default search action
Sarah Meiklejohn
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c47]Enze Liu, George Kappos, Eric Mugnier, Luca Invernizzi, Stefan Savage, David Tao, Kurt Thomas, Geoffrey M. Voelker, Sarah Meiklejohn:
Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates. IMC 2024: 704-712 - [c46]Miranda Wei, Sunny Consolvo, Patrick Gage Kelley, Tadayoshi Kohno, Tara Matthews, Sarah Meiklejohn, Franziska Roesner, Renee Shelby, Kurt Thomas, Rebecca Umbach:
Understanding Help-Seeking and Help-Giving on Social Media for Image-Based Sexual Abuse. USENIX Security Symposium 2024 - [i45]Enze Liu, George Kappos, Eric Mugnier, Luca Invernizzi, Stefan Savage, David Tao, Kurt Thomas, Geoffrey M. Voelker, Sarah Meiklejohn:
Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates. CoRR abs/2405.09757 (2024) - [i44]Miranda Wei, Sunny Consolvo, Patrick Gage Kelley, Tadayoshi Kohno, Tara Matthews, Sarah Meiklejohn, Franziska Roesner, Renee Shelby, Kurt Thomas, Rebecca Umbach:
Understanding Help-Seeking and Help-Giving on Social Media for Image-Based Sexual Abuse. CoRR abs/2406.12161 (2024) - [i43]Kurt Thomas, Patrick Gage Kelley, David Tao, Sarah Meiklejohn, Owen Vallis, Shunwen Tan, Blaz Bratanic, Felipe Tiengo Ferreira, Vijay Kumar Eranti, Elie Bursztein:
Supporting Human Raters with the Detection of Harmful Content using Large Language Models. CoRR abs/2406.12800 (2024) - 2023
- [j9]Ittai Abraham, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern, Alin Tomescu:
Reaching consensus for asynchronous distributed key generation. Distributed Comput. 36(3): 219-252 (2023) - [c45]Ittai Abraham, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern:
Bingo: Adaptivity and Asynchrony in Verifiable Secret Sharing and Distributed Key Generation. CRYPTO (1) 2023: 39-70 - [c44]Tyler Kell, Haaroon Yousaf, Sarah Allen, Sarah Meiklejohn, Ari Juels:
Forsage: Anatomy of a Smart-Contract Pyramid Scheme. FC 2023: 241-258 - [c43]Alexandra Henzinger, Matthew M. Hong, Henry Corrigan-Gibbs, Sarah Meiklejohn, Vinod Vaikuntanathan:
One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval. USENIX Security Symposium 2023: 3889-3905 - [c42]James Bell, Adrià Gascón, Tancrède Lepoint, Baiyu Li, Sarah Meiklejohn, Mariana Raykova, Cathie Yun:
ACORN: Input Validation for Secure Aggregation. USENIX Security Symposium 2023: 4805-4822 - [i42]Kurt Thomas, Sarah Meiklejohn, Michael A. Specter, Xiang Wang, Xavier Llorà, Stephan Somogyi, David Kleidermacher:
Robust, privacy-preserving, transparent, and auditable on-device blocklisting. CoRR abs/2304.02810 (2023) - 2022
- [j8]Sarah Meiklejohn, Joe DeBlasio, Devon O'Brien, Chris Thompson, Kevin Yeo, Emily Stark:
SoK: SCT Auditing in Certificate Transparency. Proc. Priv. Enhancing Technol. 2022(3): 336-353 (2022) - [c41]George Kappos, Haaroon Yousaf, Rainer Stütz, Sofia Rollet, Bernhard Haslhofer, Sarah Meiklejohn:
How to Peel a Million: Validating and Expanding Bitcoin Clusters. USENIX Security Symposium 2022: 2207-2223 - [i41]Sarah Meiklejohn, Joe DeBlasio, Devon O'Brien, Chris Thompson, Kevin Yeo, Emily Stark:
SoK: SCT Auditing in Certificate Transparency. CoRR abs/2203.01661 (2022) - [i40]George Kappos, Haaroon Yousaf, Rainer Stütz, Sofia Rollet, Bernhard Haslhofer, Sarah Meiklejohn:
How to Peel a Million: Validating and Expanding Bitcoin Clusters. CoRR abs/2205.13882 (2022) - [i39]Alexandra Henzinger, Matthew M. Hong, Henry Corrigan-Gibbs, Sarah Meiklejohn, Vinod Vaikuntanathan:
One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval. IACR Cryptol. ePrint Arch. 2022: 949 (2022) - [i38]James Bell, Adrià Gascón, Tancrède Lepoint, Baiyu Li, Sarah Meiklejohn, Mariana Raykova, Cathie Yun:
