Private database queries using somewhat homomorphic encryption D Boneh, C Gentry, S Halevi, F Wang, DJ Wu Applied Cryptography and Network Security: 11th International Conference …, 2013 | 265 | 2013 |
Stegotorus: a camouflage proxy for the tor anonymity system Z Weinberg, J Wang, V Yegneswaran, L Briesemeister, S Cheung, ... Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 247 | 2012 |
Splinter: Practical private queries on public data F Wang, C Yun, S Goldwasser, V Vaikuntanathan, M Zaharia 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2017 | 131 | 2017 |
Sieve: Cryptographically enforced access control for user data in untrusted clouds F Wang, J Mickens, N Zeldovich, V Vaikuntanathan 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2016 | 98 | 2016 |
Riverbed: Enforcing user-defined privacy constraints in distributed web services F Wang, R Ko, J Mickens 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2019 | 58 | 2019 |
Theoretical analysis of the effect of particle size and support on the kinetics of oxygen reduction reaction on platinum nanoparticles V Viswanathan, FYF Wang Nanoscale 4 (16), 5110-5117, 2012 | 47 | 2012 |
Vulnerability factors in new web applications: Audit tools, developer selection & languages J Bau, F Wang, E Bursztein, P Mutchler, JC Mitchell Stanford, Tech. Rep, 2012 | 34 | 2012 |
Declarative privacy policy: finite models and attribute-based encryption PE Lam, JC Mitchell, A Scedrov, S Sundaram, F Wang Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium …, 2012 | 15 | 2012 |
Monte Carlo-based approach for simulating nanostructured catalytic and electrocatalytic systems V Viswanathan, F Wang, H Pitsch Computing in Science & Engineering 14 (2), 60-69, 2011 | 12 | 2011 |
Veil: Private Browsing Semantics Without Browser-side Assistance. F Wang, J Mickens, N Zeldovich NDSS, 2018 | 7 | 2018 |
Cobweb: Practical remote attestation using contextual graphs F Wang, Y Joung, J Mickens Proceedings of the 2nd Workshop on System Software for Trusted Execution, 1-7, 2017 | 7 | 2017 |
Cryptographically enforced access control for user data in untrusted clouds FYF Wang Massachusetts Institute of Technology, 2016 | 5 | 2016 |
Offloading critical security operations to the gpu FYF Wang Diss. Stanford University, 2011 | 2 | 2011 |
Preventing data leakage in web services FYF Wang Massachusetts Institute of Technology, 2018 | | 2018 |
A BIMONTHLY PUBLICATION OF THE IEEE AEROSPACE AND ELECTRONIC SYSTEMS SOCIETY RB Atitallah, V Viswanathan, N Belanger, JL Dekeyser, M Yu, L Gong, ... | | |