Folgen
David Freeman
David Freeman
Meta Platforms Inc.
Bestätigte E-Mail-Adresse bei cs.stanford.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
A taxonomy of pairing-friendly elliptic curves
D Freeman, M Scott, E Teske
Journal of cryptology 23, 224-280, 2010
6932010
Signing a linear subspace: Signature schemes for network coding
D Boneh, D Freeman, J Katz, B Waters
Public Key Cryptography–PKC 2009: 12th International Conference on Practice …, 2009
4482009
Converting pairing-based cryptosystems from composite-order groups to prime-order groups
DM Freeman
Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010
3982010
Homomorphic signatures for polynomial functions
D Boneh, DM Freeman
Advances in Cryptology–EUROCRYPT 2011: 30th Annual International Conference …, 2011
3762011
Functional encryption for inner product predicates from learning with errors
S Agrawal, DM Freeman, V Vaikuntanathan
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
2962011
Machine learning and security: Protecting systems with data and algorithms
C Chio, D Freeman
" O'Reilly Media, Inc.", 2018
2942018
Linearly homomorphic signatures over binary fields and new tools for lattice-based signatures
D Boneh, DM Freeman
International Workshop on Public Key Cryptography, 1-16, 2011
2872011
Detecting clusters of fake accounts in online social networks
C Xiao, DM Freeman, T Hwa
Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security …, 2015
2312015
Constructing pairing-friendly elliptic curves with embedding degree 10
D Freeman
International Algorithmic Number Theory Symposium, 452-465, 2006
1752006
Who Are You? A Statistical Approach to Measuring User Authenticity.
D Freeman, S Jain, M Dürmuth, B Biggio, G Giacinto
NDSS 16, 21-24, 2016
1682016
Improved security for linearly homomorphic signatures: A generic framework
DM Freeman
Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012
1472012
More constructions of lossy and correlation-secure trapdoor functions
DM Freeman, O Goldreich, E Kiltz, A Rosen, G Segev
Public Key Cryptography–PKC 2010: 13th International Conference on Practice …, 2010
1402010
“real attackers don't compute gradients”: bridging the gap between adversarial ml research and practice
G Apruzzese, HS Anderson, S Dambra, D Freeman, F Pierazzi, K Roundy
2023 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML), 339-364, 2023
1082023
Using naive bayes to detect spammy names in social networks
DM Freeman
Proceedings of the 2013 ACM workshop on Artificial intelligence and security …, 2013
862013
Deniable encryption with negligible detection probability: An interactive construction
M Dürmuth, DM Freeman
Advances in Cryptology–EUROCRYPT 2011: 30th Annual International Conference …, 2011
692011
Preventing pollution attacks in multi-source network coding
S Agrawal, D Boneh, X Boyen, DM Freeman
Public Key Cryptography–PKC 2010: 13th International Conference on Practice …, 2010
652010
Deep entity classification: Abusive account detection for online social networks
T Xu, G Goossen, HK Cevahir, S Khodeir, Y Jin, F Li, S Shan, S Patel, ...
30th {USENIX} Security Symposium ({USENIX} Security 21), 2021
592021
More constructions of lossy and correlation-secure trapdoor functions
DM Freeman, O Goldreich, E Kiltz, A Rosen, G Segev
Journal of cryptology 26, 39-74, 2013
562013
Limitations on transformations from composite-order to prime-order groups: The case of round-optimal blind signatures
S Meiklejohn, H Shacham, DM Freeman
Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the …, 2010
542010
Abelian varieties with prescribed embedding degree
D Freeman, P Stevenhagen, M Streng
International Algorithmic Number Theory Symposium, 60-73, 2008
462008
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20