ACORN: Input Validation for Secure Aggregation. IACR Cryptol. ePrint Arch. 2022: 1461 (2022) - [i37]Ittai Abraham, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern:
Bingo: Adaptively Secure Packed Asynchronous Verifiable Secret Sharing and Asynchronous Distributed Key Generation. IACR Cryptol. ePrint Arch. 2022: 1759 (2022) - 2021
- [c40]Kruakae Pothong, Larissa Pschetz, Ruth Catlow, Sarah Meiklejohn:
Problematising Transparency Through LARP And Deliberation. Conference on Designing Interactive Systems 2021: 1682-1694 - [c39]Kobi Gurkan, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern, Alin Tomescu:
Aggregatable Distributed Key Generation. EUROCRYPT (1) 2021: 147-176 - [c38]George Kappos, Haaroon Yousaf, Ania M. Piotrowska, Sanket Kanjalkar, Sergi Delgado-Segura, Andrew Miller, Sarah Meiklejohn:
An Empirical Analysis of Privacy in the Lightning Network. Financial Cryptography (1) 2021: 167-186 - [c37]Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar R. Weippl:
SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies. Financial Cryptography Workshops 2021: 507-532 - [c36]Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar R. Weippl:
Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies. Financial Cryptography Workshops 2021: 533-549 - [c35]Ittai Abraham, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern, Alin Tomescu:
Reaching Consensus for Asynchronous Distributed Key Generation. PODC 2021: 363-373 - [c34]Kurt Thomas, Devdatta Akhawe, Michael D. Bailey, Dan Boneh, Elie Bursztein, Sunny Consolvo, Nicola Dell, Zakir Durumeric, Patrick Gage Kelley, Deepak Kumar, Damon McCoy, Sarah Meiklejohn, Thomas Ristenpart, Gianluca Stringhini:
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse. SP 2021: 247-267 - [i36]Ittai Abraham, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern, Alin Tomescu:
Reaching Consensus for Asynchronous Distributed Key Generation. CoRR abs/2102.09041 (2021) - [i35]Tyler Kell, Haaroon Yousaf, Sarah Allen, Sarah Meiklejohn, Ari Juels:
Forsage: Anatomy of a Smart-Contract Pyramid Scheme. CoRR abs/2105.04380 (2021) - [i34]Kobi Gurkan, Philipp Jovanovic, Mary Maller, Sarah Meiklejohn, Gilad Stern, Alin Tomescu:
Aggregatable Distributed Key Generation. IACR Cryptol. ePrint Arch. 2021: 5 (2021) - 2020
- [j7]Elizabeth C. Crites, Mary Maller, Sarah Meiklejohn, Rebekah Mercer:
Reputable List Curation from Decentralized Voting. Proc. Priv. Enhancing Technol. 2020(4): 297-320 (2020) - [i33]George Kappos, Haaroon Yousaf, Ania M. Piotrowska, Sanket Kanjalkar, Sergi Delgado-Segura, Andrew Miller, Sarah Meiklejohn:
An Empirical Analysis of Privacy in the Lightning Network. CoRR abs/2003.12470 (2020) - [i32]Sarah Meiklejohn, Pavel Kalinnikov, Cindy S. Lin, Martin Hutchinson, Gary Belvin, Mariana Raykova, Al Cutter:
Think Global, Act Local: Gossip and Client Audits in Verifiable Data Structures. CoRR abs/2011.04551 (2020) - [i31]Elizabeth C. Crites, Mary Maller, Sarah Meiklejohn, Rebekah Mercer:
Reputable List Curation from Decentralized Voting. IACR Cryptol. ePrint Arch. 2020: 709 (2020) - [i30]Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar R. Weippl:
SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies. IACR Cryptol. ePrint Arch. 2020: 1614 (2020)
2010 – 2019
- 2019
- [c33]Patrick McCorry, Surya Bakshi, Iddo Bentov, Sarah Meiklejohn, Andrew Miller:
Pisa: Arbitration Outsourcing for State Channels. AFT 2019: 16-30 - [c32]Shehar Bano, Alberto Sonnino, Mustafa Al-Bassam, Sarah Azouvi, Patrick McCorry, Sarah Meiklejohn, George Danezis:
SoK: Consensus in the Age of Blockchains. AFT 2019: 183-198 - [c31]Prastudy Fauzi, Sarah Meiklejohn, Rebekah Mercer, Claudio Orlandi:
