Sarah Meiklejohn
Sarah Meiklejohn
Geverifieerd e-mailadres voor ucl.ac.uk - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
A fistful of bitcoins: characterizing payments among men with no names
S Meiklejohn, M Pomarole, G Jordan, K Levchenko, D McCoy, ...
Proceedings of the 2013 conference on Internet measurement conference, 127-140, 2013
11192013
SoK: Consensus in the age of blockchains
S Bano, A Sonnino, M Al-Bassam, S Azouvi, P McCorry, S Meiklejohn, ...
Proceedings of the 1st ACM Conference on Advances in Financial Technologies …, 2019
295*2019
Centrally banked cryptocurrencies
G Danezis, S Meiklejohn
arXiv preprint arXiv:1505.06895, 2015
2922015
Privacy-enhancing overlays in bitcoin
S Meiklejohn, C Orlandi
International Conference on Financial Cryptography and Data Security, 127-141, 2015
1022015
Sonic: Zero-knowledge SNARKs from linear-size universal and updatable structured reference strings
M Maller, S Bowe, M Kohlweiss, S Meiklejohn
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
982019
An empirical analysis of anonymity in zcash
G Kappos, H Yousaf, M Maller, S Meiklejohn
27th {USENIX} Security Symposium ({USENIX} Security 18), 463-477, 2018
952018
Botcoin: Monetizing Stolen Cycles.
DY Huang, H Dharmdasani, S Meiklejohn, V Dave, C Grier, D McCoy, ...
NDSS, 2014
932014
Malleable proof systems and applications
M Chase, M Kohlweiss, A Lysyanskaya, S Meiklejohn
Annual International Conference on the Theory and Applications of …, 2012
852012
Updatable and universal common reference strings with applications to zk-SNARKs
J Groth, M Kohlweiss, M Maller, S Meiklejohn, I Miers
Annual International Cryptology Conference, 698-728, 2018
772018
Malleable signatures: New definitions and delegatable anonymous credentials
M Chase, M Kohlweiss, A Lysyanskaya, S Meiklejohn
2014 IEEE 27th Computer Security Foundations Symposium, 199-213, 2014
69*2014
Pisa: Arbitration outsourcing for state channels
P McCorry, S Bakshi, I Bentov, S Meiklejohn, A Miller
Proceedings of the 1st ACM Conference on Advances in Financial Technologies …, 2019
652019
ZKPDL: a language-based system for efficient zero-knowledge proofs and electronic cash
S Meiklejohn, CC Erway, A Küpçü, T Hinkle, A Lysyanskaya
Proceedings of USENIX Security, 193-206, 2010
64*2010
Heat of the moment: Characterizing the efficacy of thermal camera-based attacks
K Mowery, S Meiklejohn, S Savage
Proceedings of the 5th USENIX conference on Offensive technologies, 6-6, 2011
572011
The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion.
S Meiklejohn, K Mowery, S Checkoway, H Shacham
USENIX security symposium 201 (1), 2011
572011
Smart contracts for bribing miners
P McCorry, A Hicks, S Meiklejohn
International Conference on Financial Cryptography and Data Security, 3-18, 2018
532018
Algebraic MACs and keyed-verification anonymous credentials
M Chase, S Meiklejohn, G Zaverucha
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
512014
Déjà Q: Using Dual Systems to Revisit q-Type Assumptions
M Chase, S Meiklejohn
Annual International Conference on the Theory and Applications of …, 2014
502014
Möbius: Trustless tumbling for transaction privacy
S Meiklejohn, R Mercer
Proceedings on Privacy Enhancing Technologies (PoPETs) 2018 (2), 105-121, 2018
452018
Limitations on transformations from composite-order to prime-order groups: The case of round-optimal blind signatures
S Meiklejohn, H Shacham, DM Freeman
International Conference on the Theory and Application of Cryptology and …, 2010
452010
Quisquis: A new design for anonymous cryptocurrencies
P Fauzi, S Meiklejohn, R Mercer, C Orlandi
International Conference on the Theory and Application of Cryptology and …, 2019
432019
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20