Blockchain Technology: What Is It Good for? Industry's dreams and fears for this new technology S Ruoti, B Kaiser, A Yerukhimovich, J Clark, R Cunningham Queue 17 (5), 60-88, 2019 | 92* | 2019 |
The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin B Kaiser, M Jurado, A Ledger https://arxiv.org/abs/1810.02466, 2018 | 78 | 2018 |
Adapting Security Warnings to Counter Online Disinformation B Kaiser, J Wei, E Lucherini, K Lee, JN Matias, J Mayer 30th {USENIX} Security Symposium ({USENIX} Security 21), 2021 | 75 | 2021 |
An empirical study of wireless carrier authentication for {SIM} swaps K Lee, B Kaiser, J Mayer, A Narayanan Sixteenth symposium on usable privacy and security (soups 2020), 61-79, 2020 | 59 | 2020 |
Identifying disinformation websites using infrastructure features A Hounsel, J Holland, B Kaiser, K Borgolte, N Feamster, J Mayer 10th USENIX Workshop on Free and Open Communications on the Internet (FOCI 20), 2020 | 50* | 2020 |
Computing on masked data to improve the security of big data V Gadepally, B Hancock, B Kaiser, J Kepner, P Michaleas, M Varia, ... 2015 IEEE International Symposium on Technologies for Homeland Security (HST …, 2015 | 30 | 2015 |
Environmental authentication in malware J Blackthorne, B Kaiser, B Fuller, B Yener Progress in Cryptology–LATINCRYPT 2017: 5th International Conference on …, 2019 | 7 | 2019 |
A formal framework for environmentally sensitive malware J Blackthorne, B Kaiser, B Yener Research in Attacks, Intrusions, and Defenses: 19th International Symposium …, 2016 | 6 | 2016 |
Adversary safety by construction in a language of cryptographic protocols TM Braje, AR Lee, A Wagner, B Kaiser, D Park, M Kalke, RK Cunningham, ... 2022 IEEE 35th Computer Security Foundations Symposium (CSF), 412-427, 2022 | 2 | 2022 |
Command monitor R Cunningham, B Kaiser, M Boning, J Brandon, A Lee US Patent 11,175,649, 2021 | 2 | 2021 |
Rally and webscience: A platform and toolkit for browser-based research on technology and society problems A Kohlbrenner, B Kaiser, K Kandula, R Weiss, J Mayer, T Han, R Helmer arXiv preprint arXiv:2211.02274, 2022 | 1 | 2022 |
Charting a Security Landscape in the Clouds: Data Protection and Collaboration in Cloud Storage G Itkis, BH Kaiser, JE Coll, WW Smith, RK Cunningham | 1 | 2016 |
It's the Algorithm: A Large-Scale Comparative Field Study of Misinformation Interventions B Kaiser, J Mayer Knight First Amendment Institute at Columbia University, 2023 | | 2023 |
A Multi-Armed Bandit for Testing Disinformation Warnings in Search Results B Kaiser, JN Matias OSF, 2019 | | 2019 |
A context-sensitive security type system for Java B Kaiser Rensselaer Polytechnic Institute, 2015 | | 2015 |