Quisquis: A New Design for Anonymous Cryptocurrencies. ASIACRYPT (1) 2019: 649-678 - [c30]Mary Maller, Sean Bowe, Markulf Kohlweiss, Sarah Meiklejohn:
Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updatable Structured Reference Strings. CCS 2019: 2111-2128 - [c29]Pierre Reibel, Haaroon Yousaf, Sarah Meiklejohn:
Short Paper: An Exploration of Code Diversity in the Cryptocurrency Landscape. Financial Cryptography 2019: 73-83 - [c28]Alberto Sonnino, Mustafa Al-Bassam, Shehar Bano, Sarah Meiklejohn, George Danezis:
Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers. NDSS 2019 - [c27]Haaroon Yousaf, George Kappos, Sarah Meiklejohn:
Tracing Transactions Across Cryptocurrency Ledgers. USENIX Security Symposium 2019: 837-850 - [i29]Mary Maller, Sean Bowe, Markulf Kohlweiss, Sarah Meiklejohn:
Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings. IACR Cryptol. ePrint Arch. 2019: 99 (2019) - [i28]Aljosha Judmayer, Nicholas Stifter, Alexei Zamyatin, Itay Tsabary, Ittay Eyal, Peter Gazi, Sarah Meiklejohn, Edgar R. Weippl:
Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies. IACR Cryptol. ePrint Arch. 2019: 775 (2019) - 2018
- [j6]Sarah Meiklejohn:
Top Ten Obstacles along Distributed Ledgers Path to Adoption. IEEE Secur. Priv. 16(4): 13-19 (2018) - [j5]Sarah Meiklejohn, Rebekah Mercer:
Möbius: Trustless Tumbling for Transaction Privacy. Proc. Priv. Enhancing Technol. 2018(2): 105-121 (2018) - [c26]Jens Groth, Markulf Kohlweiss, Mary Maller, Sarah Meiklejohn, Ian Miers:
Updatable and Universal Common Reference Strings with Applications to zk-SNARKs. CRYPTO (3) 2018: 698-728 - [c25]Mustafa Al-Bassam, Sarah Meiklejohn:
Contour: A Practical System for Binary Transparency. DPM/CBT@ESORICS 2018: 94-110 - [c24]Patrick McCorry, Alexander Hicks, Sarah Meiklejohn:
Smart Contracts for Bribing Miners. Financial Cryptography Workshops 2018: 3-18 - [c23]Sarah Azouvi, Mary Maller, Sarah Meiklejohn:
Egalitarian Society or Benevolent Dictatorship: The State of Cryptocurrency Governance. Financial Cryptography Workshops 2018: 127-143 - [c22]George Kappos, Haaroon Yousaf, Mary Maller, Sarah Meiklejohn:
An Empirical Analysis of Anonymity in Zcash. USENIX Security Symposium 2018: 463-477 - [e2]Sarah Meiklejohn, Kazue Sako:
Financial Cryptography and Data Security - 22nd International Conference, FC 2018, Nieuwpoort, Curaçao, February 26 - March 2, 2018, Revised Selected Papers. Lecture Notes in Computer Science 10957, Springer 2018, ISBN 978-3-662-58386-9 [contents] - [i27]Sarah Azouvi, Patrick McCorry, Sarah Meiklejohn:
Winning the Caucus Race: Continuous Leader Election via Public Randomness. CoRR abs/1801.07965 (2018) - [i26]George Kappos, Haaroon Yousaf, Mary Maller, Sarah Meiklejohn:
An Empirical Analysis of Anonymity in Zcash. CoRR abs/1805.03180 (2018) - [i25]Alexander Hicks, Vasilios Mavroudis, Mustafa Al-Bassam, Sarah Meiklejohn, Steven J. Murdoch:
VAMS: Verifiable Auditing of Access to Confidential Data. CoRR abs/1805.04772 (2018) - [i24]Sarah Azouvi, Patrick McCorry, Sarah Meiklejohn:
Betting on Blockchain Consensus with Fantomette. CoRR abs/1805.06786 (2018) - [i23]Pierre Reibel, Haaroon Yousaf, Sarah Meiklejohn:
Why is a Ravencoin Like a TokenDesk? An Exploration of Code Diversity in the Cryptocurrency Landscape. CoRR abs/1810.08420 (2018) - [i22]Haaroon Yousaf, George Kappos, Sarah Meiklejohn:
Tracing Transactions Across Cryptocurrency Ledgers. CoRR abs/1810.12786 (2018) - [i21]Jens Groth, Markulf Kohlweiss, Mary Maller, Sarah Meiklejohn, Ian Miers:
