Aaron Blankstein
Aaron Blankstein
Blockstack PBC
Verified email at blankstein.com - Homepage
Cited by
Cited by
{CONIKS}: Bringing Key Transparency to End Users
MS Melara, A Blankstein, J Bonneau, EW Felten, MJ Freedman
24th {USENIX} Security Symposium ({USENIX} Security 15), 383-398, 2015
Abstractions for usable information flow control in Aeolus
W Cheng, DRK Ports, D Schultz, V Popic, A Blankstein, J Cowling, ...
Presented as part of the 2012 {USENIX} Annual Technical Conference ({USENIX …, 2012
Social networking with frientegrity: privacy and integrity with an untrusted provider
AJ Feldman, A Blankstein, MJ Freedman, EW Felten
Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012
On the Trusted Use of Large-Scale Personal Data.
YA de Montjoye, SS Wang, A Pentland, DTT Anh, A Datta
IEEE Data Eng. Bull. 35 (4), 5-8, 2012
Hyperbolic caching: Flexible caching for web applications
A Blankstein, S Sen, MJ Freedman
2017 {USENIX} Annual Technical Conference ({USENIX}{ATC} 17), 499-511, 2017
Automating isolation and least privilege in web services
A Blankstein, MJ Freedman
2014 IEEE Symposium on Security and Privacy, 133-148, 2014
CONIKS: A Privacy-Preserving Consistent Key Service for Secure End-to-End Communication.
MS Melara, A Blankstein, J Bonneau, MJ Freedman, EW Felten
IACR Cryptol. ePrint Arch. 2014, 1004, 2014
Project snowflake: non-blocking safe manual memory management in. NET
M Parkinson, D Vytiniotis, K Vaswani, M Costa, P Deligiannis, ...
Proceedings of the ACM on Programming Languages 1 (OOPSLA), 1-25, 2017
Simple, fast, and safe manual memory management
P Kedia, M Costa, M Parkinson, K Vaswani, D Vytiniotis, A Blankstein
Proceedings of the 38th ACM SIGPLAN Conference on Programming Language …, 2017
Privacy and Integrity are Possible in the Untrusted Cloud.
AJ Feldman, A Blankstein, MJ Freedman, EW Felten
IEEE Data Eng. Bull. 35 (4), 73-82, 2012
Analyzing audit trails in the Aeolus security platform
A Blankstein
Massachusetts Institute of Technology, 2011
Parallel subgraph isomorphism
A Blankstein, M Goldstein
MIT Computer Science and Artificial Intelligence Laboratory, 2010
Bringing deployable key transparency to end users
MS Melara, A Blankstein, J Bonneau, EW Felten, MJ Freedman
24th USENIX Security Symposium (USENIX Security’15), 383-398, 0
Platform and associated method for authenticating the identity of a user in a decentralized system without need for a third-party identity service
J Nelson, A Blankstein, L Salibra, Y Liao, M Little
US Patent 10,601,829, 2020
System and method for smart contract publishing
A Blankstein, J Nelson
US Patent 10,699,269, 2020
Systems and methods for encrypting data in backend storage caches shared by multiple decentralized applications
Y Liao, M Little, J Nelson, A Blankstein
US Patent 10,664,451, 2020
Migrating data for decentralized applications between disparate backend storage providers
A Blankstein, J Nelson, L Salibra, M Little
US Patent 10,637,666, 2020
Exploiting the Structure of Modern Web Applications
A Blankstein
Princeton, NJ: Princeton University, 2017
A Performance Comparison of External Memory Optimized Trees and Normal Weight Balanced Trees
A Blankstein
Mininet Clustering
A Blankstein, S Erickson, M Melara
The system can't perform the operation now. Try again later.
Articles 1–20