Bryan Parno
Title
Cited by
Cited by
Year
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
R Gennaro, C Gentry, B Parno
Annual Cryptology Conference, 465-482, 2010
10582010
Distributed detection of node replication attacks in sensor networks
B Parno, A Perrig, V Gligor
2005 IEEE Symposium on Security and Privacy (S&P'05), 49-63, 2005
8692005
Flicker: An execution infrastructure for TCB minimization
JM McCune, BJ Parno, A Perrig, MK Reiter, H Isozaki
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer …, 2008
8102008
Pinocchio: Nearly practical verifiable computation
B Parno, J Howell, C Gentry, M Raykova
2013 IEEE Symposium on Security and Privacy, 238-252, 2013
6202013
Challenges in securing vehicular networks
B Parno, A Perrig
Workshop on hot topics in networks (HotNets-IV), 1-6, 2005
6112005
Quadratic span programs and succinct NIZKs without PCPs
R Gennaro, C Gentry, B Parno, M Raykova
Annual International Conference on the Theory and Applications of …, 2013
4412013
How to delegate and verify in public: Verifiable computation from attribute-based encryption
B Parno, M Raykova, V Vaikuntanathan
Theory of Cryptography Conference, 422-439, 2012
3592012
Securing anti-virus software with virtualization
JH Wang, JR Lorch, BJ Parno
US Patent 8,307,443, 2012
3162012
Phoolproof phishing prevention
B Parno, C Kuo, A Perrig
International conference on financial cryptography and data security, 1-19, 2006
2822006
User-driven access control: Rethinking permission granting in modern operating systems
F Roesner, T Kohno, A Moshchuk, B Parno, HJ Wang, C Cowan
2012 IEEE Symposium on Security and Privacy, 224-238, 2012
2492012
Portcullis: Protecting connection setup from denial-of-capability attacks
B Parno, D Wendlandt, E Shi, A Perrig, B Maggs, YC Hu
ACM SIGCOMM Computer Communication Review 37 (4), 289-300, 2007
2402007
Permacoin: Repurposing bitcoin work for data preservation
A Miller, A Juels, E Shi, B Parno, J Katz
2014 IEEE Symposium on Security and Privacy, 475-490, 2014
2232014
IronFleet: proving practical distributed systems correct
C Hawblitzel, J Howell, M Kapritsos, JR Lorch, B Parno, ML Roberts, ...
Proceedings of the 25th Symposium on Operating Systems Principles, 1-17, 2015
2182015
Ironclad apps: End-to-end security via automated full-system verification
C Hawblitzel, J Howell, JR Lorch, A Narayan, B Parno, D Zhang, B Zill
11th {USENIX} Symposium on Operating Systems Design and Implementation …, 2014
1752014
Bootstrapping trust in commodity computers
B Parno, JM McCune, A Perrig
2010 IEEE Symposium on Security and Privacy, 414-429, 2010
1752010
Process mining
W Van Der Aalst
Communications of the ACM 55 (8), 76-83, 2012
166*2012
Geppetto: Versatile verifiable computation
C Costello, C Fournet, J Howell, M Kohlweiss, B Kreuter, M Naehrig, ...
2015 IEEE Symposium on Security and Privacy, 253-270, 2015
1462015
Bootstrapping Trust in a "Trusted" Platform.
B Parno
HotSec, 2008
1412008
Secure sensor network routing: A clean-slate approach
B Parno, M Luk, E Gaustad, A Perrig
Proceedings of the 2006 ACM CoNEXT conference, 1-13, 2006
1122006
Resolving the conflict between generality and plausibility in verified computation
S Setty, B Braun, V Vu, AJ Blumberg, B Parno, M Walfish
Proceedings of the 8th ACM European Conference on Computer Systems, 71-84, 2013
1072013
The system can't perform the operation now. Try again later.
Articles 1–20