Updatable and Universal Common Reference Strings with Applications to zk-SNARKs. IACR Cryptol. ePrint Arch. 2018: 280 (2018) - [i20]Patrick McCorry, Alexander Hicks, Sarah Meiklejohn:
Smart contracts for bribing miners. IACR Cryptol. ePrint Arch. 2018: 581 (2018) - [i19]Patrick McCorry, Surya Bakshi, Iddo Bentov, Andrew Miller, Sarah Meiklejohn:
Pisa: Arbitration Outsourcing for State Channels. IACR Cryptol. ePrint Arch. 2018: 582 (2018) - [i18]Prastudy Fauzi, Sarah Meiklejohn, Rebekah Mercer, Claudio Orlandi:
QuisQuis: A New Design for Anonymous Cryptocurrencies. IACR Cryptol. ePrint Arch. 2018: 990 (2018) - 2017
- [c21]Sarah Azouvi, Mustafa Al-Bassam, Sarah Meiklejohn:
Who Am I? Secure Identity Registration on Distributed Ledgers. DPM/CBT@ESORICS 2017: 373-389 - [i17]Shehar Bano, Alberto Sonnino, Mustafa Al-Bassam, Sarah Azouvi, Patrick McCorry, Sarah Meiklejohn, George Danezis:
Consensus in the Age of Blockchains. CoRR abs/1711.03936 (2017) - [i16]Mustafa Al-Bassam, Sarah Meiklejohn:
Contour: A Practical System for Binary Transparency. CoRR abs/1712.08427 (2017) - [i15]Sarah Meiklejohn, Rebekah Mercer:
Möbius: Trustless Tumbling for Transaction Privacy. IACR Cryptol. ePrint Arch. 2017: 881 (2017) - 2016
- [j4]Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
A fistful of Bitcoins: characterizing payments among men with no names. Commun. ACM 59(4): 86-93 (2016) - [c20]Melissa Chase, Mary Maller, Sarah Meiklejohn:
Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions. ASIACRYPT (2) 2016: 655-681 - [c19]Melissa Chase, Sarah Meiklejohn:
Transparency Overlays and Applications. CCS 2016: 168-179 - [c18]George Danezis, Sarah Meiklejohn:
Centrally Banked Cryptocurrencies. NDSS 2016 - [e1]Jeremy Clark, Sarah Meiklejohn, Peter Y. A. Ryan, Dan S. Wallach, Michael Brenner, Kurt Rohloff:
Financial Cryptography and Data Security - FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers. Lecture Notes in Computer Science 9604, Springer 2016, ISBN 978-3-662-53356-7 [contents] - [i14]Melissa Chase, Mary Maller, Sarah Meiklejohn:
Deja Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions. IACR Cryptol. ePrint Arch. 2016: 840 (2016) - [i13]Melissa Chase, Sarah Meiklejohn:
Transparency Overlays and Applications. IACR Cryptol. ePrint Arch. 2016: 915 (2016) - 2015
- [c17]Sarah Meiklejohn, Claudio Orlandi:
Privacy-Enhancing Overlays in Bitcoin. Financial Cryptography Workshops 2015: 127-141 - [c16]Allison B. Lewko, Sarah Meiklejohn:
A Profitable Sub-prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups. Public Key Cryptography 2015: 377-398 - [i12]George Danezis, Sarah Meiklejohn:
Centrally Banked Cryptocurrencies. CoRR abs/1505.06895 (2015) - [i11]George Danezis, Sarah Meiklejohn:
Centrally Banked Cryptocurrencies. IACR Cryptol. ePrint Arch. 2015: 502 (2015) - 2014
- [b1]Sarah Meiklejohn:
Flexible Models for Secure Systems. University of California, San Diego, USA, 2014 - [j3]Jason Oberg, Sarah Meiklejohn, Timothy Sherwood, Ryan Kastner:
Leveraging Gate-Level Properties to Identify Hardware Timing Channels. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 33(9): 1288-1301 (2014) - [c15]Melissa Chase, Sarah Meiklejohn, Greg Zaverucha:
Algebraic MACs and Keyed-Verification Anonymous Credentials. CCS 2014: 1205-1216 - [c14]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Malleable Signatures: New Definitions and Delegatable Anonymous Credentials. CSF 2014: 199-213 - [c13]Theresa Calderon, Sarah Meiklejohn, Hovav Shacham, Brent Waters:
Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions. CT-RSA 2014: 349-366 - [c12]Mihir Bellare, Sarah Meiklejohn, Susan Thomson:
Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig. EUROCRYPT 2014: 496-513 - [c11]Melissa Chase, Sarah Meiklejohn:
Déjà Q: Using Dual Systems to Revisit q-Type Assumptions. EUROCRYPT 2014: 622-639 - [c10]Danny Yuxing Huang, Hitesh Dharmdasani, Sarah Meiklejohn, Vacha Dave, Chris Grier, Damon McCoy, Stefan Savage, Nicholas Weaver, Alex C. Snoeren, Kirill Levchenko:
Botcoin: Monetizing Stolen Cycles. NDSS 2014 - [i10]Melissa Chase, Sarah Meiklejohn:
Deja Q: Using Dual Systems to Revisit q-Type Assumptions. IACR Cryptol. ePrint Arch. 2014: 570 (2014) - 2013
- [j2]Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names. login Usenix Mag. 38(6) (2013) - [c9]Jason Oberg, Sarah Meiklejohn, Timothy Sherwood, Ryan Kastner:
A practical testing framework for isolating hardware timing channels. DATE 2013: 1281-1284 - [c8]Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
A fistful of bitcoins: characterizing payments among men with no names. Internet Measurement Conference 2013: 127-140 - [c7]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Verifiable Elections That Scale for Free. Public Key Cryptography 2013: 479-496 - [c6]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Succinct Malleable NIZKs and an Application to Compact Shuffles. TCC 2013: 100-119 - [i9]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials. IACR Cryptol. ePrint Arch. 2013: 179 (2013) - [i8]Allison B. Lewko, Sarah Meiklejohn:
A Profitable Sub-Prime Loan: Obtaining the Advantages of Composite-Order in Prime-Order Bilinear Groups. IACR Cryptol. ePrint Arch. 2013: 300 (2013) - [i7]Mihir Bellare, Sarah Meiklejohn, Susan Thomson:
Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig. IACR Cryptol. ePrint Arch. 2013: 326 (2013) - [i6]Sarah Meiklejohn, Hovav Shacham:
New Trapdoor Projection Maps for Composite-Order Bilinear Groups. IACR Cryptol. ePrint Arch. 2013: 657 (2013) - 2012
- [c5]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Malleable Proof Systems and Applications. EUROCRYPT 2012: 281-300 - [i5]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Malleable Proof Systems and Applications. IACR Cryptol. ePrint Arch. 2012: 12 (2012) - [i4]Sarah Meiklejohn, C. Christopher Erway, Alptekin Küpçü, Theodora Hinkle, Anna Lysyanskaya:
ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash. IACR Cryptol. ePrint Arch. 2012: 226 (2012) - [i3]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Succinct Malleable NIZKs and an Application to Compact Shuffles. IACR Cryptol. ePrint Arch. 2012: 506 (2012) - [i2]Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn:
Verifiable Elections That Scale for Free. IACR Cryptol. ePrint Arch. 2012: 697 (2012) - 2011
- [c4]Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, Hovav Shacham:
The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion. USENIX Security Symposium 2011 - [c3]Keaton Mowery, Sarah Meiklejohn, Stefan Savage:
Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks. WOOT 2011: 46-53 - 2010
- [j1]Sarah Meiklejohn:
Review of an introduction to mathematical cryptography by Jeffrey Hoffstein, Jill Pipher, and Joseph Silverman Springer-Verlag, 2008. SIGACT News 41(4): 47-50 (2010) - [c2]Sarah Meiklejohn, Hovav Shacham, David Mandell Freeman:
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures. ASIACRYPT 2010: 519-538 - [c1]Sarah Meiklejohn, C. Christopher Erway, Alptekin Küpçü, Theodora Hinkle, Anna Lysyanskaya:
ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash. USENIX Security Symposium 2010: 193-206 - [i1]Sarah Meiklejohn, Hovav Shacham, David Mandell Freeman:
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures. IACR Cryptol. ePrint Arch. 2010: 474 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint