Protecting browser state from web privacy attacks C Jackson, A Bortz, D Boneh, JC Mitchell Proceedings of the 15th international conference on World Wide Web, 737-744, 2006 | 312 | 2006 |
Client application assisted automatic user log in A Bortz, A Csaszar, D Euresti, D Litzenberger US Patent 9,027,097, 2015 | 237 | 2015 |
Exposing private information by timing web applications A Bortz, D Boneh Proceedings of the 16th international conference on World Wide Web, 621-628, 2007 | 228 | 2007 |
Protecting browsers from DNS rebinding attacks C Jackson, A Barth, A Bortz, W Shao, D Boneh ACM Transactions on the Web (TWEB) 3 (1), 1-26, 2009 | 222 | 2009 |
Inviting Users to Participate in a Venture Exchange J Winner, A Kumar, A Bortz, CE Griffin US Patent App. 12/703,651, 2010 | 97 | 2010 |
K-anonymous message transmission L Von Ahn, A Bortz, NJ Hopper Proceedings of the 10th ACM conference on Computer and Communications …, 2003 | 95 | 2003 |
Origin cookies: Session integrity for web applications A Bortz, A Barth, A Czeskis Web 2.0 Security and Privacy (W2SP), 2011 | 74 | 2011 |
Method and system for asymmetric key security K Cameron, AK Nanda, JD Benaloh, JP Shewchuk, DR Simon, A Bortz US Patent 7,822,200, 2010 | 43 | 2010 |
System and method for serving online synchronized content from a sandbox domain via a temporary address A Bortz, B Hu, D Goldstein, A Allain, E Ibrishimov US Patent 10,565,402, 2020 | 25 | 2020 |
Recommendation generator and method for determining affinities to participate in a venture exchange A Kumar, J Winner, A Bortz, CE Griffin US Patent App. 12/543,149, 2010 | 25 | 2010 |
Secure local server for synchronized online content management system J Kaplan, A Bortz, D Euresti, S Tian, A Kao US Patent 9,516,107, 2016 | 24 | 2016 |
Selectively traceable anonymity L Von Ahn, A Bortz, NJ Hopper, K O’Neill Privacy Enhancing Technologies: 6th International Workshop, PET 2006 …, 2006 | 22 | 2006 |
The goals and challenges of click fraud penetration testing systems C Kintana, D Turner, JY Pan, A Metwally, N Daswani, E Chin, A Bortz | 19 | 2009 |
The state of HSTS deployment: A survey and common pitfalls L Garron, A Bortz, D Boneh | 6 | 2013 |
Pre-authorizing a client application to access a user account on a content management system H Nguyen, J Kaplan, V Mody, R Vincent, A Bortz, D Euresti US Patent 9,258,291, 2016 | 5 | 2016 |
Pre-authorizing a client application to access a user account on a content management system H Nguyen, J Kaplan, V Mody, R Vincent, A Bortz, D Euresti US Patent 9,973,504, 2018 | 4 | 2018 |
The Goals and Challenges of Click Fraud Penetration Testing Systems: Camelot as an Example A Bortz, E Chin, N Daswani, C Kintana, A Metwally, JY Pan, D Turner 14th European Symposium on Research in Computer Security-ESORICS, 523-538, 2009 | 2 | 2009 |
Communication protocols for an online content management system A Bortz, S Tian, J Kaplan, D Akhawe US Patent App. 16/896,819, 2020 | | 2020 |
Communication protocols for an online content management system A Bortz, S Tian, J Kaplan, D Akhawe US Patent 10,686,888, 2020 | | 2020 |
Pre-authorizing a client application to access a user account on a content management system H Nguyen, J Kaplan, V Mody, R Vincent, A Bortz, D Euresti US Patent 10,484,383, 2019 | | 2019 |