Pinocchio: Nearly Practical Verifiable Computation
Parno, B., Howell, J., Gentry, C., Raykova, M.
Published in 2013 IEEE Symposium on Security and Privacy (01.05.2013)
Published in 2013 IEEE Symposium on Security and Privacy (01.05.2013)
Get full text
Conference Proceeding
Distributed detection of node replication attacks in sensor networks
Parno, B., Perrig, A., Gligor, V.
Published in 2005 IEEE Symposium on Security and Privacy (S&P'05) (2005)
Published in 2005 IEEE Symposium on Security and Privacy (S&P'05) (2005)
Get full text
Conference Proceeding
Defending a P2P digital preservation system
Parno, B., Roussopoulos, M.
Published in IEEE transactions on dependable and secure computing (01.10.2004)
Published in IEEE transactions on dependable and secure computing (01.10.2004)
Get full text
Journal Article
User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems
Roesner, F., Kohno, T., Moshchuk, A., Parno, B., Wang, H. J., Cowan, C.
Published in 2012 IEEE Symposium on Security and Privacy (01.05.2012)
Published in 2012 IEEE Symposium on Security and Privacy (01.05.2012)
Get full text
Conference Proceeding
Memoir: Practical State Continuity for Protected Modules
Parno, B., Lorch, J. R., Douceur, J. R., Mickens, J., McCune, J. M.
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Published in 2011 IEEE Symposium on Security and Privacy (01.05.2011)
Get full text
Conference Proceeding
CLAMP: Practical Prevention of Large-Scale Data Leaks
Parno, B., McCune, J.M., Wendlandt, D., Andersen, D.G., Perrig, A.
Published in 2009 30th IEEE Symposium on Security and Privacy (01.05.2009)
Published in 2009 30th IEEE Symposium on Security and Privacy (01.05.2009)
Get full text
Conference Proceeding
Minimal TCB Code Execution
McCune, J.M., Parno, B., Perrig, A., Reiter, M.K., Seshadri, A.
Published in 2007 IEEE Symposium on Security and Privacy (SP '07) (01.05.2007)
Published in 2007 IEEE Symposium on Security and Privacy (SP '07) (01.05.2007)
Get full text
Conference Proceeding