Follow
Bryan Parno
Title
Cited by
Cited by
Year
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
R Gennaro, C Gentry, B Parno
Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010
13702010
Pinocchio: Nearly practical verifiable computation
B Parno, J Howell, C Gentry, M Raykova
Communications of the ACM 59 (2), 103-112, 2016
11762016
Flicker: An execution infrastructure for TCB minimization
JM McCune, BJ Parno, A Perrig, MK Reiter, H Isozaki
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer …, 2008
9862008
Distributed detection of node replication attacks in sensor networks
B Parno, A Perrig, V Gligor
2005 IEEE symposium on security and privacy (S&P'05), 49-63, 2005
9622005
Quadratic span programs and succinct NIZKs without PCPs
R Gennaro, C Gentry, B Parno, M Raykova
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
8532013
Challenges in securing vehicular networks
B Parno, A Perrig
Workshop on hot topics in networks (HotNets-IV), 1-6, 2005
7082005
Securing anti-virus software with virtualization
JH Wang, JR Lorch, BJ Parno
US Patent 8,307,443, 2012
4402012
How to delegate and verify in public: Verifiable computation from attribute-based encryption
B Parno, M Raykova, V Vaikuntanathan
Theory of Cryptography: 9th Theory of Cryptography Conference, TCC 2012 …, 2012
4342012
Permacoin: Repurposing bitcoin work for data preservation
A Miller, A Juels, E Shi, B Parno, J Katz
2014 IEEE Symposium on Security and Privacy, 475-490, 2014
3862014
IronFleet: proving practical distributed systems correct
C Hawblitzel, J Howell, M Kapritsos, JR Lorch, B Parno, ML Roberts, ...
Proceedings of the 25th Symposium on Operating Systems Principles, 1-17, 2015
3792015
Phoolproof phishing prevention
B Parno, C Kuo, A Perrig
Financial Cryptography 4107, 1-19, 2006
3242006
User-driven access control: Rethinking permission granting in modern operating systems
F Roesner, T Kohno, A Moshchuk, B Parno, HJ Wang, C Cowan
2012 IEEE Symposium on Security and Privacy, 224-238, 2012
3002012
Portcullis: Protecting connection setup from denial-of-capability attacks
B Parno, D Wendlandt, E Shi, A Perrig, B Maggs, YC Hu
ACM SIGCOMM Computer Communication Review 37 (4), 289-300, 2007
2842007
Geppetto: Versatile verifiable computation
C Costello, C Fournet, J Howell, M Kohlweiss, B Kreuter, M Naehrig, ...
2015 IEEE Symposium on Security and Privacy, 253-270, 2015
2612015
Ironclad apps: End-to-end security via automated full-system verification
C Hawblitzel, J Howell, JR Lorch, A Narayan, B Parno, D Zhang, B Zill
11th {USENIX} Symposium on Operating Systems Design and Implementation …, 2014
2542014
Bootstrapping trust in commodity computers
B Parno, JM McCune, A Perrig
2010 IEEE Symposium on Security and Privacy, 414-429, 2010
2132010
Bootstrapping Trust in a "Trusted" Platform.
B Parno
HotSec, 2008
1752008
Komodo: Using verification to disentangle secure-enclave hardware from software
A Ferraiuolo, A Baumann, C Hawblitzel, B Parno
Proceedings of the 26th Symposium on Operating Systems Principles, 287-305, 2017
1642017
Resolving the conflict between generality and plausibility in verified computation
S Setty, B Braun, V Vu, AJ Blumberg, B Parno, M Walfish
Proceedings of the 8th ACM European Conference on Computer Systems, 71-84, 2013
1552013
Vale: Verifying High-Performance Cryptographic Assembly Code.
B Bond, C Hawblitzel, M Kapritsos, KRM Leino, JR Lorch, B Parno, ...
USENIX Security Symposium 152, 2017
1522017
The system can't perform the operation now. Try again later.
Articles 1–20