Hawk: The blockchain model of cryptography and privacy-preserving smart contracts A Kosba, A Miller, E Shi, Z Wen, C Papamanthou 2016 IEEE symposium on security and privacy (SP), 839-858, 2016 | 3279 | 2016 |
On Scaling Decentralized Blockchains: (A Position Paper) K Croman, C Decker, I Eyal, AE Gencer, A Juels, A Kosba, A Miller, ... International conference on financial cryptography and data security, 106-125, 2016 | 1764 | 2016 |
Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab K Delmolino, M Arnett, A Kosba, A Miller, E Shi Financial Cryptography and Data Security: FC 2016 International Workshops …, 2016 | 802 | 2016 |
Nuzzer: A large-scale device-free passive localization system for wireless environments M Seifeldin, A Saeed, AE Kosba, A El-Keyi, M Youssef IEEE Transactions on Mobile Computing 12 (7), 1321-1334, 2013 | 449 | 2013 |
The ring of gyges: Investigating the future of criminal smart contracts A Juels, A Kosba, E Shi Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 313* | 2016 |
Rasid: A robust wlan device-free passive motion detection system AE Kosba, A Saeed, M Youssef Pervasive Computing and Communications (PerCom), 2012 IEEE International …, 2012 | 290 | 2012 |
Solidus: Confidential distributed ledger transactions via PVORM E Cecchetti, F Zhang, Y Ji, A Kosba, A Juels, E Shi Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 180 | 2017 |
Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions A Miller, A Kosba, J Katz, E Shi Proceedings of the 22Nd acm sigsac conference on computer and communications …, 2015 | 167 | 2015 |
xJsnark: A Framework for Efficient Verifiable Computation A Kosba, C Papamanthou, E Shi IEEE Symposium on Security and Privacy, 944-961, 2018 | 148 | 2018 |
C∅ c∅: A framework for building composable zero-knowledge proofs A Kosba, Z Zhao, A Miller, Y Qian, H Chan, C Papamanthou, R Pass, ... Cryptology ePrint Archive, Report 2015/1093, 2015 | 135* | 2015 |
Ichnaea: A low-overhead robust WLAN device-free passive localization system A Saeed, AE Kosba, M Youssef IEEE Journal of selected topics in signal processing 8 (1), 5-15, 2013 | 135 | 2013 |
RF-based vehicle detection and speed estimation N Kassem, AE Kosba, M Youssef 2012 IEEE 75th vehicular technology conference (VTC Spring), 1-5, 2012 | 106 | 2012 |
Analysis of a device-free passive tracking system in typical wireless environments AE Kosba, A Abdelkader, M Youssef 2009 3rd international conference on new technologies, mobility and security …, 2009 | 101 | 2009 |
TrueSet: Faster Verifiable Set Computations AE Kosba, D Papadopoulos, C Papamanthou, MF Sayed, E Shi, ... USENIX Security, 2014 | 99* | 2014 |
MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs A Kosba, D Papadopoulos, C Papamanthou, D Song USENIX Security Symposium 2020, 2020 | 53 | 2020 |
A programmer’s guide to ethereum and serpent K Delmolino, M Arnett, A Kosba, A Miller, E Shi URL: https://mc2-umd. github. io/ethereumlab/docs/serpent_tutorial. pdf, 22-23, 2015 | 29 | 2015 |
ADAM: Automated detection and attribution of malicious webpages AE Kosba, A Mohaisen, A West, T Tonn IEEE Conference on Communications and Network Security, 399-400 (poster), 2013 | 26 | 2013 |
RASID demo: A robust WLAN device-free passive motion detection system AE Kosba, M Youssef 2012 IEEE International Conference on Pervasive Computing and Communications …, 2012 | 16 | 2012 |
Lab: Step by step towards programming a safe smart contract K Delmolino, M Arnett, A Kosba, A Miller, E Shi | 4 | 2015 |
On Scaling Decentralized Blockchains A Juels, A Kosba, A Miller, P Saxena, E Shi, EG Sirer, D Song, ... Financial Cryptography and Data Security: FC 2016 International Workshops …, 2016 | 1 | 2016 |