Volgen
Frank Wang
Frank Wang
MIT CSAIL
Geverifieerd e-mailadres voor mit.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Private database queries using somewhat homomorphic encryption
D Boneh, C Gentry, S Halevi, F Wang, DJ Wu
Applied Cryptography and Network Security: 11th International Conference …, 2013
2362013
Stegotorus: a camouflage proxy for the tor anonymity system
Z Weinberg, J Wang, V Yegneswaran, L Briesemeister, S Cheung, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2182012
Splinter: Practical Private Queries on Public Data.
F Wang, C Yun, S Goldwasser, V Vaikuntanathan, M Zaharia
NSDI, 299-313, 2017
1002017
Sieve: Cryptographically enforced access control for user data in untrusted clouds
F Wang, J Mickens, N Zeldovich, V Vaikuntanathan
13th {USENIX} Symposium on Networked Systems Design and Implementation …, 2016
782016
Theoretical analysis of the effect of particle size and support on the kinetics of oxygen reduction reaction on platinum nanoparticles
V Viswanathan, FYF Wang
Nanoscale 4 (16), 5110-5117, 2012
412012
Riverbed: Enforcing user-defined privacy constraints in distributed web services
F Wang, R Ko, J Mickens
16th {USENIX} Symposium on Networked Systems Design and Implementation …, 2019
352019
Vulnerability factors in new web applications: Audit tools, developer selection & languages
J Bau, F Wang, E Bursztein, P Mutchler, JC Mitchell
Stanford, Tech. Rep, 2012
302012
Declarative privacy policy: finite models and attribute-based encryption
PE Lam, JC Mitchell, A Scedrov, S Sundaram, F Wang
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium …, 2012
162012
Monte Carlo-based approach for simulating nanostructured catalytic and electrocatalytic systems
V Viswanathan, F Wang, H Pitsch
Computing in Science & Engineering 14 (2), 60-69, 2011
102011
Cobweb: Practical remote attestation using contextual graphs
F Wang, Y Joung, J Mickens
Proceedings of the 2nd Workshop on System Software for Trusted Execution, 1-7, 2017
62017
Veil: Private Browsing Semantics Without Browser-side Assistance.
F Wang, J Mickens, N Zeldovich
NDSS, 2018
52018
Cryptographically enforced access control for user data in untrusted clouds
FYF Wang
Massachusetts Institute of Technology, 2016
42016
Offloading critical security operations to the gpu
FYF Wang
Diss. Stanford University, 2011
22011
Preventing data leakage in web services
FYF Wang
Massachusetts Institute of Technology, 2018
2018
A BIMONTHLY PUBLICATION OF THE IEEE AEROSPACE AND ELECTRONIC SYSTEMS SOCIETY
RB Atitallah, V Viswanathan, N Belanger, JL Dekeyser, M Yu, L Gong, ...
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–15