Author: Dan Boneh
Publication Overview
Publication period start: 2012
Number of co-authors: 16
Co-Authors
Number of publications with favourite co-authors
Productive Colleagues
Most productive colleagues in number of publications
Publications
Jackson,
Collin,
Barth,
Adam,
Bortz,
Andrew,
Shao,
Weidong,
Boneh,
Dan
(2009):
Protecting browsers from DNS rebinding attacks.
In
ACM Transactions on the Web,
3
(1)
pp. 2.
https://dx.doi.org/10.1145/1462148.1462150
Boneh,
Dan,
Ding,
Xuhua,
Tsudik,
Gene
(2004):
Fine-grained control of security capabilities.
In
ACM Trans. Internet Techn.,
4
(1)
pp. 60-82.
https://dl.acm.org/doi/10.1145/967030.967033
Bortz,
Andrew,
Boneh,
Dan
(2007):
Exposing private information by timing web applications.
In:
Proceedings of the 2007 International Conference on the World Wide Web
,
2007,
.
pp. 621-628.
https://doi.acm.org/10.1145/1242572.1242656
Kumar,
Manu,
Garfinkel,
Tal,
Boneh,
Dan,
Winograd,
Terry
(2007):
Reducing shoulder-surfing by using gaze-based password entry.
In:
Proceedings of the 2007 Symposium on Usable Privacy and Security
,
2007,
.
pp. 13-19.
https://cups.cs.cmu.edu/soups/2007/proceedings/p13_kumar.pdf
Jackson,
Collin,
Bortz,
Andrew,
Boneh,
Dan,
Mitchell,
John C.
(2006):
Protecting browser state from web privacy attacks.
In:
Proceedings of the 2006 International Conference on the World Wide Web
,
2006,
.
pp. 737-744.
https://doi.acm.org/10.1145/1135777.1135884
Thiagarajan,
Narendran,
Aggarwal,
Gaurav,
Nicoara,
Angela,
Boneh,
Dan,
Singh,
Jatinder Pal
(2012):
Who killed my battery?: analyzing mobile browser energy consumption.
In:
Proceedings of the 2012 International Conference on the World Wide Web
,
2012,
.
pp. 41-50.
https://dx.doi.org/10.1145/2187836.2187843
Bursztein,
Elie,
Soman,
Chinmay,
Boneh,
Dan,
Mitchell,
John C.
(2012):
SessionJuggler: secure web login from an untrusted terminal using session hijacking.
In:
Proceedings of the 2012 International Conference on the World Wide Web
,
2012,
.
pp. 321-330.
https://dx.doi.org/10.1145/2187836.2187880