Non-interactive verifiable computing: Outsourcing computation to untrusted workers R Gennaro, C Gentry, B Parno Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010 | 1466 | 2010 |
Pinocchio: Nearly practical verifiable computation B Parno, J Howell, C Gentry, M Raykova Communications of the ACM 59 (2), 103-112, 2016 | 1403 | 2016 |
Quadratic span programs and succinct NIZKs without PCPs R Gennaro, C Gentry, B Parno, M Raykova Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013 | 1016 | 2013 |
Flicker: An execution infrastructure for TCB minimization JM McCune, BJ Parno, A Perrig, MK Reiter, H Isozaki Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer …, 2008 | 1007 | 2008 |
Distributed detection of node replication attacks in sensor networks B Parno, A Perrig, V Gligor 2005 IEEE symposium on security and privacy (S&P'05), 49-63, 2005 | 975 | 2005 |
Challenges in securing vehicular networks B Parno, A Perrig Workshop on hot topics in networks (HotNets-IV), 1-6, 2005 | 736 | 2005 |
Securing anti-virus software with virtualization JH Wang, JR Lorch, BJ Parno US Patent 8,307,443, 2012 | 454 | 2012 |
How to delegate and verify in public: Verifiable computation from attribute-based encryption B Parno, M Raykova, V Vaikuntanathan Theory of Cryptography: 9th Theory of Cryptography Conference, TCC 2012 …, 2012 | 450 | 2012 |
IronFleet: proving practical distributed systems correct C Hawblitzel, J Howell, M Kapritsos, JR Lorch, B Parno, ML Roberts, ... Proceedings of the 25th Symposium on Operating Systems Principles, 1-17, 2015 | 432 | 2015 |
Permacoin: Repurposing bitcoin work for data preservation A Miller, A Juels, E Shi, B Parno, J Katz 2014 IEEE Symposium on Security and Privacy, 475-490, 2014 | 412 | 2014 |
Phoolproof phishing prevention B Parno, C Kuo, A Perrig Financial Cryptography and Data Security: 10th International Conference, FC …, 2006 | 333 | 2006 |
User-driven access control: Rethinking permission granting in modern operating systems F Roesner, T Kohno, A Moshchuk, B Parno, HJ Wang, C Cowan 2012 IEEE Symposium on Security and Privacy, 224-238, 2012 | 314 | 2012 |
Geppetto: Versatile verifiable computation C Costello, C Fournet, J Howell, M Kohlweiss, B Kreuter, M Naehrig, ... 2015 IEEE Symposium on Security and Privacy, 253-270, 2015 | 301 | 2015 |
Portcullis: Protecting connection setup from denial-of-capability attacks B Parno, D Wendlandt, E Shi, A Perrig, B Maggs, YC Hu ACM SIGCOMM Computer Communication Review 37 (4), 289-300, 2007 | 286 | 2007 |
Ironclad apps:{End-to-End} security via automated {Full-System} verification C Hawblitzel, J Howell, JR Lorch, A Narayan, B Parno, D Zhang, B Zill 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2014 | 278 | 2014 |
Bootstrapping trust in commodity computers B Parno, JM McCune, A Perrig 2010 IEEE Symposium on Security and Privacy, 414-429, 2010 | 221 | 2010 |
Komodo: Using verification to disentangle secure-enclave hardware from software A Ferraiuolo, A Baumann, C Hawblitzel, B Parno Proceedings of the 26th Symposium on Operating Systems Principles, 287-305, 2017 | 208 | 2017 |
Bootstrapping Trust in a "Trusted" Platform. B Parno HotSec, 2008 | 184 | 2008 |
Vale: Verifying {High-Performance} Cryptographic Assembly Code B Bond, C Hawblitzel, M Kapritsos, KRM Leino, JR Lorch, B Parno, ... 26th USENIX security symposium (USENIX security 17), 917-934, 2017 | 183 | 2017 |
SoK: Computer-aided cryptography M Barbosa, G Barthe, K Bhargavan, B Blanchet, C Cremers, K Liao, ... 2021 IEEE symposium on security and privacy (SP), 777-795, 2021 | 175 | 2021 |