Bryan Parno
Cited by
Cited by
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
R Gennaro, C Gentry, B Parno
Annual Cryptology Conference, 465-482, 2010
Distributed detection of node replication attacks in sensor networks
B Parno, A Perrig, V Gligor
2005 IEEE symposium on security and privacy (S&P'05), 49-63, 2005
Flicker: An execution infrastructure for TCB minimization
JM McCune, BJ Parno, A Perrig, MK Reiter, H Isozaki
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer …, 2008
Pinocchio: Nearly practical verifiable computation
B Parno, J Howell, C Gentry, M Raykova
2013 IEEE Symposium on Security and Privacy, 238-252, 2013
Challenges in securing vehicular networks
B Parno, A Perrig
Workshop on hot topics in networks (HotNets-IV), 1-6, 2005
Quadratic span programs and succinct NIZKs without PCPs
R Gennaro, C Gentry, B Parno, M Raykova
Annual International Conference on the Theory and Applications of …, 2013
How to delegate and verify in public: Verifiable computation from attribute-based encryption
B Parno, M Raykova, V Vaikuntanathan
Theory of Cryptography Conference, 422-439, 2012
Securing anti-virus software with virtualization
JH Wang, JR Lorch, BJ Parno
US Patent 8,307,443, 2012
Permacoin: Repurposing bitcoin work for data preservation
A Miller, A Juels, E Shi, B Parno, J Katz
2014 IEEE Symposium on Security and Privacy, 475-490, 2014
Phoolproof phishing prevention
B Parno, C Kuo, A Perrig
International conference on financial cryptography and data security, 1-19, 2006
IronFleet: proving practical distributed systems correct
C Hawblitzel, J Howell, M Kapritsos, JR Lorch, B Parno, ML Roberts, ...
Proceedings of the 25th Symposium on Operating Systems Principles, 1-17, 2015
User-driven access control: Rethinking permission granting in modern operating systems
F Roesner, T Kohno, A Moshchuk, B Parno, HJ Wang, C Cowan
2012 IEEE Symposium on Security and Privacy, 224-238, 2012
Portcullis: Protecting connection setup from denial-of-capability attacks
B Parno, D Wendlandt, E Shi, A Perrig, B Maggs, YC Hu
ACM SIGCOMM Computer Communication Review 37 (4), 289-300, 2007
Ironclad apps: End-to-end security via automated full-system verification
C Hawblitzel, J Howell, JR Lorch, A Narayan, B Parno, D Zhang, B Zill
11th {USENIX} Symposium on Operating Systems Design and Implementation …, 2014
Geppetto: Versatile verifiable computation
C Costello, C Fournet, J Howell, M Kohlweiss, B Kreuter, M Naehrig, ...
2015 IEEE Symposium on Security and Privacy, 253-270, 2015
Bootstrapping trust in commodity computers
B Parno, JM McCune, A Perrig
2010 IEEE Symposium on Security and Privacy, 414-429, 2010
Bootstrapping Trust in a "Trusted" Platform.
B Parno
HotSec, 2008
Resolving the conflict between generality and plausibility in verified computation
S Setty, B Braun, V Vu, AJ Blumberg, B Parno, M Walfish
Proceedings of the 8th ACM European Conference on Computer Systems, 71-84, 2013
Memoir: Practical state continuity for protected modules
B Parno, JR Lorch, JR Douceur, J Mickens, JM McCune
2011 IEEE Symposium on Security and Privacy, 379-394, 2011
Secure sensor network routing: A clean-slate approach
B Parno, M Luk, E Gaustad, A Perrig
Proceedings of the 2006 ACM CoNEXT conference, 1-13, 2006
The system can't perform the operation now. Try again later.
Articles 1–20