Joshua Kroll
Titel
Zitiert von
Zitiert von
Jahr
Sok: Research perspectives and challenges for bitcoin and cryptocurrencies
J Bonneau, A Miller, J Clark, A Narayanan, JA Kroll, EW Felten
2015 IEEE Symposium on Security and Privacy, 104-121, 2015
10672015
SoK: Research perspectives and challenges for Bitcoin and cryptocurrencies
J Bonneau, A Miller, J Clark, A Narayanan, JA Kroll, EW Felten
Security and Privacy (SP), 2015 IEEE Symposium on, 104-121, 2015
10672015
Accountable Algorithms
JA Kroll
Princeton University, 2015
7252015
The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries
JA Kroll, IC Davey, EW Felten
Proceedings of WEIS 2013, 2013
5872013
Mixcoin: Anonymity for Bitcoin with accountable mixes
J Bonneau, A Narayanan, A Miller, J Clark, JA Kroll
Financial Cryptography, 0
363*
Trust but verify: A guide to algorithms and the law
DR Desai, JA Kroll
Harv. JL & Tech. 31, 1, 2017
1492017
Why buy when you can rent?
J Bonneau, EW Felten, S Goldfeder, JA Kroll, A Narayanan
136*
Securing Bitcoin wallets via threshold signatures
S Goldfeder, J Bonneau, EW Felten, JA Kroll, A Narayanan
Princeton University, http://www. cs. princeton. edu/∼ stevenag/bitcoin …, 2014
70*2014
Securing Bitcoin wallets via threshold signatures
S Goldfeder, J Bonneau, EW Felten, JA Kroll, A Narayanan
66*2014
The fallacy of inscrutability
JA Kroll
Phil. Trans. R. Soc. A 376 (2133), 20180084, 2018
472018
Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme
S Goldfeder, R Gennaro, H Kalodner, J Bonneau, JA Kroll, EW Felten, ...
et al., 2015
442015
Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme
S Goldfeder, R Gennaro, H Kalodner, J Bonneau, JA Kroll, EW Felten, ...
et al., 2015
442015
Accountable Algorithms’(2017)
JA Kroll, J Huey, S Barocas, EW Felten, JR Reidenberg, DG Robinson, ...
University of Pennsylvania Law Review 165, 633, 0
44
On decentralizing prediction markets and order books
J Clark, J Bonneau, EW Felten, JA Kroll, A Miller, A Narayanan
Workshop on the Economics of Information Security, State College …, 2014
392014
Why buy when you can rent? bribery attacks on Bitcoin consensus
J Bonneau, EW Felten, S Goldfeder, JA Kroll, A Narayanan
322016
Portable Software Fault Isolation
JA Kroll, G Stewart, AW Appel
24*
Network Hygiene, Incentives, and Regulation: Deployment of Source Address Validation in the Internet
M Luckie, R Beverly, R Koga, K Keys, JA Kroll, k claffy
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
232019
Research perspectives on bitcoin and secondgeneration cryptocurrencies
J Bonneau, A Miller, J Clark, A Narayanan, JA Kroll, EW Felten
IEEE Symposium on Security and Privacy. IEEE, 2015
212015
Corpus-based gesture analysis: an extension of the form dataset for the automatic detection of phases in a gesture
C Martell, J Kroll
International Journal of Semantic Computing 1 (04), 521-536, 2007
162007
This Thing Called Fairness: Disciplinary Confusion Realizing a Value in Technology
DK Mulligan, JA Kroll, N Kohli, RY Wong
arXiv preprint arXiv:1909.11869, 2019
142019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20