Obserwuj
Hovav Shacham
Hovav Shacham
Professor of Computer Science, The University of Texas at Austin
Zweryfikowany adres z cs.utexas.edu - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Short signatures from the Weil pairing
D Boneh, B Lynn, H Shacham
International conference on the theory and application of cryptology and …, 2001
44112001
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
T Ristenpart, E Tromer, H Shacham, S Savage
Proceedings of the 16th ACM conference on Computer and communications …, 2009
30282009
Short group signatures
D Boneh, X Boyen, H Shacham
Annual international cryptology conference, 41-55, 2004
28052004
Aggregate and verifiably encrypted signatures from bilinear maps
D Boneh, C Gentry, B Lynn, H Shacham
Advances in Cryptology—EUROCRYPT 2003: International Conference on the …, 2003
27212003
Compact proofs of retrievability
H Shacham, B Waters
Journal of cryptology 26 (3), 442-483, 2013
26242013
Experimental security analysis of a modern automobile
K Koscher, A Czeskis, F Roesner, S Patel, T Kohno, S Checkoway, ...
2010 IEEE symposium on security and privacy, 447-462, 2010
25522010
Comprehensive experimental analyses of automotive attack surfaces
S Checkoway, D McCoy, B Kantor, D Anderson, H Shacham, S Savage, ...
20th USENIX security symposium (USENIX Security 11), 2011
22742011
The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
H Shacham
Proceedings of the 14th ACM conference on Computer and communications …, 2007
20442007
Short signatures from the Weil pairing
D Boneh, B Lynn, H Shacham
Journal of cryptology 17, 297-319, 2004
18582004
On the effectiveness of address-space randomization
H Shacham, M Page, B Pfaff, EJ Goh, N Modadugu, D Boneh
Proceedings of the 11th ACM conference on Computer and communications …, 2004
13532004
Return-oriented programming without returns
S Checkoway, L Davi, A Dmitrienko, AR Sadeghi, H Shacham, ...
Proceedings of the 17th ACM conference on Computer and communications …, 2010
8442010
SiRiUS: Securing Remote Untrusted Storage.
EJ Goh, H Shacham, N Modadugu, D Boneh
NDSS 3, 131-145, 2003
8212003
Group signatures with verifier-local revocation
D Boneh, H Shacham
Proceedings of the 11th ACM conference on Computer and communications …, 2004
8132004
Return-oriented programming: Systems, languages, and applications
R Roemer, E Buchanan, H Shacham, S Savage
ACM Transactions on Information and System Security (TISSEC) 15 (1), 1-34, 2012
7832012
When good instructions go bad: Generalizing return-oriented programming to RISC
E Buchanan, R Roemer, H Shacham, S Savage
Proceedings of the 15th ACM conference on Computer and communications …, 2008
5702008
Pixel perfect: Fingerprinting canvas in HTML5
K Mowery, H Shacham
Proceedings of W2SP 2012, 2012
5152012
Sequential aggregate signatures and multisignatures without random oracles
S Lu, R Ostrovsky, A Sahai, H Shacham, B Waters
Advances in Cryptology-EUROCRYPT 2006: 24th Annual International Conference …, 2006
4682006
Sequential aggregate signatures from trapdoor permutations
A Lysyanskaya, S Micali, L Reyzin, H Shacham
Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004
4572004
Randomizable proofs and delegatable anonymous credentials
M Belenkiy, J Camenisch, M Chase, M Kohlweiss, A Lysyanskaya, ...
Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology …, 2009
3922009
Iago attacks: Why the system call API is a bad untrusted RPC interface
S Checkoway, H Shacham
ACM SIGARCH Computer Architecture News 41 (1), 253-264, 2013
3912013
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20