Sarah Meiklejohn
Sarah Meiklejohn
Associate Professor at University College London
Dirección de correo verificada de ucl.ac.uk - Página principal
TítuloCitado porAño
A fistful of bitcoins: characterizing payments among men with no names
S Meiklejohn, M Pomarole, G Jordan, K Levchenko, D McCoy, ...
Proceedings of the 2013 conference on Internet measurement conference, 127-140, 2013
8282013
Centrally banked cryptocurrencies
G Danezis, S Meiklejohn
arXiv preprint arXiv:1505.06895, 2015
2072015
SoK: Consensus in the age of blockchains
S Bano, A Sonnino, M Al-Bassam, S Azouvi, P McCorry, S Meiklejohn, ...
Proceedings of the 1st ACM Conference on Advances in Financial Technologies …, 2019
149*2019
Privacy-enhancing overlays in bitcoin
S Meiklejohn, C Orlandi
International Conference on Financial Cryptography and Data Security, 127-141, 2015
802015
Botcoin: Monetizing Stolen Cycles.
DY Huang, H Dharmdasani, S Meiklejohn, V Dave, C Grier, D McCoy, ...
NDSS, 2014
742014
Malleable proof systems and applications
M Chase, M Kohlweiss, A Lysyanskaya, S Meiklejohn
Annual International Conference on the Theory and Applications of …, 2012
722012
Malleable signatures: New definitions and delegatable anonymous credentials
M Chase, M Kohlweiss, A Lysyanskaya, S Meiklejohn
2014 IEEE 27th Computer Security Foundations Symposium, 199-213, 2014
62*2014
ZKPDL: a language-based system for efficient zero-knowledge proofs and electronic cash
S Meiklejohn, CC Erway, A Küpçü, T Hinkle, A Lysyanskaya
Proceedings of USENIX Security, 193-206, 2010
57*2010
The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion.
S Meiklejohn, K Mowery, S Checkoway, H Shacham
USENIX security symposium 201 (1), 2011
522011
Heat of the moment: Characterizing the efficacy of thermal camera-based attacks
K Mowery, S Meiklejohn, S Savage
Proceedings of the 5th USENIX conference on Offensive technologies, 6-6, 2011
512011
An empirical analysis of anonymity in zcash
G Kappos, H Yousaf, M Maller, S Meiklejohn
27th {USENIX} Security Symposium ({USENIX} Security 18), 463-477, 2018
502018
Déjà Q: using dual systems to revisit q-type assumptions
M Chase, S Meiklejohn
Annual International Conference on the Theory and Applications of …, 2014
452014
Limitations on transformations from composite-order to prime-order groups: The case of round-optimal blind signatures
S Meiklejohn, H Shacham, DM Freeman
International Conference on the Theory and Application of Cryptology and …, 2010
422010
Pisa: Arbitration outsourcing for state channels
P McCorry, S Bakshi, I Bentov, S Meiklejohn, A Miller
Proceedings of the 1st ACM Conference on Advances in Financial Technologies …, 2019
332019
Algebraic MACs and keyed-verification anonymous credentials
M Chase, S Meiklejohn, G Zaverucha
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
302014
Sonic: Zero-knowledge SNARKs from linear-size universal and updatable structured reference strings
M Maller, S Bowe, M Kohlweiss, S Meiklejohn
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
292019
Möbius: Trustless tumbling for transaction privacy
S Meiklejohn, R Mercer
Proceedings on Privacy Enhancing Technologies 2018 (2), 105-121, 2018
292018
Transparency overlays and applications
M Chase, S Meiklejohn
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
272016
Updatable and universal common reference strings with applications to zk-SNARKs
J Groth, M Kohlweiss, M Maller, S Meiklejohn, I Miers
Annual International Cryptology Conference, 698-728, 2018
252018
Smart contracts for bribing miners
P McCorry, A Hicks, S Meiklejohn
International Conference on Financial Cryptography and Data Security, 3-18, 2018
252018
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20