Hacker News new | past | comments | ask | show | jobs | submit | from login
An Oblivious and Encrypted Distributed Analytics Platform (medium.com/mit-security-seminar)
1 point by ffwang2 on June 1, 2017 | past
Prio: Private, Robust, and Efficient Computation of Aggregate Statistics (medium.com/mit-security-seminar)
2 points by ffwang2 on May 27, 2017 | past
Functional Encryption Using Intel SGX (medium.com/mit-security-seminar)
6 points by ffwang2 on May 24, 2017 | past
Beyond Sanitizers: Guided fuzzing and security hardening (medium.com/mit-security-seminar)
2 points by ffwang2 on Dec 6, 2016 | past
CDN on Demand (medium.com/mit-security-seminar)
2 points by ffwang2 on May 31, 2016 | past
Analysis of Firefox Extension-Reuse Vulnerabilities (medium.com/mit-security-seminar)
1 point by ffwang2 on May 27, 2016 | past
Privacy in a Data-Driven World (medium.com/mit-security-seminar)
2 points by ffwang2 on April 4, 2016 | past
Using Bitcoin to play poker (medium.com/mit-security-seminar)
1 point by ffwang2 on March 26, 2016 | past
Attacking the Network Time Protocol (NTP) (medium.com/mit-security-seminar)
1 point by ffwang2 on March 23, 2016 | past
How to Use Bitcoin to Play Decentralized Poker (medium.com/mit-security-seminar)
1 point by ffwang2 on Dec 18, 2015 | past
Bitcoin's Future: Scalability vs. Security (medium.com/mit-security-seminar)
1 point by ffwang2 on Nov 30, 2015 | past
Software-Defined Metadata Processing (medium.com/mit-security-seminar)
3 points by ffwang2 on Nov 20, 2015 | past
Cryptographic Failures in Practice (medium.com/mit-security-seminar)
2 points by ffwang2 on Nov 6, 2015 | past
Controlled Functional Encryption (medium.com/mit-security-seminar)
1 point by ffwang2 on Nov 1, 2015 | past
How Secure and Quick Is QUIC? Provable Security and Performance Analyses (medium.com/mit-security-seminar)
2 points by ffwang2 on Oct 30, 2015 | past
Decentralizing Authorities into Scalable Strongest-Link Cothorities (medium.com/mit-security-seminar)
2 points by ffwang2 on Oct 26, 2015 | past
Haven: Shielding applications from an untrusted cloud (medium.com/mit-security-seminar)
1 point by ffwang2 on Oct 25, 2015 | past
Pivot: Fast, Synchronous Mashup Isolation Using Generator Chains (medium.com/mit-security-seminar)
1 point by ffwang2 on Oct 25, 2015 | past
Code Pointer Integrity (medium.com/mit-security-seminar)
3 points by ffwang2 on Oct 24, 2015 | past
Selene: Voter-Friendly, Receipt-Free Verification (medium.com/mit-security-seminar)
26 points by ffwang2 on Oct 24, 2015 | past | 27 comments
Eclipse Attacks on Bitcoin's Peer-To-Peer Network (medium.com/mit-security-seminar)
40 points by ffwang2 on Oct 24, 2015 | past | 5 comments
Selene: Voter-Friendly, Receipt-Free Verification (medium.com/mit-security-seminar)
9 points by ffwang2 on Oct 23, 2015 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: