Showing 1 - 20 results of 43 for search 'Nickolai Zeldovich.', query time: 0.05s
Refine Results
-
1
Performing binary fuzzing using concolic execution by Valdez, Steven (Steven D.)
Published 2016Other Authors: “…Nickolai Zeldovich.…”
Thesis -
2
Nail - a practical tool for parsing and generating data formats by Bangert, Julian (Julian Oliver Benedikt)
Published 2016Other Authors: “…Nickolai Zeldovich.…”
Thesis -
3
Vuvuzela : scalable private messaging that hides metadata by Lazar, David, Ph.D. Massachusetts Institute of Technology
Published 2016Other Authors: “…Nickolai Zeldovich.…”
Thesis -
4
Alpenhorn: Bootstrapping Secure Communication without Leaking Metadata by Lazar, David, Zeldovich, Nickolai
Published 2016Other Authors: “…Nickolai Zeldovich…”
-
5
Strong and scalable metadata security for voice calls by Lazar, David,Ph.D.Massachusetts Institute of Technology.
Published 2020Other Authors: “…Nickolai Zeldovich.…”
Thesis -
6
CryptDB: A Practical Encrypted Relational DBMS by Popa, Raluca Ada, Zeldovich, Nickolai, Balakrishnan, Hari
Published 2011Other Authors: “…Nickolai Zeldovich…”
-
7
Remote Oblivious Storage: Making Oblivious RAM Practical by Boneh, Dan, Mazieres, David, Popa, Raluca Ada
Published 2011Other Authors: “…Nickolai Zeldovich…”
-
8
Making Linux protection mechanisms egalitarian with UserFS by Kim, Taesoo, Ph. D. Massachusetts Institute of Technology
Published 2011Other Authors: “…Nickolai Zeldovich.…”
Thesis -
9
CPHash: A Cache-Partitioned Hash Table by Metreveli, Zviad, Zeldovich, Nickolai, Kaashoek, M. Frans
Published 2011Other Authors: “…Nickolai Zeldovich…”
-
10
Cryptographic Treatment of CryptDB's Adjustable Join by Popa, Raluca Ada, Zeldovich, Nickolai
Published 2012Other Authors: “…Nickolai Zeldovich…”
-
11
Practical security for multi-user web application databases by Redfield, Catherine M. S
Published 2013Other Authors: “…Nickolai Zeldovich.…”
Thesis -
12
PARTE : automatic program partitioning for efficient computation over encrypted data by Shah, Meelap (Meelap Vijay)
Published 2013Other Authors: “…Nickolai Zeldovich.…”
Thesis -
13
From client-side encryption to secure web applications by Stark, Emily (Emily Margarete)
Published 2013Other Authors: “…Nickolai Zeldovich.…”
Thesis -
14
Automated intrusion recovery for web applications by Chandra, Ramesh, Ph. D. Massachusetts Institute of Technology
Published 2014Other Authors: “…Nickolai Zeldovich.…”
Thesis -
15
Adapting Kerberos for a browser-based environment by Benjamin, David (David A.)
Published 2014Other Authors: “…Nickolai Zeldovich.…”
Thesis -
16
OpLog: a library for scaling update-heavy data structures by Boyd-Wickizer, Silas, Kaashoek, M. Frans, Morris, Robert, Zeldovich, Nickolai
Published 2014Other Authors: “…Nickolai Zeldovich…”
-
17
Automatic intrusion recovery with system-wide history by Kim, Taesoo, Ph. D. Massachusetts Institute of Technology
Published 2014Other Authors: “…Nickolai Zeldovich.…”
Thesis -
18
Building practical systems that compute on encrypted data by Popa, Raluca Ada
Published 2015Other Authors: “…Nickolai Zeldovich.…”
Thesis -
19
SURGE : the Secure Cloud Storage and Collaboration Framework by Schmahmann, Adin R
Published 2015Other Authors: “…Nickolai Zeldovich.…”
Thesis -
20
Cryptographically enforced access control for user data in untrusted clouds by Wang, Frank Yi-Fei
Published 2016Other Authors: “…Nickolai Zeldovich and James Mickens.…”
Thesis