Sarah Meiklejohn
Sarah Meiklejohn
Associate Professor at University College London
Verified email at ucl.ac.uk - Homepage
TitleCited byYear
A fistful of bitcoins: characterizing payments among men with no names
S Meiklejohn, M Pomarole, G Jordan, K Levchenko, D McCoy, ...
Proceedings of the 2013 conference on Internet measurement conference, 127-140, 2013
7962013
Centrally banked cryptocurrencies
G Danezis, S Meiklejohn
arXiv preprint arXiv:1505.06895, 2015
1952015
SoK: Consensus in the age of blockchains
S Bano, A Sonnino, M Al-Bassam, S Azouvi, P McCorry, S Meiklejohn, ...
Proceedings of the 1st ACM Conference on Advances in Financial Technologies …, 2019
132*2019
Privacy-enhancing overlays in bitcoin
S Meiklejohn, C Orlandi
International Conference on Financial Cryptography and Data Security, 127-141, 2015
802015
Malleable proof systems and applications
M Chase, M Kohlweiss, A Lysyanskaya, S Meiklejohn
Annual International Conference on the Theory and Applications of …, 2012
742012
Botcoin: Monetizing Stolen Cycles.
DY Huang, H Dharmdasani, S Meiklejohn, V Dave, C Grier, D McCoy, ...
NDSS, 2014
722014
Malleable signatures: New definitions and delegatable anonymous credentials
M Chase, M Kohlweiss, A Lysyanskaya, S Meiklejohn
2014 IEEE 27th Computer Security Foundations Symposium, 199-213, 2014
57*2014
ZKPDL: a language-based system for efficient zero-knowledge proofs and electronic cash
S Meiklejohn, CC Erway, A Küpçü, T Hinkle, A Lysyanskaya
Proceedings of USENIX Security, 193-206, 2010
57*2010
The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion.
S Meiklejohn, K Mowery, S Checkoway, H Shacham
USENIX security symposium 201 (1), 2011
522011
Heat of the moment: Characterizing the efficacy of thermal camera-based attacks
K Mowery, S Meiklejohn, S Savage
Proceedings of the 5th USENIX conference on Offensive technologies, 6-6, 2011
502011
An empirical analysis of anonymity in zcash
G Kappos, H Yousaf, M Maller, S Meiklejohn
27th {USENIX} Security Symposium ({USENIX} Security 18), 463-477, 2018
472018
Déjà Q: using dual systems to revisit q-type assumptions
M Chase, S Meiklejohn
Annual International Conference on the Theory and Applications of …, 2014
452014
Limitations on transformations from composite-order to prime-order groups: The case of round-optimal blind signatures
S Meiklejohn, H Shacham, DM Freeman
International Conference on the Theory and Application of Cryptology and …, 2010
452010
Algebraic MACs and keyed-verification anonymous credentials
M Chase, S Meiklejohn, G Zaverucha
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
302014
Pisa: Arbitration outsourcing for state channels
P McCorry, S Bakshi, I Bentov, S Meiklejohn, A Miller
Proceedings of the 1st ACM Conference on Advances in Financial Technologies …, 2019
282019
Möbius: Trustless tumbling for transaction privacy
S Meiklejohn, R Mercer
Proceedings on Privacy Enhancing Technologies 2018 (2), 105-121, 2018
282018
Transparency overlays and applications
M Chase, S Meiklejohn
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
262016
Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings.
M Maller, S Bowe, M Kohlweiss, S Meiklejohn
IACR Cryptology ePrint Archive 2019, 99, 2019
242019
Leveraging gate-level properties to identify hardware timing channels
J Oberg, S Meiklejohn, T Sherwood, R Kastner
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2014
232014
Smart contracts for bribing miners
P McCorry, A Hicks, S Meiklejohn
International Conference on Financial Cryptography and Data Security, 3-18, 2018
222018
The system can't perform the operation now. Try again later.
Articles 1–20