Erlingsson, Úlfar
57  Ergebnisse:
Personensuche X
?
2

Reducing Permission Requests in Mobile Apps:

, In: Proceedings of the Internet Measurement Conference,
Peddinti, Sai Teja ; Bilogrevic, Igor ; Taft, Nina... - p. 259-266 , 2019
 
?
3

Amplification by shuffling : from local to central diffe..:

, In: Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms,
Erlingsson, Úlfar ; Feldman, Vitaly ; Mironov, Ilya... - p. 2468-2479 , 2019
 
?
4

Data-driven Software Security and its Hardware Support:

, In: Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware Security,
Erlingsson, Úlfar - p. 3 ff. , 2017
 
?
5

Prochlo : Strong Privacy for Analytics in the Crowd:

, In: Proceedings of the 26th Symposium on Operating Systems Principles,
 
?
6

Building a RAPPOR with the Unknown: Privacy-Preserving Lear..:

Fanti, Giulia ; Pihur, Vasyl ; Erlingsson, Úlfar
Proceedings on Privacy Enhancing Technologies.  2016 (2016)  3 - p. 41-61 , 2016
 
?
7

RAPPOR : Randomized Aggregatable Privacy-Preserving Ordi..:

, In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security,
 
?
8

Fay: Extensible Distributed Tracing from Kernels to Cluster:

Erlingsson, Úlfar ; Peinado, Marcus ; Peter, Simon..
ACM Transactions on Computer Systems.  30 (2012)  4 - p. 1-35 , 2012
 
?
10

Fay : Extensible Distributed Tracing from Kernels to Clu..:

Erlingsson, Úlfar ; Peinado, Marcus ; Peter, Simon..
ACM Transactions on Computer Systems (TOCS).  30 (2012)  4 - p. 1-35 , 2012
 
?
12

Language-independent sandboxing of just-in-time compilation..:

, In: Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation,
Ansel, Jason ; Marchenko, Petr ; Erlingsson, Úlfar... - p. 355-366 , 2011
 
?
13

Fay : extensible distributed tracing from kernels to clu..:

, In: Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles,
 
?
15

Session details: Memory safety and binary code:

, In: Proceedings of the 17th ACM conference on Computer and communications security,
 
1-15