Frank Wang
Frank Wang
MIT CSAIL
E-mail megerősítve itt: mit.edu - Kezdőlap
Cím
Hivatkozott rá
Hivatkozott rá
Év
Private database queries using somewhat homomorphic encryption
D Boneh, C Gentry, S Halevi, F Wang, DJ Wu
International Conference on Applied Cryptography and Network Security, 102-118, 2013
1892013
StegoTorus: a camouflage proxy for the Tor anonymity system
Z Weinberg, J Wang, V Yegneswaran, L Briesemeister, S Cheung, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1862012
Sieve: Cryptographically enforced access control for user data in untrusted clouds
F Wang, J Mickens, N Zeldovich, V Vaikuntanathan
13th {USENIX} Symposium on Networked Systems Design and Implementation …, 2016
562016
Splinter: Practical private queries on public data
F Wang, C Yun, S Goldwasser, V Vaikuntanathan, M Zaharia
14th {USENIX} Symposium on Networked Systems Design and Implementation …, 2017
532017
Theoretical analysis of the effect of particle size and support on the kinetics of oxygen reduction reaction on platinum nanoparticles
V Viswanathan, FYF Wang
Nanoscale 4 (16), 5110-5117, 2012
312012
Vulnerability factors in new web applications: Audit tools, developer selection & languages
J Bau, F Wang, E Bursztein, P Mutchler, JC Mitchell
Stanford, Tech. Rep, 2012
192012
Riverbed: Enforcing user-defined privacy constraints in distributed web services
F Wang, R Ko, J Mickens
16th {USENIX} Symposium on Networked Systems Design and Implementation …, 2019
142019
Declarative privacy policy: finite models and attribute-based encryption
PE Lam, JC Mitchell, A Scedrov, S Sundaram, F Wang
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium …, 2012
122012
Monte Carlo-based approach for simulating nanostructured catalytic and electrocatalytic systems
V Viswanathan, F Wang, H Pitsch
Computing in Science & Engineering 14 (2), 60-69, 2011
92011
Veil: Private Browsing Semantics Without Browser-side Assistance.
F Wang, J Mickens, N Zeldovich
NDSS, 2018
32018
Cobweb: Practical Remote Attestation Using Contextual Graphs
F Wang, Y Joung, J Mickens
Proceedings of the 2nd Workshop on System Software for Trusted Execution, 1-7, 2017
32017
Cryptographically enforced access control for user data in untrusted clouds
FYF Wang
Massachusetts Institute of Technology, 2016
22016
Offloading critical security operations to the gpu
FYF Wang
Diss. Stanford University, 2011
22011
Preventing data leakage in web services
FYF Wang
Massachusetts Institute of Technology, 2018
2018
A BIMONTHLY PUBLICATION OF THE IEEE AEROSPACE AND ELECTRONIC SYSTEMS SOCIETY
RB Atitallah, V Viswanathan, N Belanger, JL Dekeyser, M Yu, L Gong, ...
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–15