[go: up one dir, main page]

Follow
Neha Narula
Neha Narula
MIT Media Lab
Verified email at mit.edu - Homepage
Title
Cited by
Cited by
Year
Native client: A sandbox for portable, untrusted x86 native code
B Yee, D Sehr, G Dardyk, JB Chen, R Muth, T Ormandy, S Okasaka, ...
Communications of the ACM 53 (1), 91-99, 2010
11072010
{zkLedger}:{Privacy-Preserving} auditing for distributed ledgers
N Narula, W Vasquez, M Virza
15th USENIX symposium on networked systems design and implementation (NSDI …, 2018
2682018
Going from bad to worse: from internet voting to blockchain voting
S Park, M Specter, N Narula, RL Rivest
Journal of Cybersecurity 7 (1), tyaa025, 2021
2292021
The impact of blockchain technology on finance: A catalyst for change
M Casey, J Crane, G Gensler, S Johnson, N Narula
ICMB, International Center for Monetary and Banking Studies, 2018
2272018
Phase Reconciliation for Contended {In-Memory} Transactions
N Narula, C Cutler, E Kohler, R Morris
11th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2014
1382014
The blockchain will do to the financial system what the internet did to media
J Ito, N Narula, R Ali
Harvard Business Review 9 (March), 2017
1192017
Matters of design
J Hong
Communications of the ACM 54 (2), 10-11, 2011
76*2011
Intrusion recovery for database-backed web applications
R Chandra, T Kim, M Shah, N Narula, N Zeldovich
Proceedings of the Twenty-Third ACM Symposium on Operating Systems …, 2011
742011
Privacy-preserving browser-side scripting with BFlow
A Yip, N Narula, M Krohn, R Morris
Proceedings of the 4th ACM European conference on Computer systems, 233-246, 2009
722009
Cryptanalysis of curl-p and other attacks on the iota cryptocurrency
E Heilman, N Narula, G Tanzer, J Lovejoy, M Colavita, M Virza, T Dryja
Cryptology ePrint Archive, 2019
542019
A high performance payment processing system designed for central bank digital currencies
J Lovejoy, C Fields, M Virza, T Frederick, D Urness, K Karwaski, ...
Cryptology ePrint Archive, 2022
452022
Double-spend counterattacks: Threat of retaliation in proof-of-work systems
DJ Moroz, DJ Aronoff, N Narula, DC Parkes
arXiv preprint arXiv:2002.10736, 2020
422020
Iota vulnerability report: Cryptanalysis of the curl hash function enabling practical signature forgery attacks on the iota cryptocurrency
E Heilman, N Narula, T Dryja, M Virza
URL: https://github. com/mit-dci/tangled-curl/blob/master/vuln-iota. md, 2017
382017
Exploring practical vulnerabilities of machine learning-based wireless systems
Z Liu, C Xu, E Sie, G Singh, D Vasisht
20th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2023
322023
Defending Internet freedom through decentralization: back to the future
C Barabas, N Narula, E Zuckerman
The Center for Civic Media & The Digital Currency Initiative MIT Media Lab …, 2017
302017
Responsible vulnerability disclosure in cryptocurrencies
R Böhme, L Eckey, T Moore, N Narula, T Ruffing, A Zohar
Communications of the ACM 63 (10), 62-71, 2020
282020
CBDC: Expanding financial inclusion or deepening the divide
N Narula, L Swartz, J Frizzo-Barker
Exploring design choices that could make a difference. Available online …, 2023
25*2023
Redesigning digital money: What can we learn from a decade of cryptocurrencies
R Ali, N Narula
Digital Currency Iniative (DCI). MIT Media Lab, 2020
242020
Hamilton: A {high-performance} transaction processor for central bank digital currencies
J Lovejoy, M Virza, C Fields, K Karwaski, A Brownworth, N Narula
20th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2023
222023
Read/write based fast-path transformation for FCFS mutual exclusion
P Jayanti, S Petrovic, N Narula
International Conference on Current Trends in Theory and Practice of …, 2005
172005
The system can't perform the operation now. Try again later.
Articles 1–20