Bryan Parno
According to our database1,
Bryan Parno
authored at least 71 papers
between 2003 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
On csauthors.net:
Bibliography
2022
2021
IACR Cryptol. ePrint Arch., 2021
Self-Repairing Neural Networks: Provable Safety for Deep Networks via Dynamic Repair.
CoRR, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the 18th USENIX Symposium on Networked Systems Design and Implementation, 2021
Proceedings of the 18th USENIX Symposium on Networked Systems Design and Implementation, 2021
Proceedings of the 9th International Conference on Learning Representations, 2021
Proceedings of the ASPLOS '21: 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2021
2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Verified Transformations and Hoare Logic: Beautiful Proofs for Ugly Assembly Language.
Proceedings of the Software Verification - 12th International Conference, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 41st ACM SIGPLAN International Conference on Programming Language Design and Implementation, 2020
Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Proc. ACM Program. Lang., 2019
IACR Cryptol. ePrint Arch., 2019
2017
Commun. ACM, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 26th Symposium on Operating Systems Principles, 2017
Proceedings of the 2nd Summit on Advances in Programming Languages, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
2015
IEICE Trans. Commun., 2015
Proceedings of the 25th Symposium on Operating Systems Principles, 2015
2014
Proceedings of the 2014 USENIX Annual Technical Conference, 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014
Trust Extension as a Mechanism for Secure Code Execution on Commodity Computers (dissertation, updated version).
ACM Books 2, ACM / Morgan & Claypool, ISBN: 978-1-62705-477-5, 2014
2013
Proceedings of the 2013 USENIX Annual Technical Conference, 2013
Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, 2013
Proceedings of the 11th USENIX conference on File and Storage Technologies, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
The first workshop on language support for privacy-enhancing technologies (PETShop'13).
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the PETShop'13, 2013
2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Lockdown: Towards a Safe and Practical Architecture for Security Applications on Commodity Platforms.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012
User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems.
Proceedings of the IEEE Symposium on Security and Privacy, 2012
2011
Springer Briefs in Computer Science 10, Springer, ISBN: 978-1-4614-1460-5, 2011
How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the Tenth ACM Workshop on Hot Topics in Networks (HotNets-X), 2011
2010
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 2009
2008
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security.
IACR Cryptol. ePrint Arch., 2008
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
Proceedings of the 2008 EuroSys Conference, Glasgow, Scotland, UK, April 1-4, 2008, 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
How low can you go?: recommendations for hardware-supported minimal TCB code execution.
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, 2008
2007
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Proceedings of the ACM SIGCOMM 2007 Conference on Applications, 2007
2006
Proceedings of the Financial Cryptography and Data Security, 2006
Proceedings of the 2006 ACM Conference on Emerging Network Experiment and Technology, 2006
2005
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005
2004
IEEE Trans. Dependable Secur. Comput., 2004
2003
Proceedings of the 17th Conference on Systems Administration (LISA 2003), 2003