Joseph Bonneau
Joseph Bonneau
Bestätigte E-Mail-Adresse bei cs.nyu.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Bitcoin and cryptocurrency technologies: a comprehensive introduction
A Narayanan, J Bonneau, E Felten, A Miller, S Goldfeder
Princeton University Press, 2016
10532016
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
J Bonneau, C Herley, PC Van Oorschot, F Stajano
2012 IEEE Symposium on Security and Privacy, 553-567, 2012
8142012
Sok: Research perspectives and challenges for bitcoin and cryptocurrencies
J Bonneau, A Miller, J Clark, A Narayanan, JA Kroll, EW Felten
2015 IEEE Symposium on Security and Privacy, 104-121, 2015
7982015
The science of guessing: analyzing an anonymized corpus of 70 million passwords
J Bonneau
2012 IEEE Symposium on Security and Privacy, 538-552, 2012
6222012
Simultaneous signal transmission of different data-rates in a DWDM system employing external injection locking technique
AS Das, AS Patra
Optics & Laser Technology 64, 23-27, 2014
3612014
Cache-collision timing attacks against AES
J Bonneau, I Mironov
International Workshop on Cryptographic Hardware and Embedded Systems, 201-215, 2006
3552006
The privacy jungle: On the market for data protection in social networks
J Bonneau, S Preibusch
Economics of Information Security and Privacy, 121-167, 2010
2772010
Mixcoin: Anonymity for Bitcoin with accountable mixes
J Bonneau, A Narayanan, A Miller, J Clark, JA Kroll, EW Felten
275*
Prying data out of a social network
J Bonneau, J Anderson, G Danezis
2009 International Conference on Advances in Social Network Analysis and …, 2009
2402009
The Password Thicket: Technical and Market Failures in Human Authentication on the Web.
J Bonneau, S Preibusch
WEIS, 2010
2082010
CONIKS: Bringing Key Transparency to End Users
MS Melara, A Blankstein, J Bonneau, EW Felten, MJ Freedman
24th {USENIX} Security Symposium ({USENIX} Security 15), 383-398, 2015
169*2015
Passwords and the evolution of imperfect authentication
J Bonneau, C Herley, PC Van Oorschot, F Stajano
Communications of the ACM 58 (7), 78-87, 2015
1612015
A birthday present every eleven wallets? The security of customer-chosen banking PINs
J Bonneau, S Preibusch, R Anderson
Financial Cryptography and Data Security, 2012, 2012
1562012
Eight friends are enough: social graph approximation via public listings
J Bonneau, J Anderson, R Anderson, F Stajano
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, 13-18, 2009
1492009
Privacy suites: shared privacy for social networks.
J Bonneau, J Anderson, L Church
SOUPS 9, 1-2, 2009
1482009
SoK: Secure Messaging
N Unger, S Dechand, J Bonneau, S Fahl, H Perl, I Goldberg, M Smith
1442015
Privacy-enabling social networking over untrusted networks
J Anderson, C Diaz, J Bonneau, F Stajano
Proceedings of the 2nd ACM workshop on Online social networks, 1-6, 2009
1152009
An Empirical Study of Namecoin and Lessons for Decentralized Namespace Design.
HA Kalodner, M Carlsten, P Ellenbogen, J Bonneau, A Narayanan
WEIS, 2015
1102015
On Bitcoin as a public randomness source.
J Bonneau, J Clark, S Goldfeder
IACR Cryptology ePrint Archive 2015, 1015, 2015
992015
Towards reliable storage of 56-bit secrets in human memory
J Bonneau, S Schechter
23rd {USENIX} Security Symposium ({USENIX} Security 14), 607-623, 2014
962014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20