Author of the publication

Identifying Information Disclosure in Web Applications with Retroactive Auditing.

, , , , and . OSDI, page 555-569. USENIX Association, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Zeldovich, Nickolai
add a person with the name Zeldovich, Nickolai
 

Other publications of authors with the same name

Multiprocessor Support for Event-Driven Programs., , , , , and . USENIX Annual Technical Conference, General Track, page 239-252. USENIX, (2003)Experiences in Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise., , , and . CSET, USENIX Association, (2011)Building Web Applications on Top of Encrypted Data Using Mylar., , , , , , and . ;login:, (2014)Overcoming the Worst-Case Curse for Cryptographic Constructions., , , , and . IACR Cryptology ePrint Archive, (2013)An Ideal-Security Protocol for Order-Preserving Encoding., , and . IACR Cryptology ePrint Archive, (2013)Veil: Private Browsing Semantics Without Browser-side Assistance., , and . NDSS, The Internet Society, (2018)CryptDB: protecting confidentiality with encrypted query processing., , , and . SOSP, page 85-100. ACM, (2011)Verifying concurrent software using movers in CSPEC., , , and . OSDI, page 306-322. USENIX Association, (2018)Extracting and Optimizing Formally Verified Code for Systems Programming., , and . NFM, volume 11460 of Lecture Notes in Computer Science, page 228-236. Springer, (2019)Using Crash Hoare logic for certifying the FSCQ file system., , , , , and . SOSP, page 18-37. ACM, (2015)