACM Program. Lang. 3(POPL): 63:1-63:30 (2019) - [i12]Jonathan Protzenko, Bryan Parno, Aymeric Fromherz, Chris Hawblitzel, Marina Polubelova, Karthikeyan Bhargavan, Benjamin Beurdouche, Joonwon Choi, Antoine Delignat-Lavaud, Cédric Fournet, Tahina Ramananandro, Aseem Rastogi, Nikhil Swamy, Christoph M. Wintersteiger, Santiago Zanella Béguelin:
EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider. IACR Cryptol. ePrint Arch. 2019: 757 (2019) - [i11]Manuel Barbosa, Gilles Barthe, Karthikeyan Bhargavan, Bruno Blanchet, Cas Cremers, Kevin Liao, Bryan Parno:
SoK: Computer-Aided Cryptography. IACR Cryptol. ePrint Arch. 2019: 1393 (2019) - 2017
- [j6]Chris Hawblitzel, Jon Howell, Manos Kapritsos, Jacob R. Lorch, Bryan Parno, Michael Lowell Roberts, Srinath T. V. Setty, Brian Zill:
IronFleet: proving safety and liveness of practical distributed systems. Commun. ACM 60(7): 83-92 (2017) - [c39]Karthikeyan Bhargavan, Barry Bond, Antoine Delignat-Lavaud, Cédric Fournet, Chris Hawblitzel, Catalin Hritcu, Samin Ishtiaq, Markulf Kohlweiss, K. Rustan M. Leino, Jay R. Lorch, Kenji Maillard, Jianyang Pan, Bryan Parno, Jonathan Protzenko, Tahina Ramananandro, Ashay Rane, Aseem Rastogi, Nikhil Swamy, Laure Thompson, Peng Wang, Santiago Zanella Béguelin, Jean Karim Zinzindohoue:
Everest: Towards a Verified, Drop-in Replacement of HTTPS. SNAPL 2017: 1:1-1:12 - [c38]Andrew Ferraiuolo, Andrew Baumann, Chris Hawblitzel, Bryan Parno:
Komodo: Using verification to disentangle secure-enclave hardware from software. SOSP 2017: 287-305 - [c37]Barry Bond, Chris Hawblitzel, Manos Kapritsos, K. Rustan M. Leino, Jacob R. Lorch, Bryan Parno, Ashay Rane, Srinath T. V. Setty, Laure Thompson:
Vale: Verifying High-Performance Cryptographic Assembly Code. USENIX Security Symposium 2017: 917-934 - 2016
- [j5]Bryan Parno, Jon Howell, Craig Gentry, Mariana Raykova:
Pinocchio: nearly practical verifiable computation. Commun. ACM 59(2): 103-112 (2016) - [c36]Dario Fiore, Cédric Fournet, Esha Ghosh, Markulf Kohlweiss, Olga Ohrimenko, Bryan Parno:
Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data. CCS 2016: 1304-1316 - [c35]Antoine Delignat-Lavaud, Cédric Fournet, Markulf Kohlweiss, Bryan Parno:
Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation. IEEE Symposium on Security and Privacy 2016: 235-254 - [i10]Dario Fiore, Cédric Fournet, Esha Ghosh, Markulf Kohlweiss, Olga Ohrimenko, Bryan Parno:
Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data. IACR Cryptol. ePrint Arch. 2016: 985 (2016) - 2015
- [j4]Virgil D. Gligor, Bryan Parno, Ji Sun Shin:
Network Adversary Attacks against Secure Encryption Schemes. IEICE Trans. Commun. 98-B(2): 267-279 (2015) - [c34]Chris Hawblitzel, Jon Howell, Manos Kapritsos, Jacob R. Lorch, Bryan Parno, Michael Lowell Roberts, Srinath T. V. Setty, Brian Zill:
IronFleet: proving practical distributed systems correct. SOSP 2015: 1-17 - [c33]Craig Costello, Cédric Fournet, Jon Howell, Markulf Kohlweiss, Benjamin Kreuter, Michael Naehrig, Bryan Parno, Samee Zahur:
Geppetto: Versatile Verifiable Computation. IEEE Symposium on Security and Privacy 2015: 253-270 - [i9]Bryan Parno:
A Note on the Unsoundness of vnTinyRAM's SNARK. IACR Cryptol. ePrint Arch. 2015: 437 (2015) - 2014
- [b3]Bryan Parno:
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers (dissertation, updated version). ACM Books 2, ACM / Morgan & Claypool 2014, ISBN 978-1-62705-477-5, pp. I-XVII, 1-188 - [c32]Chris Hawblitzel, Jon Howell, Jacob R. Lorch, Arjun Narayan, Bryan Parno, Danfeng Zhang, Brian Zill:
Ironclad Apps: End-to-End Security via Automated Full-System Verification. OSDI 2014: 165-181 - [c31]Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, Jonathan Katz:
Permacoin: Repurposing Bitcoin Work for Data Preservation. IEEE Symposium on Security and Privacy 2014: 475-490 - [c30]Jon Howell, Jeremy Elson, Bryan Parno, John R. Douceur:
Missive: Fast Application Launch From an Untrusted Buffer Cache. USENIX ATC 2014: 145-156 - [i8]Craig Costello, Cédric Fournet, Jon Howell, Markulf Kohlweiss, Benjamin Kreuter, Michael Naehrig, Bryan Parno, Samee Zahur:
Geppetto: Versatile Verifiable Computation. IACR Cryptol. ePrint Arch. 2014: 976 (2014) - 2013
- [j3]Jon Howell, Bryan Parno, John R. Douceur:
The 10-Kilobyte Web Browser. login Usenix Mag. 38(6) (2013) - [c29]George Danezis, Cédric Fournet, Markulf Kohlweiss, Bryan Parno:
Pinocchio coin: building zerocoin from a succinct pairing-based proof system. PETShop@CCS 2013: 27-30 - [c28]Martin Franz, Andreas Holzer, Rupak Majumdar, Bryan Parno, Helmut Veith:
The first workshop on language support for privacy-enhancing technologies (PETShop'13). CCS 2013: 1485-1486 - [c27]Ari Juels, Bryan Parno:
Fifth ACM cloud computing security workshop (CCSW 2013). CCS 2013: 1487-1488 - [c26]Rosario Gennaro, Craig Gentry, Bryan Parno, Mariana Raykova:
Quadratic Span Programs and Succinct NIZKs without PCPs. EUROCRYPT 2013: 626-645 - [c25]Srinath T. V. Setty, Benjamin Braun, Victor Vu, Andrew J. Blumberg, Bryan Parno, Michael Walfish:
Resolving the conflict between generality and plausibility in verified computation. EuroSys 2013: 71-84 - [c24]Jacob R. Lorch, Bryan Parno, James W. Mickens, Mariana Raykova, Joshua Schiffman:
Shroud: ensuring private access to large-scale data in the data center. FAST 2013: 199-214 - [c23]Jon Howell, Bryan Parno, John R. Douceur:
Embassies: Radically Refactoring the Web. NSDI 2013: 529-545 - [c22]Bryan Parno, Jon Howell, Craig Gentry, Mariana Raykova:
Pinocchio: Nearly Practical Verifiable Computation. IEEE Symposium on Security and Privacy 2013: 238-252 - [c21]Jon Howell, Bryan Parno, John R. Douceur:
How to Run POSIX Apps in a Minimal Picoprocess. USENIX ATC 2013: 321-332 - [e2]Ari Juels, Bryan Parno:
CCSW'13, Proceedings of the 2013 ACM Cloud Computing Security Workshop, Co-located with CCS 2013, Berlin, Germany, November 4, 2013. ACM 2013, ISBN 978-1-4503-2490-8 [contents] - [e1]Martin Franz, Andreas Holzer, Rupak Majumdar, Bryan Parno, Helmut Veith:
PETShop'13, Proceedings of the 2013 ACM Workshop on Language Support for Privacy-Enhancing Technologies, Co-located with CCS 2013, November 4, 2013, Berlin, Germany. ACM 2013, ISBN 978-1-4503-2489-2 [contents] - [i7]Bryan Parno, Craig Gentry, Jon Howell, Mariana Raykova:
Pinocchio: Nearly Practical Verifiable Computation. IACR Cryptol. ePrint Arch. 2013: 279 (2013) - 2012
- [j2]Bryan Parno:
Trust extension for commodity computers. Commun. ACM 55(6): 76-85 (2012) - [c20]Franziska Roesner, Tadayoshi Kohno, Alexander Moshchuk, Bryan Parno, Helen J. Wang, Crispin Cowan:
User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems. IEEE Symposium on Security and Privacy 2012: 224-238 - [c19]Bryan Parno, Mariana Raykova, Vinod Vaikuntanathan:
How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption. TCC 2012: 422-439 - [c18]Amit Vasudevan, Bryan Parno, Ning Qu, Virgil D. Gligor, Adrian Perrig:
Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms. TRUST 2012: 34-54 - [i6]Jacob R. Lorch, James W. Mickens, Bryan Parno, Mariana Raykova, Joshua Schiffman:
Toward Practical Private Access to Data Centers via Parallel ORAM. IACR Cryptol. ePrint Arch. 2012: 133 (2012) - [i5]Rosario Gennaro, Craig Gentry, Bryan Parno, Mariana Raykova:
Quadratic Span Programs and Succinct NIZKs without PCPs. IACR Cryptol. ePrint Arch. 2012: 215 (2012) - [i4]Srinath T. V. Setty, Benjamin Braun, Victor Vu, Andrew J. Blumberg, Bryan Parno, Michael Walfish:
Resolving the conflict between generality and plausibility in verified computation. IACR Cryptol. ePrint Arch. 2012: 622 (2012) - 2011
- [b2]Bryan Parno, Jonathan M. McCune, Adrian Perrig:
Bootstrapping Trust in Modern Computers. Springer Briefs in Computer Science 10, Springer 2011, ISBN 978-1-4614-1459-9, pp. i-xv, 1-101 - [c17]John R. Douceur, Jon Howell, Bryan Parno, Michael Walfish, Xi Xiong:
The web interface should be radically refactored. HotNets 2011: 10 - [c16]Bryan Parno, Jacob R. Lorch, John R. Douceur, James W. Mickens, Jonathan M. McCune:
Memoir: Practical State Continuity for Protected Modules. IEEE Symposium on Security and Privacy 2011: 379-394 - [i3]Bryan Parno, Mariana Raykova, Vinod Vaikuntanathan:
How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption. IACR Cryptol. ePrint Arch. 2011: 597 (2011) - 2010
- [b1]Bryan Parno:
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers. Carnegie Mellon University, USA, 2010 - [c15]Rosario Gennaro, Craig Gentry, Bryan Parno:
Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. CRYPTO 2010: 465-482 - [c14]Bryan Parno, Jonathan M. McCune, Adrian Perrig:
Bootstrapping Trust in Commodity Computers. IEEE Symposium on Security and Privacy 2010: 414-429
2000 – 2009
- 2009
- [c13]Bryan Parno, Jonathan M. McCune, Dan Wendlandt, David G. Andersen, Adrian Perrig:
CLAMP: Practical Prevention of Large-Scale Data Leaks. SP 2009: 154-169 - [i2]Rosario Gennaro, Craig Gentry, Bryan Parno:
Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. IACR Cryptol. ePrint Arch. 2009: 547 (2009) - 2008
- [c12]Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri:
How low can you go?: recommendations for hardware-supported minimal TCB code execution. ASPLOS 2008: 14-25 - [c11]Bryan Parno, Adrian Perrig, Dave G. Andersen:
SNAPP: stateless network-authenticated path pinning. AsiaCCS 2008: 168-178 - [c10]Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Hiroshi Isozaki:
Flicker: an execution infrastructure for tcb minimization. EuroSys 2008: 315-328 - [c9]Alessandro Acquisti, Nicolas Christin, Bryan Parno, Adrian Perrig:
Countermeasures against Government-Scale Monetary Forgery. Financial Cryptography 2008: 262-266 - [c8]Ari Juels, Ravikanth Pappu, Bryan Parno:
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security. USENIX Security Symposium 2008: 75-90 - [c7]Bryan Parno:
Bootstrapping Trust in a "Trusted" Platform. HotSec 2008 - [i1]Ari Juels, Ravikanth Pappu, Bryan Parno:
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security. IACR Cryptol. ePrint Arch. 2008: 44 (2008) - 2007
- [c6]Bryan Parno, Dan Wendlandt, Elaine Shi, Adrian Perrig, Bruce M. Maggs, Yih-Chun Hu:
Portcullis: protecting connection setup from denial-of-capability attacks. SIGCOMM 2007: 289-300 - [c5]Jonathan M. McCune, Bryan Parno, Adrian Perrig, Michael K. Reiter, Arvind Seshadri:
Minimal TCB Code Execution. S&P 2007: 267-272 - 2006
- [c4]Bryan Parno, Mark Luk, Evan Gaustad, Adrian Perrig:
Secure sensor network routing: a clean-slate approach. CoNEXT 2006: 11 - [c3]Bryan Parno, Cynthia Kuo, Adrian Perrig:
Phoolproof Phishing Prevention. Financial Cryptography 2006: 1-19 - 2005
- [c2]Bryan Parno, Adrian Perrig, Virgil D. Gligor:
Distributed Detection of Node Replication Attacks in Sensor Networks. S&P 2005: 49-63 - 2004
- [j1]Bryan Parno, Mema Roussopoulos:
Defending a P2P Digital Preservation System. IEEE Trans. Dependable Secur. Comput. 1(4): 209-222 (2004) - 2003
- [c1]Nick Elprin, Bryan Parno:
An Analysis of Database-Driven Mail Servers. LISA 2003: 15-22
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint