Edward W. Felten
Edward W. Felten
Robert E. Kahn Professor of Computer Science and Public Affairs, Princeton University
Verified email at princeton.edu - Homepage
TitleCited byYear
Lest we remember: cold-boot attacks on encryption keys
JA Halderman, SD Schoen, N Heninger, W Clarkson, W Paul, ...
Communications of the ACM 52 (5), 91-98, 2009
12812009
Bitcoin and cryptocurrency technologies: a comprehensive introduction
A Narayanan, J Bonneau, E Felten, A Miller, S Goldfeder
Princeton University Press, 2016
7252016
Sok: Research perspectives and challenges for bitcoin and cryptocurrencies
J Bonneau, A Miller, J Clark, A Narayanan, JA Kroll, EW Felten
2015 IEEE Symposium on Security and Privacy, 104-121, 2015
6102015
Virtual memory mapped network interface for the SHRIMP multicomputer
MA Blumrich, K Li, R Alpert, C Dubnicki, EW Felten, J Sandberg
ACM SIGARCH Computer Architecture News 22 (2), 142-153, 1994
5851994
A study of integrated prefetching and caching strategies
P Cao, EW Felten, AR Karlin, K Li
ACM SIGMETRICS Performance Evaluation Review 23 (1), 188-197, 1995
4481995
Large-step Markov chains for the traveling salesman problem
O Martin, SW Otto, EW Felten
Oregon Graduate Institute of Science and Technology, Department of Computer …, 1991
4261991
Java security: From HotJava to Netscape and beyond
D Dean, EW Felten, DS Wallach
Proceedings 1996 IEEE Symposium on Security and Privacy, 190-200, 1996
4251996
Password management strategies for online accounts
S Gaw, EW Felten
Proceedings of the second symposium on Usable privacy and security, 44-55, 2006
4162006
Extensible security architectures for Java
DS Wallach, D Balfanz, D Dean, EW Felten
SOSP 97, 116-128, 1997
3811997
The economics of Bitcoin mining, or Bitcoin in the presence of adversaries
JA Kroll, IC Davey, EW Felten
Proceedings of WEIS 2013, 11, 2013
3712013
Timing attacks on web privacy
EW Felten, MA Schneider
Proceedings of the 7th ACM conference on Computer and communications …, 2000
3482000
Accountable algorithms
JA Kroll, S Barocas, EW Felten, JR Reidenberg, DG Robinson, H Yu
U. Pa. L. Rev. 165, 633, 2016
3352016
Proof-carrying authentication
AW Appel, EW Felten
Proceedings of the 6th ACM Conference on Computer and Communications …, 1999
3211999
Securing Java: getting down to business with mobile code
G McGraw, EW Felten
John Wiley & Sons, Inc., 1999
3181999
Government data and the invisible hand
D Robinson, H Yu, WP Zeller, EW Felten
Yale JL & Tech. 11, 159, 2008
3162008
Java security: hostile applets, holes&antidotes
G McGraw, EW Felten
John Wiley & Sons, Inc., 1997
3111997
Implementation and performance of integrated application-controlled file caching, prefetching, and disk scheduling
P Cao, EW Felten, AR Karlin, K Li
ACM Transactions on Computer Systems (TOCS) 14 (4), 311-343, 1996
2911996
Large-step Markov chains for the TSP incorporating local search heuristics
O Martin, SW Otto, EW Felten
Operations Research Letters 11 (4), 219-224, 1992
2771992
SPORC: Group Collaboration using Untrusted Cloud Resources.
AJ Feldman, WP Zeller, MJ Freedman, EW Felten
OSDI 10, 337-350, 2010
2752010
Web spoofing: An internet con game
EW Felten, D Balfanz, D Dean, DS Wallach
Software World 28 (2), 6-8, 1997
2711997
The system can't perform the operation now. Try again later.
Articles 1–20