Thomas Ristenpart
Thomas Ristenpart
Associate Professor of Computer Science, Cornell Tech
Dirección de correo verificada de cornell.edu - Página principal
Título
Citado por
Citado por
Año
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
T Ristenpart, E Tromer, H Shacham, S Savage
Proceedings of the 16th ACM conference on Computer and communications …, 2009
23222009
Cross-VM side channels and their use to extract private keys
Y Zhang, A Juels, MK Reiter, T Ristenpart
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
7502012
Message-locked encryption and secure deduplication
M Bellare, S Keelveedhi, T Ristenpart
Annual international conference on the theory and applications of …, 2013
5782013
DupLESS: server-aided encryption for deduplicated storage
S Keelveedhi, M Bellare, T Ristenpart
Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security …, 2013
5712013
Model inversion attacks that exploit confidence information and basic countermeasures
M Fredrikson, S Jha, T Ristenpart
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
4892015
Stealing machine learning models via prediction apis
F Tramèr, F Zhang, A Juels, MK Reiter, T Ristenpart
25th {USENIX} Security Symposium ({USENIX} Security 16), 601-618, 2016
4572016
Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail
KP Dyer, SE Coull, T Ristenpart, T Shrimpton
2012 IEEE symposium on security and privacy, 332-346, 2012
3032012
Cross-tenant side-channel attacks in PaaS clouds
Y Zhang, A Juels, MK Reiter, T Ristenpart
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
2742014
Leakage-abuse attacks against searchable encryption
D Cash, P Grubbs, J Perry, T Ristenpart
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
2702015
Privacy in pharmacogenetics: an end-to-end case study of personalized warfarin dosing
M Fredrikson, E Lantz, S Jha, S Lin, D Page, T Ristenpart
USENIX Security, 2014
2612014
Format-preserving encryption
M Bellare, T Ristenpart, P Rogaway, T Stegers
International Workshop on Selected Areas in Cryptography, 295-312, 2009
2232009
Multi-property-preserving hash domain extension and the EMD transform
M Bellare, T Ristenpart
International Conference on the Theory and Application of Cryptology and …, 2006
1992006
Deterministic encryption: Definitional equivalences and constructions without random oracles
M Bellare, M Fischlin, A O’Neill, T Ristenpart
Annual International Cryptology Conference, 360-378, 2008
1732008
Resource-freeing attacks: improve your cloud performance (at your neighbor's expense)
V Varadarajan, T Kooburat, B Farley, T Ristenpart, MM Swift
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1722012
More for your money: exploiting performance heterogeneity in public clouds
B Farley, A Juels, V Varadarajan, T Ristenpart, KD Bowers, MM Swift
Proceedings of the Third ACM Symposium on Cloud Computing, 1-14, 2012
1702012
Careful with composition: Limitations of the indifferentiability framework
T Ristenpart, H Shacham, T Shrimpton
Annual International Conference on the Theory and Applications of …, 2011
1452011
Hedged public-key encryption: How to protect against bad randomness
M Bellare, Z Brakerski, M Naor, T Ristenpart, G Segev, H Shacham, ...
International Conference on the Theory and Application of Cryptology and …, 2009
1452009
Scheduler-based defenses against cross-VM side-channels
V Varadarajan, T Ristenpart, M Swift
23rd {USENIX} Security Symposium ({USENIX} Security 14), 687-702, 2014
1332014
A placement vulnerability study in multi-tenant public clouds
V Varadarajan, Y Zhang, T Ristenpart, M Swift
24th {USENIX} Security Symposium ({USENIX} Security 15), 913-928, 2015
1272015
Tag size does matter: Attacks and proofs for the TLS record protocol
KG Paterson, T Ristenpart, T Shrimpton
International Conference on the Theory and Application of Cryptology and …, 2011
1272011
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20