Joshua Kroll
TitleCited byYear
Sok: Research perspectives and challenges for bitcoin and cryptocurrencies
J Bonneau, A Miller, J Clark, A Narayanan, JA Kroll, EW Felten
2015 IEEE Symposium on Security and Privacy, 104-121, 2015
6102015
SoK: Research perspectives and challenges for Bitcoin and cryptocurrencies
J Bonneau, A Miller, J Clark, A Narayanan, JA Kroll, EW Felten
Security and Privacy (SP), 2015 IEEE Symposium on, 104-121, 2015
6102015
The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries
JA Kroll, IC Davey, EW Felten
Proceedings of WEIS 2013, 2013
3712013
Accountable Algorithms
JA Kroll
Princeton University, 2015
3352015
Mixcoin: Anonymity for Bitcoin with accountable mixes
J Bonneau, A Narayanan, A Miller, J Clark, JA Kroll
Financial Cryptography, 0
220*
Why buy when you can rent?
J Bonneau, EW Felten, S Goldfeder, JA Kroll, A Narayanan
63*
Trust but verify: A guide to algorithms and the law
DR Desai, JA Kroll
Harv. JL & Tech. 31, 1, 2017
502017
Securing Bitcoin wallets via threshold signatures
S Goldfeder, J Bonneau, EW Felten, JA Kroll, A Narayanan
Princeton University, http://www. cs. princeton. edu/∼ stevenag/bitcoin …, 2014
47*2014
Securing Bitcoin wallets via threshold signatures
S Goldfeder, J Bonneau, EW Felten, JA Kroll, A Narayanan
45*2014
Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme
S Goldfeder, R Gennaro, H Kalodner, J Bonneau, JA Kroll, EW Felten, ...
et al., 2015
282015
Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme
S Goldfeder, R Gennaro, H Kalodner, J Bonneau, JA Kroll, EW Felten, ...
et al., 2015
282015
On Decentralizing Prediction Markets and Order Books
J Clark, J Bonneau, EW Felten, JA Kroll, A Miller, A Narayanan
Workshop on the Economics of Information Security, State College, Pennsylvania, 2014
232014
Portable Software Fault Isolation
JA Kroll, G Stewart, AW Appel
20*
Accountable Algorithms’(2017)
JA Kroll, J Huey, S Barocas, EW Felten, JR Reidenberg, DG Robinson, ...
University of Pennsylvania Law Review 165, 633, 0
19
Why buy when you can rent? bribery attacks on Bitcoin consensus
J Bonneau, EW Felten, S Goldfeder, JA Kroll, A Narayanan
152016
Research perspectives on bitcoin and secondgeneration cryptocurrencies
J Bonneau, A Miller, J Clark, A Narayanan, JA Kroll, EW Felten
IEEE Symposium on Security and Privacy. IEEE, 2015
152015
Corpus-based gesture analysis: an extension of the form dataset for the automatic detection of phases in a gesture
C Martell, J Kroll
International Journal of Semantic Computing 1 (04), 521-536, 2007
102007
The fallacy of inscrutability
JA Kroll
Phil. Trans. R. Soc. A 376 (2133), 20180084, 2018
92018
Secure protocols for accountable warrant execution
JA Kroll, EW Felten, D Boneh
See http://www. cs. princeton. edu/felten/warrant-paper. pdf, 2014
82014
Efficiently Auditing Multi-Level Elections
JA Kroll, EW Felten, JA Halderman
3
The system can't perform the operation now. Try again later.
Articles 1–20