Seguir
Edward W. Felten
Edward W. Felten
Robert E. Kahn Professor of Computer Science and Public Affairs, Princeton University
Dirección de correo verificada de princeton.edu - Página principal
Título
Citado por
Citado por
Año
Bitcoin and cryptocurrency technologies: a comprehensive introduction
A Narayanan
Princeton University Press, 2016
31432016
Lest we remember: cold-boot attacks on encryption keys
JA Halderman, SD Schoen, N Heninger, W Clarkson, W Paul, ...
Communications of the ACM 52 (5), 91-98, 2009
18842009
Sok: Research perspectives and challenges for bitcoin and cryptocurrencies
J Bonneau, A Miller, J Clark, A Narayanan, JA Kroll, EW Felten
2015 IEEE symposium on security and privacy, 104-121, 2015
17802015
The economics of Bitcoin mining, or Bitcoin in the presence of adversaries
JA Kroll, IC Davey, EW Felten
Proceedings of WEIS 2013 (11), 2013
8632013
Mixcoin: Anonymity for bitcoin with accountable mixes
J Bonneau, A Narayanan, A Miller, J Clark, JA Kroll, EW Felten
Financial Cryptography and Data Security: 18th International Conference, FC …, 2014
6412014
Virtual memory mapped network interface for the SHRIMP multicomputer
MA Blumrich, K Li, R Alpert, C Dubnicki, EW Felten, J Sandberg
ACM SIGARCH Computer Architecture News 22 (2), 142-153, 1994
6171994
Arrakis: The operating system is the control plane
S Peter, J Li, I Zhang, DRK Ports, D Woos, A Krishnamurthy, T Anderson, ...
ACM Transactions on Computer Systems (TOCS) 33 (4), 1-30, 2015
5802015
Password management strategies for online accounts
S Gaw, EW Felten
Proceedings of the second symposium on Usable privacy and security, 44-55, 2006
5452006
Large-step Markov chains for the traveling salesman problem
O Martin, SW Otto, EW Felten
Oregon Graduate Institute of Science and Technology, Department of Computer …, 1991
5341991
Implementation and performance of integrated application-controlled file caching, prefetching, and disk scheduling
P Cao, EW Felten, AR Karlin, K Li
ACM Transactions on Computer Systems (TOCS) 14 (4), 311-343, 1996
5041996
A study of integrated prefetching and caching strategies
P Cao, EW Felten, AR Karlin, K Li
ACM SIGMETRICS Performance Evaluation Review 23 (1), 188-197, 1995
4941995
Timing attacks on web privacy
EW Felten, MA Schneider
Proceedings of the 7th ACM Conference on Computer and Communications …, 2000
4812000
Java security: From HotJava to Netscape and beyond
D Dean, EW Felten, DS Wallach
Proceedings 1996 IEEE Symposium on Security and Privacy, 190-200, 1996
4591996
" You might also like:" Privacy risks of collaborative filtering
JA Calandrino, A Kilzer, A Narayanan, EW Felten, V Shmatikov
2011 IEEE symposium on security and privacy, 231-246, 2011
4272011
Extensible security architectures for Java
DS Wallach, D Balfanz, D Dean, EW Felten
Proceedings of the sixteenth ACM symposium on Operating systems principles …, 1997
4101997
Government data and the invisible hand
D Robinson, H Yu, WP Zeller, EW Felten
Yale JL & Tech. 11, 159, 2008
3992008
{SPORC}: Group Collaboration using Untrusted Cloud Resources
AJ Feldman, WP Zeller, MJ Freedman, EW Felten
9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), 2010
3902010
Arbitrum: Scalable, private smart contracts
H Kalodner, S Goldfeder, X Chen, SM Weinberg, EW Felten
27th USENIX Security Symposium (USENIX Security 18), 1353-1370, 2018
3832018
Securing Java: getting down to business with mobile code
G McGraw, EW Felten
John Wiley & Sons, Inc., 1999
3641999
A convenient method for securely managing passwords
JA Halderman, B Waters, EW Felten
Proceedings of the 14th international conference on World Wide Web, 471-479, 2005
3522005
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20