Sarah Meiklejohn
Sarah Meiklejohn
Verified email at - Homepage
Cited by
Cited by
A fistful of bitcoins: characterizing payments among men with no names
S Meiklejohn, M Pomarole, G Jordan, K Levchenko, D McCoy, ...
Proceedings of the 2013 conference on Internet measurement conference, 127-140, 2013
SoK: Consensus in the age of blockchains
S Bano, A Sonnino, M Al-Bassam, S Azouvi, P McCorry, S Meiklejohn, ...
Proceedings of the 1st ACM Conference on Advances in Financial Technologies …, 2019
Centrally banked cryptocurrencies
G Danezis, S Meiklejohn
arXiv preprint arXiv:1505.06895, 2015
Sonic: Zero-knowledge SNARKs from linear-size universal and updatable structured reference strings
M Maller, S Bowe, M Kohlweiss, S Meiklejohn
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
Updatable and universal common reference strings with applications to zk-SNARKs
J Groth, M Kohlweiss, M Maller, S Meiklejohn, I Miers
Annual International Cryptology Conference, 698-728, 2018
An empirical analysis of anonymity in zcash
G Kappos, H Yousaf, M Maller, S Meiklejohn
27th USENIX Security Symposium (USENIX Security 18), 463-477, 2018
Design choices for central bank digital currency: Policy and technical considerations
S Allen, S Čapkun, I Eyal, G Fanti, BA Ford, J Grimmelmann, A Juels, ...
National Bureau of Economic Research, 2020
Privacy-enhancing overlays in bitcoin
S Meiklejohn, C Orlandi
International Conference on Financial Cryptography and Data Security, 127-141, 2015
Coconut: Threshold issuance selective disclosure credentials with applications to distributed ledgers
A Sonnino, M Al-Bassam, S Bano, S Meiklejohn, G Danezis
arXiv preprint arXiv:1802.07344, 2018
Sok: Hate, harassment, and the changing landscape of online abuse
K Thomas, D Akhawe, M Bailey, D Boneh, E Bursztein, S Consolvo, ...
2021 IEEE Symposium on Security and Privacy (SP), 247-267, 2021
Pisa: Arbitration outsourcing for state channels
P McCorry, S Bakshi, I Bentov, S Meiklejohn, A Miller
Proceedings of the 1st ACM Conference on Advances in Financial Technologies …, 2019
Quisquis: A new design for anonymous cryptocurrencies
P Fauzi, S Meiklejohn, R Mercer, C Orlandi
Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019
Botcoin: Monetizing stolen cycles.
DY Huang, H Dharmdasani, S Meiklejohn, V Dave, C Grier, D McCoy, ...
NDSS 2014, 1-16, 2014
Malleable proof systems and applications
M Chase, M Kohlweiss, A Lysyanskaya, S Meiklejohn
Advances in Cryptology–EUROCRYPT 2012: 31st Annual International Conference …, 2012
Smart contracts for bribing miners
P McCorry, A Hicks, S Meiklejohn
Financial Cryptography and Data Security: FC 2018 International Workshops …, 2019
Algebraic MACs and keyed-verification anonymous credentials
M Chase, S Meiklejohn, G Zaverucha
Proceedings of the 2014 acm sigsac conference on computer and communications …, 2014
Malleable signatures: New definitions and delegatable anonymous credentials
M Chase, M Kohlweiss, A Lysyanskaya, S Meiklejohn
2014 IEEE 27th computer security foundations symposium, 199-213, 2014
Möbius: Trustless tumbling for transaction privacy
S Meiklejohn, R Mercer
UCL Department of Computer Science, 2018
Reaching consensus for asynchronous distributed key generation
I Abraham, P Jovanovic, M Maller, S Meiklejohn, G Stern, A Tomescu
Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing …, 2021
Heat of the Moment: Characterizing the Efficacy of Thermal {Camera-Based} Attacks
K Mowery, S Meiklejohn, S Savage
5th USENIX Workshop on Offensive Technologies (WOOT 11), 2011
The system can't perform the operation now. Try again later.
Articles 1–20