HORNET: High-speed onion routing at the network layer C Chen, DE Asoni, D Barrera, G Danezis, A Perrig Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 171 | 2015 |
Flooding-resilient broadcast authentication for vanets HC Hsiao, A Studer, C Chen, A Perrig, F Bai, B Bellur, A Iyer Proceedings of the 17th annual international conference on Mobile computing …, 2011 | 123 | 2011 |
{cTPM}: A cloud {TPM} for {Cross-Device} trusted applications C Chen, H Raj, S Saroiu, A Wolman 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14), 2014 | 77 | 2014 |
TARANET: Traffic-analysis resistant anonymity at the network layer C Chen, DE Asoni, A Perrig, D Barrera, G Danezis, C Troncoso 2018 IEEE European Symposium on Security and Privacy (EuroS&P), 137-152, 2018 | 76 | 2018 |
Towards verifiable resource accounting for outsourced computation C Chen, P Maniatis, A Perrig, A Vasudevan, V Sekar Proceedings of the 9th ACM SIGPLAN/SIGOPS international conference on …, 2013 | 67 | 2013 |
Datacast: A scalable and efficient reliable group data delivery service for data centers J Cao, C Guo, G Lu, Y Xiong, Y Zheng, Y Zhang, Y Zhu, C Chen Proceedings of the 8th international conference on Emerging networking …, 2012 | 56 | 2012 |
Phi: Path-hidden lightweight anonymity protocol at network layer C Chen, A Perrig Proceedings on Privacy Enhancing Technologies 2017 (1), 100-117, 2017 | 39 | 2017 |
Distributed provenance compression C Chen, HT Lehri, L Kuan Loh, A Alur, L Jia, BT Loo, W Zhou Proceedings of the 2017 ACM International Conference on Management of Data …, 2017 | 31 | 2017 |
Secure hardware for cross-device trusted applications H Raj, S Saroiu, A Wolman, C Chen US Patent 9,686,077, 2017 | 29 | 2017 |
Datalair: Efficient block storage with plausible deniability against multi-snapshot adversaries A Chakraborti, C Chen, R Sion arXiv preprint arXiv:1706.10276, 2017 | 28 | 2017 |
A program logic for verifying secure routing protocols C Chen, L Jia, H Xu, C Luo, W Zhou, BT Loo Logical Methods in Computer Science 11, 2015 | 20 | 2015 |
PD-DM: An efficient locality-preserving block device mapper with plausible deniability C Chen, A Chakraborti, R Sion Proceedings on Privacy Enhancing Technologies, 2019 | 15 | 2019 |
Modeling data-plane power consumption of future Internet architectures C Chen, D Barrera, A Perrig 2016 IEEE 2nd International Conference on Collaboration and Internet …, 2016 | 15 | 2016 |
Infuse: Invisible plausibly-deniable file system for nand flash C Chen, A Chakraborti, R Sion Proceedings on Privacy Enhancing Technologies, 2020 | 14 | 2020 |
{PEARL}: Plausibly Deniable Flash Translation Layer using {WOM} coding C Chen, A Chakraborti, R Sion 30th USENIX Security Symposium (USENIX Security 21), 1109-1126, 2021 | 13 | 2021 |
Secure hardware for cross-device trusted applications H Raj, S Saroiu, A Wolman, C Chen US Patent 10,404,466, 2019 | 8 | 2019 |
ECO-DNS: expected consistency optimization for DNS C Chen, S Matsumoto, A Perrig 2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015 | 7 | 2015 |
SoK: Plausibly deniable storage C Chen, X Liang, B Carbunar, R Sion arXiv preprint arXiv:2111.12809, 2021 | 6 | 2021 |
Poster: Datalair: A storage block device with plausible deniability A Chakraborti, C Chen, R Sion Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 5 | 2016 |
Provenance for probabilistic logic programs S Wang, H Lyu, J Zhang, C Wu, X Chen, W Zhou, BT Loo, SB Davidson, ... International Conference on Extending Database Technology (EDBT), 2020 | 3 | 2020 |