Lest We Remember: Cold-Boot Attacks on Encryption Keys JA Halderman, SD Schoen, N Heninger, W Clarkson, W Paul, ... 17th USENIX Security Symposium (Sec '08), 2008 | 1845 | 2008 |
SPORC: Group Collaboration using Untrusted Cloud Resources. AJ Feldman, WP Zeller, MJ Freedman, EW Felten 9th USENIX conference on Operating systems design and implementation (OSDI …, 2010 | 384 | 2010 |
Security analysis of the Diebold AccuVote-TS voting machine AJ Feldman, JA Halderman, EW Felten 2007 USENIX/ACCURATE Electronic Voting Technology Workshop (EVT '07) 13, 2007 | 265 | 2007 |
Verifying computations with state B Braun, AJ Feldman, Z Ren, S Setty, AJ Blumberg, M Walfish 24th ACM Symposium on Operating Systems Principles (SOSP '13), 341-357, 2013 | 233 | 2013 |
Can DREs provide long-lasting security? The case of return-oriented programming and the AVC Advantage S Checkoway, AJ Feldman, B Kantor, JA Halderman, EW Felten, ... 2009 USENIX/ACCURATE/IAVoSS Electronic Voting Technology Workshop (EVT/WOTE …, 2009 | 143 | 2009 |
Social networking with Frientegrity: privacy and integrity with an untrusted provider AJ Feldman, A Blankstein, MJ Freedman, EW Felten 21st USENIX Security Symposium (Sec '12), 2012 | 85 | 2012 |
Source code review of the Diebold voting system JA Calandrino, AJ Feldman, JA Halderman, D Wagner, H Yu, WP Zeller University of California, Berkeley under contract to the California …, 2007 | 60 | 2007 |
Internet Filters: A Public Policy Report, Second Edition M Heins, C Cho, A Feldman Brennan Center for Justice at NYU School of Law, 2006 | 55* | 2006 |
Verifiable differential privacy A Narayan, A Feldman, A Papadimitriou, A Haeberlen Proceedings of the Tenth European Conference on Computer Systems, 1-14, 2015 | 35 | 2015 |
Using differential privacy to efficiently mitigate side channels in distributed analytics M Xu, A Papadimitriou, A Feldman, A Haeberlen Proceedings of the 11th European Workshop on Systems Security, 1-6, 2018 | 19 | 2018 |
Strongbox: Confidentiality, integrity, and performance using stream ciphers for full drive encryption B Dickens III, HS Gunawi, AJ Feldman, H Hoffmann Proceedings of the Twenty-Third International Conference on Architectural …, 2018 | 17 | 2018 |
On subliminal channels in encrypt-on-cast voting systems AJ Feldman, J Benaloh 2009 USENIX/ACCURATE/IAVoSS Electronic Voting Technology Workshop (EVT/WOTE …, 2009 | 13 | 2009 |
Hermetic: Privacy-preserving distributed analytics without (most) side channels M Xu, A Papadimitriou, A Haeberlen, A Feldman External Links: Link Cited by, 2019 | 10 | 2019 |
Privacy and integrity in the untrusted cloud AJ Feldman Princeton University, 2012 | 9 | 2012 |
Lemonade from lemons: Harnessing device wearout to create limited-use security architectures Z Deng, A Feldman, SA Kurtz, FT Chong ACM SIGARCH Computer Architecture News 45 (2), 361-374, 2017 | 7 | 2017 |
Privacy and Integrity are Possible in the Untrusted Cloud AJ Feldman, A Blankstein, MJ Freedman, EW Felten IEEE Data Eng. Bull. 35 (4), 73-82, 2012 | 7 | 2012 |
Verifying computations with state (extended version) B Braun, AJ Feldman, Z Ren, S Setty, AJ Blumberg, M Walfish Cryptology ePrint Archive, 2013 | 5 | 2013 |
AVC Advantage: Hardware functional specifications JA Halderman, AJ Feldman Technical Report TR-816-08, Department of Computer Science, Princeton …, 2008 | 5 | 2008 |
Internet Filters M Heins, C Cho, A FELDMAN A Public Policy Report, Free Expression Policy Project, National Coalition …, 2001 | 2 | 2001 |
Integration of third-party encryption key managers with cloud services IS Lee, SD Telang, JC Chau, TM Dierks, AJ Feldman, HJ Freyer, N Keidar, ... US Patent 11,611,558, 2023 | 1 | 2023 |