Follow
Bryan Parno
Title
Cited by
Cited by
Year
Non-interactive verifiable computing: Outsourcing computation to untrusted workers
R Gennaro, C Gentry, B Parno
Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010
14412010
Pinocchio: Nearly practical verifiable computation
B Parno, J Howell, C Gentry, M Raykova
Communications of the ACM 59 (2), 103-112, 2016
13532016
Flicker: An execution infrastructure for TCB minimization
JM McCune, BJ Parno, A Perrig, MK Reiter, H Isozaki
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer …, 2008
9942008
Quadratic span programs and succinct NIZKs without PCPs
R Gennaro, C Gentry, B Parno, M Raykova
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
9832013
Distributed detection of node replication attacks in sensor networks
B Parno, A Perrig, V Gligor
2005 IEEE symposium on security and privacy (S&P'05), 49-63, 2005
9722005
Challenges in securing vehicular networks
B Parno, A Perrig
Workshop on hot topics in networks (HotNets-IV), 1-6, 2005
7272005
Securing anti-virus software with virtualization
JH Wang, JR Lorch, BJ Parno
US Patent 8,307,443, 2012
4492012
How to delegate and verify in public: Verifiable computation from attribute-based encryption
B Parno, M Raykova, V Vaikuntanathan
Theory of Cryptography: 9th Theory of Cryptography Conference, TCC 2012 …, 2012
4472012
IronFleet: proving practical distributed systems correct
C Hawblitzel, J Howell, M Kapritsos, JR Lorch, B Parno, ML Roberts, ...
Proceedings of the 25th Symposium on Operating Systems Principles, 1-17, 2015
4212015
Permacoin: Repurposing bitcoin work for data preservation
A Miller, A Juels, E Shi, B Parno, J Katz
2014 IEEE Symposium on Security and Privacy, 475-490, 2014
4072014
Phoolproof phishing prevention
B Parno, C Kuo, A Perrig
Financial Cryptography and Data Security: 10th International Conference, FC …, 2006
3292006
User-driven access control: Rethinking permission granting in modern operating systems
F Roesner, T Kohno, A Moshchuk, B Parno, HJ Wang, C Cowan
2012 IEEE Symposium on Security and Privacy, 224-238, 2012
3102012
Geppetto: Versatile verifiable computation
C Costello, C Fournet, J Howell, M Kohlweiss, B Kreuter, M Naehrig, ...
2015 IEEE Symposium on Security and Privacy, 253-270, 2015
2912015
Portcullis: Protecting connection setup from denial-of-capability attacks
B Parno, D Wendlandt, E Shi, A Perrig, B Maggs, YC Hu
ACM SIGCOMM Computer Communication Review 37 (4), 289-300, 2007
2822007
Ironclad apps:{End-to-End} security via automated {Full-System} verification
C Hawblitzel, J Howell, JR Lorch, A Narayan, B Parno, D Zhang, B Zill
11th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2014
2722014
Bootstrapping trust in commodity computers
B Parno, JM McCune, A Perrig
2010 IEEE Symposium on Security and Privacy, 414-429, 2010
2192010
Komodo: Using verification to disentangle secure-enclave hardware from software
A Ferraiuolo, A Baumann, C Hawblitzel, B Parno
Proceedings of the 26th Symposium on Operating Systems Principles, 287-305, 2017
2002017
Bootstrapping Trust in a "Trusted" Platform.
B Parno
HotSec, 2008
1832008
Vale: Verifying {High-Performance} Cryptographic Assembly Code
B Bond, C Hawblitzel, M Kapritsos, KRM Leino, JR Lorch, B Parno, ...
26th USENIX security symposium (USENIX security 17), 917-934, 2017
1742017
Resolving the conflict between generality and plausibility in verified computation
S Setty, B Braun, V Vu, AJ Blumberg, B Parno, M Walfish
Proceedings of the 8th ACM European Conference on Computer Systems, 71-84, 2013
1662013
The system can't perform the operation now. Try again later.
Articles 1–20