What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Edward W. Felten
Google Scholar
33
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/fc
EIP-4844 Economics and Rollup Strategies.
Davide Crapis
Edward W. Felten
Akaki Mamageishvili
2023
conf/fc
Efficient Rollup Batch Posting Strategy on Base Layer.
Akaki Mamageishvili
Edward W. Felten
2022
conf/uss
Watching the watchers: bias and vulnerability in remote proctoring software.
Ben Burgess
Avi Ginsberg
Edward W. Felten
Shaanan Cohney
2019
conf/ccs
Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices.
Hooman Mohajeri Moghaddam
Gunes Acar
Ben Burgess
Arunesh Mathur
Danny Yuxing Huang
Nick Feamster
Edward W. Felten
Prateek Mittal
Arvind Narayanan
2018
conf/uss
Arbitrum: Scalable, private smart contracts.
Harry A. Kalodner
Steven Goldfeder
Xiaoqi Chen
S. Matthew Weinberg
Edward W. Felten
2015
conf/ccs
Keynote Talk.
Edward W. Felten
2015
conf/uss
CONIKS: Bringing Key Transparency to End Users.
Marcela S. Melara
Aaron Blankstein
Joseph Bonneau
Edward W. Felten
Michael J. Freedman
2015
conf/sp
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.
Joseph Bonneau
Andrew Miller
Jeremy Clark
Arvind Narayanan
Joshua A. Kroll
Edward W. Felten
2014
conf/uss
Security Audit of Safeplug "Tor in a Box".
Anne Edmundson
Anna Kornfeld Simpson
Joshua A. Kroll
Edward W. Felten
2014
conf/fc
Mixcoin: Anonymity for Bitcoin with Accountable Mixes.
Joseph Bonneau
Arvind Narayanan
Andrew Miller
Jeremy Clark
Joshua A. Kroll
Edward W. Felten
2012
conf/uss
Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider.
Ariel J. Feldman
Aaron Blankstein
Michael J. Freedman
Edward W. Felten
2012
conf/wisec
Toward a healthy wireless privacy ecosystem.
Edward W. Felten
2011
conf/uss
Bubble Trouble: Off-Line De-Anonymization of Bubble Forms.
Joseph A. Calandrino
William Clarkson
Edward W. Felten
2011
conf/sp
"You Might Also Like: " Privacy Risks of Collaborative Filtering.
Joseph A. Calandrino
Ann Kilzer
Arvind Narayanan
Edward W. Felten
Vitaly Shmatikov
2010
conf/ndss
Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs.
Scott Wolchok
Owen S. Hofmann
Nadia Heninger
Edward W. Felten
J. Alex Halderman
Christopher J. Rossbach
Brent Waters
Emmett Witchel
2009
conf/uss
Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage.
Stephen Checkoway
Ariel J. Feldman
Brian Kantor
J. Alex Halderman
Edward W. Felten
Hovav Shacham
2009
conf/sp
Fingerprinting Blank Paper Using Commodity Scanners.
William Clarkson
Tim Weyrich
Adam Finkelstein
Nadia Heninger
J. Alex Halderman
Edward W. Felten
2008
conf/uss
Lest We Remember: Cold Boot Attacks on Encryption Keys.
J. Alex Halderman
Seth D. Schoen
Nadia Heninger
William Clarkson
William Paul
Joseph A. Calandrino
Ariel J. Feldman
Jacob Appelbaum
Edward W. Felten
2008
conf/uss
In Defense of Pseudorandom Sample Selection.
Joseph A. Calandrino
J. Alex Halderman
Edward W. Felten
2007
conf/uss
Security Analysis of the Diebold AccuVote-TS Voting Machine.
Ariel J. Feldman
J. Alex Halderman
Edward W. Felten
2006
conf/uss
Lessons from the Sony CD DRM Episode.
J. Alex Halderman
Edward W. Felten
2006
conf/soups
Password management strategies for online accounts.
Shirley Gaw
Edward W. Felten
2004
conf/ccs
New client puzzle outsourcing techniques for DoS resistance.
Brent Waters
Ari Juels
J. Alex Halderman
Edward W. Felten
2003
conf/ccs
Receiver anonymity via incomparable public keys.
Brent R. Waters
Edward W. Felten
Amit Sahai
2002
conf/ccs
Attacking an Obfuscated Cipher by Injecting Faults.
Matthias Jacob
Dan Boneh
Edward W. Felten
2002
conf/uss
A General and Flexible Access-Control System for the Web.
Lujo Bauer
Michael A. Schneider
Edward W. Felten
2001
conf/uss
Reading Between the Lines: Lessons from the SDMI Challenge.
Scott Craver
Min Wu
Bede Liu
Adam Stubblefield
Ben Swartzlander
Dan S. Wallach
Drew Dean
Edward W. Felten
2000
conf/ccs
Timing attacks on Web privacy.
Edward W. Felten
Michael A. Schneider
2000
conf/acsac
Efficient Commerce Protocols based on One-Time Pads.
Michael A. Schneider
Edward W. Felten
1999
conf/ccs
Proof-Carrying Authentication.
Andrew W. Appel
Edward W. Felten
1999
conf/uss
Hand-Held Computers Can Be Better Smart Cards.
Dirk Balfanz
Edward W. Felten
1998
conf/sp
Understanding Java Stack Inspection.
Dan S. Wallach
Edward W. Felten
1996
conf/sp
Java Security: From HotJava to Netscape and Beyond.
Drew Dean
Edward W. Felten
Dan S. Wallach
Coauthors
Aaron Blankstein
(2)
Adam Finkelstein
(1)
Adam Stubblefield
(1)
Akaki Mamageishvili
(2)
Amit Sahai
(1)
Andrew Miller
(2)
Andrew W. Appel
(1)
Ann Kilzer
(1)
Anna Kornfeld Simpson
(1)
Anne Edmundson
(1)
Ari Juels
(1)
Ariel J. Feldman
(4)
Arunesh Mathur
(1)
Arvind Narayanan
(4)
Avi Ginsberg
(1)
Bede Liu
(1)
Ben Burgess
(2)
Ben Swartzlander
(1)
Brent R. Waters
(1)
Brent Waters
(2)
Brian Kantor
(1)
Christopher J. Rossbach
(1)
Dan Boneh
(1)
Dan S. Wallach
(3)
Danny Yuxing Huang
(1)
Davide Crapis
(1)
Dirk Balfanz
(1)
Drew Dean
(2)
Edward W. Felten
(33)
Emmett Witchel
(1)
Gunes Acar
(1)
Harry A. Kalodner
(1)
Hooman Mohajeri Moghaddam
(1)
Hovav Shacham
(1)
J. Alex Halderman
(8)
Jacob Appelbaum
(1)
Jeremy Clark
(2)
Joseph A. Calandrino
(4)
Joseph Bonneau
(3)
Joshua A. Kroll
(3)
Lujo Bauer
(1)
Marcela S. Melara
(1)
Matthias Jacob
(1)
Michael A. Schneider
(3)
Michael J. Freedman
(2)
Min Wu
(1)
Nadia Heninger
(3)
Nick Feamster
(1)
Owen S. Hofmann
(1)
Prateek Mittal
(1)
S. Matthew Weinberg
(1)
Scott Craver
(1)
Scott Wolchok
(1)
Seth D. Schoen
(1)
Shaanan Cohney
(1)
Shirley Gaw
(1)
Stephen Checkoway
(1)
Steven Goldfeder
(1)
Tim Weyrich
(1)
Vitaly Shmatikov
(1)
William Clarkson
(3)
William Paul
(1)
Xiaoqi Chen
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to