[go: up one dir, main page]

Follow
Edward W. Felten
Edward W. Felten
Robert E. Kahn Professor of Computer Science and Public Affairs, Princeton University
Verified email at princeton.edu - Homepage
Title
Cited by
Cited by
Year
Bitcoin and cryptocurrency technologies: a comprehensive introduction
A Narayanan, J Bonneau, E Felten, A Miller, S Goldfeder
Princeton University Press, 2016
41912016
Sok: Research perspectives and challenges for bitcoin and cryptocurrencies
J Bonneau, A Miller, J Clark, A Narayanan, JA Kroll, EW Felten
2015 IEEE symposium on security and privacy, 104-121, 2015
20792015
Lest we remember: cold-boot attacks on encryption keys
JA Halderman, SD Schoen, N Heninger, W Clarkson, W Paul, ...
Communications of the ACM 52 (5), 91-98, 2009
20092009
The economics of Bitcoin mining, or Bitcoin in the presence of adversaries
JA Kroll, IC Davey, EW Felten
Proceedings of WEIS 2013 (11), 2013
9242013
Mixcoin: Anonymity for bitcoin with accountable mixes
J Bonneau, A Narayanan, A Miller, J Clark, JA Kroll, EW Felten
International conference on financial cryptography and data security, 486-504, 2014
6892014
Arrakis: The operating system is the control plane
S Peter, J Li, I Zhang, DRK Ports, D Woos, A Krishnamurthy, T Anderson, ...
ACM Transactions on Computer Systems (TOCS) 33 (4), 1-30, 2015
6392015
Virtual memory mapped network interface for the SHRIMP multicomputer
MA Blumrich, K Li, R Alpert, C Dubnicki, EW Felten, J Sandberg
ACM SIGARCH Computer Architecture News 22 (2), 142-153, 1994
6211994
Password management strategies for online accounts
S Gaw, EW Felten
Proceedings of the second symposium on Usable privacy and security, 44-55, 2006
5742006
Large-step Markov chains for the traveling salesman problem
O Martin, SW Otto, EW Felten
Oregon Graduate Institute of Science and Technology, Department of Computer …, 1991
5581991
Occupational, industry, and geographic exposure to artificial intelligence: A novel dataset and its potential uses
E Felten, M Raj, R Seamans
Strategic Management Journal 42 (12), 2195-2217, 2021
5372021
Arbitrum: Scalable, private smart contracts
H Kalodner, S Goldfeder, X Chen, SM Weinberg, EW Felten
27th USENIX Security Symposium (USENIX Security 18), 1353-1370, 2018
5332018
Implementation and performance of integrated application-controlled file caching, prefetching, and disk scheduling
P Cao, EW Felten, AR Karlin, K Li
ACM Transactions on Computer Systems (TOCS) 14 (4), 311-343, 1996
5111996
A study of integrated prefetching and caching strategies
P Cao, EW Felten, AR Karlin, K Li
ACM SIGMETRICS Performance Evaluation Review 23 (1), 188-197, 1995
5061995
Timing attacks on web privacy
EW Felten, MA Schneider
Proceedings of the 7th ACM conference on Computer and communications …, 2000
4932000
Java security: From HotJava to Netscape and beyond
D Dean, EW Felten, DS Wallach
Proceedings 1996 IEEE Symposium on Security and Privacy, 190-200, 1996
4641996
" You might also like:" Privacy risks of collaborative filtering
JA Calandrino, A Kilzer, A Narayanan, EW Felten, V Shmatikov
2011 IEEE symposium on security and privacy, 231-246, 2011
4512011
Government data and the invisible hand
D Robinson, H Yu, WP Zeller, EW Felten
Yale JL & Tech. 11, 159, 2008
4122008
Extensible security architectures for Java
DS Wallach, D Balfanz, D Dean, EW Felten
Proceedings of the sixteenth ACM symposium on Operating systems principles …, 1997
3991997
{CONIKS}: Bringing key transparency to end users
MS Melara, A Blankstein, J Bonneau, EW Felten, MJ Freedman
24th USENIX Security Symposium (USENIX Security 15), 383-398, 2015
3962015
{SPORC}: Group Collaboration using Untrusted Cloud Resources
AJ Feldman, WP Zeller, MJ Freedman, EW Felten
9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10), 2010
3892010
The system can't perform the operation now. Try again later.
Articles 1–20