Sarah Meiklejohn
Sarah Meiklejohn
Dirección de correo verificada de ucl.ac.uk - Página principal
Título
Citado por
Citado por
Año
A fistful of bitcoins: characterizing payments among men with no names
S Meiklejohn, M Pomarole, G Jordan, K Levchenko, D McCoy, ...
Proceedings of the 2013 conference on Internet measurement conference, 127-140, 2013
12182013
SoK: Consensus in the age of blockchains
S Bano, A Sonnino, M Al-Bassam, S Azouvi, P McCorry, S Meiklejohn, ...
Proceedings of the 1st ACM Conference on Advances in Financial Technologies …, 2019
328*2019
Centrally banked cryptocurrencies
G Danezis, S Meiklejohn
arXiv preprint arXiv:1505.06895, 2015
3132015
Sonic: Zero-knowledge SNARKs from linear-size universal and updatable structured reference strings
M Maller, S Bowe, M Kohlweiss, S Meiklejohn
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
1172019
Privacy-enhancing overlays in bitcoin
S Meiklejohn, C Orlandi
International Conference on Financial Cryptography and Data Security, 127-141, 2015
1142015
An empirical analysis of anonymity in zcash
G Kappos, H Yousaf, M Maller, S Meiklejohn
27th {USENIX} Security Symposium ({USENIX} Security 18), 463-477, 2018
1102018
Botcoin: Monetizing Stolen Cycles.
DY Huang, H Dharmdasani, S Meiklejohn, V Dave, C Grier, D McCoy, ...
NDSS, 2014
952014
Updatable and universal common reference strings with applications to zk-SNARKs
J Groth, M Kohlweiss, M Maller, S Meiklejohn, I Miers
Annual International Cryptology Conference, 698-728, 2018
892018
Malleable proof systems and applications
M Chase, M Kohlweiss, A Lysyanskaya, S Meiklejohn
Annual International Conference on the Theory and Applications of …, 2012
862012
Smart contracts for bribing miners
P McCorry, A Hicks, S Meiklejohn
International Conference on Financial Cryptography and Data Security, 3-18, 2018
722018
Malleable signatures: New definitions and delegatable anonymous credentials
M Chase, M Kohlweiss, A Lysyanskaya, S Meiklejohn
2014 IEEE 27th Computer Security Foundations Symposium, 199-213, 2014
71*2014
Pisa: Arbitration outsourcing for state channels
P McCorry, S Bakshi, I Bentov, S Meiklejohn, A Miller
Proceedings of the 1st ACM Conference on Advances in Financial Technologies …, 2019
702019
ZKPDL: a language-based system for efficient zero-knowledge proofs and electronic cash
S Meiklejohn, CC Erway, A Küpçü, T Hinkle, A Lysyanskaya
Proceedings of USENIX Security, 193-206, 2010
66*2010
Heat of the moment: Characterizing the efficacy of thermal camera-based attacks
K Mowery, S Meiklejohn, S Savage
Proceedings of the 5th USENIX conference on Offensive technologies, 6-6, 2011
632011
The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion.
S Meiklejohn, K Mowery, S Checkoway, H Shacham
USENIX security symposium 201 (1), 2011
572011
Algebraic MACs and keyed-verification anonymous credentials
M Chase, S Meiklejohn, G Zaverucha
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
552014
Déjà Q: Using Dual Systems to Revisit q-Type Assumptions
M Chase, S Meiklejohn
Annual International Conference on the Theory and Applications of …, 2014
502014
Möbius: Trustless tumbling for transaction privacy
S Meiklejohn, R Mercer
UCL Department of Computer Science, 2018
482018
Quisquis: A new design for anonymous cryptocurrencies
P Fauzi, S Meiklejohn, R Mercer, C Orlandi
International Conference on the Theory and Application of Cryptology and …, 2019
472019
Limitations on transformations from composite-order to prime-order groups: The case of round-optimal blind signatures
S Meiklejohn, H Shacham, DM Freeman
International Conference on the Theory and Application of Cryptology and …, 2010
452010
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20