Hawk: The blockchain model of cryptography and privacy-preserving smart contracts A Kosba, A Miller, E Shi, Z Wen, C Papamanthou
2016 IEEE symposium on security and privacy (SP), 839-858, 2016
2338 2016 On scaling decentralized blockchains K Croman, C Decker, I Eyal, AE Gencer, A Juels, A Kosba, A Miller, ...
International conference on financial cryptography and data security, 106-125, 2016
1242 2016 Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab K Delmolino, M Arnett, A Kosba, A Miller, E Shi
International conference on financial cryptography and data security, 79-94, 2016
613 2016 Nuzzer: A large-scale device-free passive localization system for wireless environments M Seifeldin, A Saeed, AE Kosba, A El-Keyi, M Youssef
IEEE Transactions on Mobile Computing 12 (7), 1321-1334, 2013
387 2013 Rasid: A robust wlan device-free passive motion detection system AE Kosba, A Saeed, M Youssef
Pervasive Computing and Communications (PerCom), 2012 IEEE International …, 2012
252 2012 The ring of gyges: Investigating the future of criminal smart contracts A Juels, A Kosba, E Shi
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
222 * 2016 Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions A Miller, A Kosba, J Katz, E Shi
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
135 2015 Ichnaea: A low-overhead robust WLAN device-free passive localization system A Saeed, AE Kosba, M Youssef
IEEE Journal of selected topics in signal processing 8 (1), 5-15, 2013
123 2013 Solidus: Confidential distributed ledger transactions via PVORM E Cecchetti, F Zhang, Y Ji, A Kosba, A Juels, E Shi
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
113 2017 Analysis of a device-free passive tracking system in typical wireless environments AE Kosba, A Abdelkader, M Youssef
2009 3rd international conference on new technologies, mobility and security …, 2009
95 2009 RF-based vehicle detection and speed estimation N Kassem, AE Kosba, M Youssef
2012 IEEE 75th Vehicular Technology Conference (VTC Spring), 1-5, 2012
92 2012 TrueSet: Faster Verifiable Set Computations AE Kosba, D Papadopoulos, C Papamanthou, MF Sayed, E Shi, ...
USENIX Security, 2014
83 * 2014 C C : A Framework for Building Composable Zero-Knowledge Proofs A Kosba, Z Zhao, A Miller, Y Qian, H Chan, C Papamanthou, R Pass, ...
Cryptology ePrint Archive, 2015
78 * 2015 xJsnark: A Framework for Efficient Verifiable Computation A Kosba, C Papamanthou, E Shi
IEEE Symposium on Security and Privacy, 944-961, 2018
56 2018 A programmer’s guide to ethereum and serpent K Delmolino, M Arnett, A Kosba, A Miller, E Shi
URL: https://mc2-umd. github. io/ethereumlab/docs/serpent_tutorial. pdf, 22-23, 2015
25 2015 ADAM: Automated detection and attribution of malicious webpages AE Kosba, A Mohaisen, A West, T Tonn, HK Kim
International Workshop on Information Security Applications, 3-16, 2014
17 2014 RASID demo: A robust WLAN device-free passive motion detection system AE Kosba, M Youssef
2012 IEEE International Conference on Pervasive Computing and Communications …, 2012
16 2012 MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs A Kosba, D Papadopoulos, C Papamanthou, D Song
USENIX Security Symposium 2020, 2020
15 2020 Lab: Step by Step towards Programming a Safe Smart Contract K Delmolino, M Arnett, A Kosba, A Miller, E Shi
3 2015 PREPRINT: Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions A Miller, E Shi, J Katz, A Kosba
Thesis. University of Maryland, College Park, 2015. Print, 0
1