| | An Oblivious and Encrypted Distributed Analytics Platform (medium.com/mit-security-seminar) |
|
1 point by ffwang2 on June 1, 2017 | past
|
| | Prio: Private, Robust, and Efficient Computation of Aggregate Statistics (medium.com/mit-security-seminar) |
|
2 points by ffwang2 on May 27, 2017 | past
|
| | Functional Encryption Using Intel SGX (medium.com/mit-security-seminar) |
|
6 points by ffwang2 on May 24, 2017 | past
|
| | Beyond Sanitizers: Guided fuzzing and security hardening (medium.com/mit-security-seminar) |
|
2 points by ffwang2 on Dec 6, 2016 | past
|
| | CDN on Demand (medium.com/mit-security-seminar) |
|
2 points by ffwang2 on May 31, 2016 | past
|
| | Analysis of Firefox Extension-Reuse Vulnerabilities (medium.com/mit-security-seminar) |
|
1 point by ffwang2 on May 27, 2016 | past
|
| | Privacy in a Data-Driven World (medium.com/mit-security-seminar) |
|
2 points by ffwang2 on April 4, 2016 | past
|
| | Using Bitcoin to play poker (medium.com/mit-security-seminar) |
|
1 point by ffwang2 on March 26, 2016 | past
|
| | Attacking the Network Time Protocol (NTP) (medium.com/mit-security-seminar) |
|
1 point by ffwang2 on March 23, 2016 | past
|
| | How to Use Bitcoin to Play Decentralized Poker (medium.com/mit-security-seminar) |
|
1 point by ffwang2 on Dec 18, 2015 | past
|
| | Bitcoin's Future: Scalability vs. Security (medium.com/mit-security-seminar) |
|
1 point by ffwang2 on Nov 30, 2015 | past
|
| | Software-Defined Metadata Processing (medium.com/mit-security-seminar) |
|
3 points by ffwang2 on Nov 20, 2015 | past
|
| | Cryptographic Failures in Practice (medium.com/mit-security-seminar) |
|
2 points by ffwang2 on Nov 6, 2015 | past
|
| | Controlled Functional Encryption (medium.com/mit-security-seminar) |
|
1 point by ffwang2 on Nov 1, 2015 | past
|
| | How Secure and Quick Is QUIC? Provable Security and Performance Analyses (medium.com/mit-security-seminar) |
|
2 points by ffwang2 on Oct 30, 2015 | past
|
| | Decentralizing Authorities into Scalable Strongest-Link Cothorities (medium.com/mit-security-seminar) |
|
2 points by ffwang2 on Oct 26, 2015 | past
|
| | Haven: Shielding applications from an untrusted cloud (medium.com/mit-security-seminar) |
|
1 point by ffwang2 on Oct 25, 2015 | past
|
| | Pivot: Fast, Synchronous Mashup Isolation Using Generator Chains (medium.com/mit-security-seminar) |
|
1 point by ffwang2 on Oct 25, 2015 | past
|
| | Code Pointer Integrity (medium.com/mit-security-seminar) |
|
3 points by ffwang2 on Oct 24, 2015 | past
|
| | Selene: Voter-Friendly, Receipt-Free Verification (medium.com/mit-security-seminar) |
|
26 points by ffwang2 on Oct 24, 2015 | past | 27 comments
|
| | Eclipse Attacks on Bitcoin's Peer-To-Peer Network (medium.com/mit-security-seminar) |
|
40 points by ffwang2 on Oct 24, 2015 | past | 5 comments
|
| | Selene: Voter-Friendly, Receipt-Free Verification (medium.com/mit-security-seminar) |
|
9 points by ffwang2 on Oct 23, 2015 | past
|