Dan Boneh [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Provisions: Proofs of solvency for cryptocurrencies RWC-2016 - stanford,usa
PowerSpy: Location Tracking Using Mobile Device Power Analysis SecuritySymposium-2015 - washington,USA
Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation EuroCrypt-2015 - Soia,Bulgaria
Hosting Services on an Untrusted Cloud EuroCrypt-2015 - Soia,Bulgaria
Bivariate Polynomials Modulo Composites and their Applications AsiaCrypt-2014 - kaohsiung,taiwan
Password Managers: Attacks and Defenses usenix-2014 - san diego,usa
After Lunch Break Crypto usenix-2014 - san diego,usa
Tick Tock: Building Browser Red Pills from Timing Side Channels Woot-2014 - san diego,usa
Low Overhead Broadcast Encryption from Multilinear Maps crypto-2014 - california,usa
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation crypto-2014 - california,usa
An Experimental Study of TLS Forward Secrecy Deployment (Slides) w2sp-2014 - California,USA
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits EuroCrypt-2014 - copenhagen,denmark
New Frontiers in Cryptography Trustycon-2014 - San Francisco,USA
The PRNG Debate RSACon-2014 - San Francisco, USA
Function-Private Subspace-Membership Encryption and Its Applications asiacrypt-2013 - Bengalore,India
Constrained Pseudorandom Functions and Their Applications asiacrypt-2013 - Bengalore,India
The Cryptographers' Panel RSA USA-2013 - San Francisco, USA
Pairing-based Cryptography: Past, Present, and Future ASIACRYPT-2012 - Beijing,China Security
Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks USENIX-2012 - Washington, D.C.
Evading Censorship with Browser-Based Proxies Privacy Enhancing Technologies Symposium-2012 - Vigo, Spain
The Case For Ubiquitous Transport-Level Encryption 19th USENIX Security Symposium-2010 - Washington DC, USA Security
Busting Frame Busting: A Study Of Clickjacking Vulnerabilities On Popular Sites (Invited Talk) 4th USENIX Workshop on Offensive Technologies -2010 - Washington DC, USA Security
Framing Attacks On Smart Phones And Dumb Routers: Tap-Jacking And Geo-Localization Attacks 4th USENIX Workshop on Offensive Technologies -2010 - Washington DC, USA Security
Webseclab Security Education Workbench 3rd Workshop on Cyber Security Experimentation and Test -2010 - Washington DC, USA Security
An Analysis Of Private Browsing Modes In Modern Browsers 19th USENIX Security Symposium-2010 - Washington DC, USA Security Analysis
Kartograph : Finding A Needle In A Haystack Or How To Apply Reverse Engineering Techniques To Cheat Atvideo Games DEF CON-18 - Las Vegas, USA Security
Embedded Management Interfaces: Emerging Massive Insecurity Blackhat USA-2009 - Las Vegas, USA Security
Cryptographic Keys 17th USENIX Security Symposium-2008 - San Jose, USA Security
Transaction Generators: Root Kits For Web 2nd USENIX Workshop on Hot Topics in Security-2007 - Boston, USA Security
Sane: A Protection Architecture For Enterprise Networks 15th USENIX Security Symposium-2006 - Vancouver, Canada Security
Stronger Password Authentication Using Browser Extensions 14th USENIX Security Symposium-2005 - Baltimore, USA Security Browser
Remote Timing Attacks Are Practical 12th USENIX Security Symposium-2003 - Washington DC, USA Security
The Road Less Traveled 12th USENIX Security Symposium-2003 - Washington DC, USA Security
Keynote:Recent Crypto Attacks and a New Approach to PKI First-2002 - Waikoala Village,Hawaii
A Method For Fast Revocation Of Public Key Certificates And Security Capabilities 10th USENIX Security Symposium-2001 - Washington DC, USA Security Privacy
Building Intrusion-Tolerant Applications 8th USENIX Security Symposium-1999 - Washington DC, USA Security