Bitcoin and cryptocurrency technologies: a comprehensive introduction A Narayanan, J Bonneau, E Felten, A Miller, S Goldfeder Princeton University Press, 2016 | 2941 | 2016 |
Lest we remember: cold-boot attacks on encryption keys JA Halderman, SD Schoen, N Heninger, W Clarkson, W Paul, ... Communications of the ACM 52 (5), 91-98, 2009 | 1845 | 2009 |
Sok: Research perspectives and challenges for bitcoin and cryptocurrencies J Bonneau, A Miller, J Clark, A Narayanan, JA Kroll, EW Felten 2015 IEEE symposium on security and privacy, 104-121, 2015 | 1715 | 2015 |
The economics of Bitcoin mining, or Bitcoin in the presence of adversaries JA Kroll, IC Davey, EW Felten Proceedings of WEIS 2013 (11), 2013 | 844 | 2013 |
Mixcoin: Anonymity for bitcoin with accountable mixes J Bonneau, A Narayanan, A Miller, J Clark, JA Kroll, EW Felten Financial Cryptography and Data Security: 18th International Conference, FC …, 2014 | 619 | 2014 |
Virtual memory mapped network interface for the SHRIMP multicomputer MA Blumrich, K Li, R Alpert, C Dubnicki, EW Felten, J Sandberg ACM SIGARCH Computer Architecture News 22 (2), 142-153, 1994 | 616 | 1994 |
Arrakis: The operating system is the control plane S Peter, J Li, I Zhang, DRK Ports, D Woos, A Krishnamurthy, T Anderson, ... ACM Transactions on Computer Systems (TOCS) 33 (4), 1-30, 2015 | 555 | 2015 |
Password management strategies for online accounts S Gaw, EW Felten Proceedings of the second symposium on Usable privacy and security, 44-55, 2006 | 534 | 2006 |
Large-step Markov chains for the traveling salesman problem O Martin, SW Otto, EW Felten Oregon Graduate Institute of Science and Technology, Department of Computer …, 1991 | 532 | 1991 |
Implementation and performance of integrated application-controlled file caching, prefetching, and disk scheduling P Cao, EW Felten, AR Karlin, K Li ACM Transactions on Computer Systems (TOCS) 14 (4), 311-343, 1996 | 503 | 1996 |
A study of integrated prefetching and caching strategies P Cao, EW Felten, AR Karlin, K Li ACM SIGMETRICS Performance Evaluation Review 23 (1), 188-197, 1995 | 494 | 1995 |
Timing attacks on web privacy EW Felten, MA Schneider Proceedings of the 7th ACM Conference on Computer and Communications …, 2000 | 473 | 2000 |
Java security: From HotJava to Netscape and beyond D Dean, EW Felten, DS Wallach Proceedings 1996 IEEE Symposium on Security and Privacy, 190-200, 1996 | 462 | 1996 |
" You might also like:" Privacy risks of collaborative filtering JA Calandrino, A Kilzer, A Narayanan, EW Felten, V Shmatikov 2011 IEEE symposium on security and privacy, 231-246, 2011 | 418 | 2011 |
Extensible security architectures for Java DS Wallach, D Balfanz, D Dean, EW Felten Proceedings of the sixteenth ACM symposium on Operating systems principles …, 1997 | 413 | 1997 |
Government data and the invisible hand D Robinson, H Yu, WP Zeller, EW Felten Yale JL & Tech. 11, 159, 2008 | 396 | 2008 |
{SPORC}: Group Collaboration using Untrusted Cloud Resources AJ Feldman, WP Zeller, MJ Freedman, EW Felten 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), 2010 | 384 | 2010 |
Securing Java: getting down to business with mobile code G McGraw, EW Felten John Wiley & Sons, Inc., 1999 | 362 | 1999 |
Proof-carrying authentication AW Appel, EW Felten Proceedings of the 6th ACM Conference on Computer and Communications …, 1999 | 349 | 1999 |
Arbitrum: Scalable, private smart contracts H Kalodner, S Goldfeder, X Chen, SM Weinberg, EW Felten 27th USENIX Security Symposium (USENIX Security 18), 1353-1370, 2018 | 348 | 2018 |