Follow
Frank Wang
Frank Wang
MIT CSAIL
Verified email at mit.edu - Homepage
Title
Cited by
Cited by
Year
Private database queries using somewhat homomorphic encryption
D Boneh, C Gentry, S Halevi, F Wang, DJ Wu
Applied Cryptography and Network Security: 11th International Conference …, 2013
2512013
Stegotorus: a camouflage proxy for the tor anonymity system
Z Weinberg, J Wang, V Yegneswaran, L Briesemeister, S Cheung, ...
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
2452012
Splinter: Practical private queries on public data
F Wang, C Yun, S Goldwasser, V Vaikuntanathan, M Zaharia
14th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2017
1212017
Sieve: Cryptographically enforced access control for user data in untrusted clouds
F Wang, J Mickens, N Zeldovich, V Vaikuntanathan
13th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2016
952016
Riverbed: Enforcing user-defined privacy constraints in distributed web services
F Wang, R Ko, J Mickens
16th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2019
532019
Theoretical analysis of the effect of particle size and support on the kinetics of oxygen reduction reaction on platinum nanoparticles
V Viswanathan, FYF Wang
Nanoscale 4 (16), 5110-5117, 2012
462012
Vulnerability factors in new web applications: Audit tools, developer selection & languages
J Bau, F Wang, E Bursztein, P Mutchler, JC Mitchell
Stanford, Tech. Rep, 2012
342012
Declarative privacy policy: finite models and attribute-based encryption
PE Lam, JC Mitchell, A Scedrov, S Sundaram, F Wang
Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium …, 2012
152012
Monte Carlo-based approach for simulating nanostructured catalytic and electrocatalytic systems
V Viswanathan, F Wang, H Pitsch
Computing in Science & Engineering 14 (2), 60-69, 2011
112011
Cobweb: Practical remote attestation using contextual graphs
F Wang, Y Joung, J Mickens
Proceedings of the 2nd Workshop on System Software for Trusted Execution, 1-7, 2017
62017
Veil: Private Browsing Semantics Without Browser-side Assistance.
F Wang, J Mickens, N Zeldovich
NDSS, 2018
52018
Cryptographically enforced access control for user data in untrusted clouds
FYF Wang
Massachusetts Institute of Technology, 2016
42016
Offloading critical security operations to the gpu
FYF Wang
Diss. Stanford University, 2011
22011
Preventing data leakage in web services
FYF Wang
Massachusetts Institute of Technology, 2018
2018
A BIMONTHLY PUBLICATION OF THE IEEE AEROSPACE AND ELECTRONIC SYSTEMS SOCIETY
RB Atitallah, V Viswanathan, N Belanger, JL Dekeyser, M Yu, L Gong, ...
The system can't perform the operation now. Try again later.
Articles 1–15