Hawk: The blockchain model of cryptography and privacy-preserving smart contracts A Kosba, A Miller, E Shi, Z Wen, C Papamanthou 2016 IEEE symposium on security and privacy (SP), 839-858, 2016 | 3260 | 2016 |
On Scaling Decentralized Blockchains: (A Position Paper) K Croman, C Decker, I Eyal, AE Gencer, A Juels, A Kosba, A Miller, ... International conference on financial cryptography and data security, 106-125, 2016 | 1729 | 2016 |
Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab K Delmolino, M Arnett, A Kosba, A Miller, E Shi Financial Cryptography and Data Security: FC 2016 International Workshops …, 2016 | 801 | 2016 |
Nuzzer: A large-scale device-free passive localization system for wireless environments M Seifeldin, A Saeed, AE Kosba, A El-Keyi, M Youssef IEEE Transactions on Mobile Computing 12 (7), 1321-1334, 2013 | 446 | 2013 |
The ring of gyges: Investigating the future of criminal smart contracts A Juels, A Kosba, E Shi Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 308* | 2016 |
Rasid: A robust wlan device-free passive motion detection system AE Kosba, A Saeed, M Youssef Pervasive Computing and Communications (PerCom), 2012 IEEE International …, 2012 | 293 | 2012 |
Solidus: Confidential distributed ledger transactions via PVORM E Cecchetti, F Zhang, Y Ji, A Kosba, A Juels, E Shi Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 170 | 2017 |
Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions A Miller, A Kosba, J Katz, E Shi Proceedings of the 22Nd acm sigsac conference on computer and communications …, 2015 | 170 | 2015 |
xJsnark: A Framework for Efficient Verifiable Computation A Kosba, C Papamanthou, E Shi IEEE Symposium on Security and Privacy, 944-961, 2018 | 136 | 2018 |
Ichnaea: A low-overhead robust WLAN device-free passive localization system A Saeed, AE Kosba, M Youssef IEEE Journal of selected topics in signal processing 8 (1), 5-15, 2013 | 134 | 2013 |
CC: A Framework for Building Composable Zero-Knowledge Proofs A Kosba, Z Zhao, A Miller, Y Qian, H Chan, C Papamanthou, R Pass, ... Cryptology ePrint Archive, 2015 | 114* | 2015 |
RF-based vehicle detection and speed estimation N Kassem, AE Kosba, M Youssef 2012 IEEE 75th vehicular technology conference (VTC Spring), 1-5, 2012 | 109 | 2012 |
Analysis of a device-free passive tracking system in typical wireless environments AE Kosba, A Abdelkader, M Youssef 2009 3rd international conference on new technologies, mobility and security …, 2009 | 100 | 2009 |
TrueSet: Faster Verifiable Set Computations AE Kosba, D Papadopoulos, C Papamanthou, MF Sayed, E Shi, ... USENIX Security, 2014 | 95* | 2014 |
MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs A Kosba, D Papadopoulos, C Papamanthou, D Song USENIX Security Symposium 2020, 2020 | 49 | 2020 |
A programmer’s guide to ethereum and serpent K Delmolino, M Arnett, A Kosba, A Miller, E Shi URL: https://mc2-umd. github. io/ethereumlab/docs/serpent_tutorial. pdf, 22-23, 2015 | 30 | 2015 |
ADAM: Automated detection and attribution of malicious webpages AE Kosba, A Mohaisen, A West, T Tonn IEEE Conference on Communications and Network Security, 399-400 (poster), 2013 | 24 | 2013 |
RASID demo: A robust WLAN device-free passive motion detection system AE Kosba, M Youssef 2012 IEEE International Conference on Pervasive Computing and Communications …, 2012 | 16 | 2012 |
Lab: Step by step towards programming a safe smart contract K Delmolino, M Arnett, A Kosba, A Miller, E Shi | 4 | 2015 |
PREPRINT: Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions A Miller, E Shi, A Kosba, J Katz Thesis. University of Maryland, College Park, 2015. Print, 0 | 1 | |