Sarah Meiklejohn
Sarah Meiklejohn
Verified email at ucl.ac.uk - Homepage
Title
Cited by
Cited by
Year
A fistful of bitcoins: characterizing payments among men with no names
S Meiklejohn, M Pomarole, G Jordan, K Levchenko, D McCoy, ...
Proceedings of the 2013 conference on Internet measurement conference, 127-140, 2013
10842013
Centrally banked cryptocurrencies
G Danezis, S Meiklejohn
arXiv preprint arXiv:1505.06895, 2015
2852015
SoK: Consensus in the age of blockchains
S Bano, A Sonnino, M Al-Bassam, S Azouvi, P McCorry, S Meiklejohn, ...
Proceedings of the 1st ACM Conference on Advances in Financial Technologies …, 2019
278*2019
Privacy-enhancing overlays in bitcoin
S Meiklejohn, C Orlandi
International Conference on Financial Cryptography and Data Security, 127-141, 2015
1002015
An empirical analysis of anonymity in zcash
G Kappos, H Yousaf, M Maller, S Meiklejohn
27th {USENIX} Security Symposium ({USENIX} Security 18), 463-477, 2018
922018
Sonic: Zero-knowledge SNARKs from linear-size universal and updatable structured reference strings
M Maller, S Bowe, M Kohlweiss, S Meiklejohn
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
912019
Botcoin: Monetizing Stolen Cycles.
DY Huang, H Dharmdasani, S Meiklejohn, V Dave, C Grier, D McCoy, ...
NDSS, 2014
892014
Malleable proof systems and applications
M Chase, M Kohlweiss, A Lysyanskaya, S Meiklejohn
Annual International Conference on the Theory and Applications of …, 2012
842012
Updatable and universal common reference strings with applications to zk-SNARKs
J Groth, M Kohlweiss, M Maller, S Meiklejohn, I Miers
Annual International Cryptology Conference, 698-728, 2018
722018
Malleable signatures: New definitions and delegatable anonymous credentials
M Chase, M Kohlweiss, A Lysyanskaya, S Meiklejohn
2014 IEEE 27th Computer Security Foundations Symposium, 199-213, 2014
69*2014
ZKPDL: a language-based system for efficient zero-knowledge proofs and electronic cash
S Meiklejohn, CC Erway, A Küpçü, T Hinkle, A Lysyanskaya
Proceedings of USENIX Security, 193-206, 2010
64*2010
Pisa: Arbitration outsourcing for state channels
P McCorry, S Bakshi, I Bentov, S Meiklejohn, A Miller
Proceedings of the 1st ACM Conference on Advances in Financial Technologies …, 2019
612019
Heat of the moment: Characterizing the efficacy of thermal camera-based attacks
K Mowery, S Meiklejohn, S Savage
Proceedings of the 5th USENIX conference on Offensive technologies, 6-6, 2011
562011
The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion.
S Meiklejohn, K Mowery, S Checkoway, H Shacham
USENIX security symposium 201 (1), 2011
562011
Déjà Q: Using Dual Systems to Revisit q-Type Assumptions
M Chase, S Meiklejohn
Annual International Conference on the Theory and Applications of …, 2014
492014
Smart contracts for bribing miners
P McCorry, A Hicks, S Meiklejohn
International Conference on Financial Cryptography and Data Security, 3-18, 2018
472018
Algebraic MACs and keyed-verification anonymous credentials
M Chase, S Meiklejohn, G Zaverucha
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
472014
Möbius: Trustless tumbling for transaction privacy
S Meiklejohn, R Mercer
Proceedings on Privacy Enhancing Technologies 2018 (2), 105-121, 2018
452018
Limitations on transformations from composite-order to prime-order groups: The case of round-optimal blind signatures
S Meiklejohn, H Shacham, DM Freeman
International Conference on the Theory and Application of Cryptology and …, 2010
442010
Quisquis: A new design for anonymous cryptocurrencies
P Fauzi, S Meiklejohn, R Mercer, C Orlandi
International Conference on the Theory and Application of Cryptology and …, 2019
382019
The system can't perform the operation now. Try again later.
Articles 1–20