关注
Edward W. Felten
Edward W. Felten
Robert E. Kahn Professor of Computer Science and Public Affairs, Princeton University
在 princeton.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Bitcoin and cryptocurrency technologies: a comprehensive introduction
A Narayanan, J Bonneau, E Felten, A Miller, S Goldfeder
Princeton University Press, 2016
29412016
Lest we remember: cold-boot attacks on encryption keys
JA Halderman, SD Schoen, N Heninger, W Clarkson, W Paul, ...
Communications of the ACM 52 (5), 91-98, 2009
18452009
Sok: Research perspectives and challenges for bitcoin and cryptocurrencies
J Bonneau, A Miller, J Clark, A Narayanan, JA Kroll, EW Felten
2015 IEEE symposium on security and privacy, 104-121, 2015
17152015
The economics of Bitcoin mining, or Bitcoin in the presence of adversaries
JA Kroll, IC Davey, EW Felten
Proceedings of WEIS 2013 (11), 2013
8442013
Mixcoin: Anonymity for bitcoin with accountable mixes
J Bonneau, A Narayanan, A Miller, J Clark, JA Kroll, EW Felten
Financial Cryptography and Data Security: 18th International Conference, FC …, 2014
6192014
Virtual memory mapped network interface for the SHRIMP multicomputer
MA Blumrich, K Li, R Alpert, C Dubnicki, EW Felten, J Sandberg
ACM SIGARCH Computer Architecture News 22 (2), 142-153, 1994
6161994
Arrakis: The operating system is the control plane
S Peter, J Li, I Zhang, DRK Ports, D Woos, A Krishnamurthy, T Anderson, ...
ACM Transactions on Computer Systems (TOCS) 33 (4), 1-30, 2015
5552015
Password management strategies for online accounts
S Gaw, EW Felten
Proceedings of the second symposium on Usable privacy and security, 44-55, 2006
5342006
Large-step Markov chains for the traveling salesman problem
O Martin, SW Otto, EW Felten
Oregon Graduate Institute of Science and Technology, Department of Computer …, 1991
5321991
Implementation and performance of integrated application-controlled file caching, prefetching, and disk scheduling
P Cao, EW Felten, AR Karlin, K Li
ACM Transactions on Computer Systems (TOCS) 14 (4), 311-343, 1996
5031996
A study of integrated prefetching and caching strategies
P Cao, EW Felten, AR Karlin, K Li
ACM SIGMETRICS Performance Evaluation Review 23 (1), 188-197, 1995
4941995
Timing attacks on web privacy
EW Felten, MA Schneider
Proceedings of the 7th ACM Conference on Computer and Communications …, 2000
4732000
Java security: From HotJava to Netscape and beyond
D Dean, EW Felten, DS Wallach
Proceedings 1996 IEEE Symposium on Security and Privacy, 190-200, 1996
4621996
" You might also like:" Privacy risks of collaborative filtering
JA Calandrino, A Kilzer, A Narayanan, EW Felten, V Shmatikov
2011 IEEE symposium on security and privacy, 231-246, 2011
4182011
Extensible security architectures for Java
DS Wallach, D Balfanz, D Dean, EW Felten
Proceedings of the sixteenth ACM symposium on Operating systems principles …, 1997
4131997
Government data and the invisible hand
D Robinson, H Yu, WP Zeller, EW Felten
Yale JL & Tech. 11, 159, 2008
3962008
{SPORC}: Group Collaboration using Untrusted Cloud Resources
AJ Feldman, WP Zeller, MJ Freedman, EW Felten
9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), 2010
3842010
Securing Java: getting down to business with mobile code
G McGraw, EW Felten
John Wiley & Sons, Inc., 1999
3621999
Proof-carrying authentication
AW Appel, EW Felten
Proceedings of the 6th ACM Conference on Computer and Communications …, 1999
3491999
Arbitrum: Scalable, private smart contracts
H Kalodner, S Goldfeder, X Chen, SM Weinberg, EW Felten
27th USENIX Security Symposium (USENIX Security 18), 1353-1370, 2018
3482018
系统目前无法执行此操作,请稍后再试。
文章 1–20