Obserwuj
Ariel J. Feldman
Ariel J. Feldman
Software Engineer, Google
Zweryfikowany adres z arifeldman.com - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Lest We Remember: Cold-Boot Attacks on Encryption Keys
JA Halderman, SD Schoen, N Heninger, W Clarkson, W Paul, ...
17th USENIX Security Symposium (Sec '08), 2008
18942008
SPORC: Group Collaboration using Untrusted Cloud Resources.
AJ Feldman, WP Zeller, MJ Freedman, EW Felten
9th USENIX conference on Operating systems design and implementation (OSDI …, 2010
3922010
Security analysis of the Diebold AccuVote-TS voting machine
AJ Feldman, JA Halderman, EW Felten
2007 USENIX/ACCURATE Electronic Voting Technology Workshop (EVT '07) 13, 2007
2692007
Verifying computations with state
B Braun, AJ Feldman, Z Ren, S Setty, AJ Blumberg, M Walfish
24th ACM Symposium on Operating Systems Principles (SOSP '13), 341-357, 2013
2452013
Can DREs provide long-lasting security? The case of return-oriented programming and the AVC Advantage
S Checkoway, AJ Feldman, B Kantor, JA Halderman, EW Felten, ...
2009 USENIX/ACCURATE/IAVoSS Electronic Voting Technology Workshop (EVT/WOTE …, 2009
1422009
Social networking with Frientegrity: privacy and integrity with an untrusted provider
AJ Feldman, A Blankstein, MJ Freedman, EW Felten
21st USENIX Security Symposium (Sec '12), 2012
872012
Source code review of the Diebold voting system
JA Calandrino, AJ Feldman, JA Halderman, D Wagner, H Yu, WP Zeller
University of California, Berkeley under contract to the California …, 2007
612007
Internet Filters: A Public Policy Report, Second Edition
M Heins, C Cho, A Feldman
Brennan Center for Justice at NYU School of Law, 2006
55*2006
Verifiable differential privacy
A Narayan, A Feldman, A Papadimitriou, A Haeberlen
Proceedings of the Tenth European Conference on Computer Systems, 1-14, 2015
412015
Using differential privacy to efficiently mitigate side channels in distributed analytics
M Xu, A Papadimitriou, A Feldman, A Haeberlen
Proceedings of the 11th European Workshop on Systems Security, 1-6, 2018
202018
Strongbox: Confidentiality, integrity, and performance using stream ciphers for full drive encryption
B Dickens III, HS Gunawi, AJ Feldman, H Hoffmann
Proceedings of the Twenty-Third International Conference on Architectural …, 2018
182018
On subliminal channels in encrypt-on-cast voting systems
AJ Feldman, J Benaloh
2009 USENIX/ACCURATE/IAVoSS Electronic Voting Technology Workshop (EVT/WOTE …, 2009
132009
Hermetic: Privacy-preserving distributed analytics without (most) side channels
M Xu, A Papadimitriou, A Haeberlen, A Feldman
External Links: Link Cited by, 2019
112019
Stream ciphers for digital storage encryption
B Dickens III, H Gunawi, A Feldman, H Hoffmann
US Patent 11,139,959, 2021
102021
Privacy and integrity in the untrusted cloud
AJ Feldman
Princeton University, 2012
102012
Privacy and Integrity are Possible in the Untrusted Cloud
AJ Feldman, A Blankstein, MJ Freedman, EW Felten
IEEE Data Eng. Bull. 35 (4), 73-82, 2012
92012
Lemonade from lemons: Harnessing device wearout to create limited-use security architectures
Z Deng, A Feldman, SA Kurtz, FT Chong
ACM SIGARCH Computer Architecture News 45 (2), 361-374, 2017
72017
Verifying computations with state (extended version)
B Braun, AJ Feldman, Z Ren, S Setty, AJ Blumberg, M Walfish
Cryptology ePrint Archive, 2013
52013
AVC Advantage: Hardware functional specifications
JA Halderman, AJ Feldman
Technical Report TR-816-08, Department of Computer Science, Princeton …, 2008
52008
Internet Filters
M Heins, C Cho, A FELDMAN
A Public Policy Report, Free Expression Policy Project, National Coalition …, 2001
22001
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20