Hawk: The blockchain model of cryptography and privacy-preserving smart contracts A Kosba, A Miller, E Shi, Z Wen, C Papamanthou 2016 IEEE symposium on security and privacy (SP), 839-858, 2016 | 2287 | 2016 |
On scaling decentralized blockchains K Croman, C Decker, I Eyal, AE Gencer, A Juels, A Kosba, A Miller, ... International conference on financial cryptography and data security, 106-125, 2016 | 1226 | 2016 |
Step by step towards creating a safe smart contract: Lessons and insights from a cryptocurrency lab K Delmolino, M Arnett, A Kosba, A Miller, E Shi International conference on financial cryptography and data security, 79-94, 2016 | 608 | 2016 |
Nuzzer: A large-scale device-free passive localization system for wireless environments M Seifeldin, A Saeed, AE Kosba, A El-Keyi, M Youssef IEEE Transactions on Mobile Computing 12 (7), 1321-1334, 2013 | 385 | 2013 |
Rasid: A robust wlan device-free passive motion detection system AE Kosba, A Saeed, M Youssef Pervasive Computing and Communications (PerCom), 2012 IEEE International …, 2012 | 251 | 2012 |
The ring of gyges: Investigating the future of criminal smart contracts A Juels, A Kosba, E Shi Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 220* | 2016 |
Nonoutsourceable scratch-off puzzles to discourage bitcoin mining coalitions A Miller, A Kosba, J Katz, E Shi Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 134 | 2015 |
Ichnaea: A low-overhead robust WLAN device-free passive localization system A Saeed, AE Kosba, M Youssef IEEE Journal of selected topics in signal processing 8 (1), 5-15, 2013 | 123 | 2013 |
Solidus: Confidential distributed ledger transactions via PVORM E Cecchetti, F Zhang, Y Ji, A Kosba, A Juels, E Shi Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 112 | 2017 |
Analysis of a device-free passive tracking system in typical wireless environments AE Kosba, A Abdelkader, M Youssef 2009 3rd international conference on new technologies, mobility and security …, 2009 | 95 | 2009 |
RF-based vehicle detection and speed estimation N Kassem, AE Kosba, M Youssef 2012 IEEE 75th Vehicular Technology Conference (VTC Spring), 1-5, 2012 | 92 | 2012 |
TrueSet: Faster Verifiable Set Computations AE Kosba, D Papadopoulos, C Papamanthou, MF Sayed, E Shi, ... USENIX Security, 2014 | 82* | 2014 |
CC: A Framework for Building Composable Zero-Knowledge Proofs A Kosba, Z Zhao, A Miller, Y Qian, H Chan, C Papamanthou, R Pass, ... Cryptology ePrint Archive, 2015 | 76* | 2015 |
xJsnark: A Framework for Efficient Verifiable Computation A Kosba, C Papamanthou, E Shi IEEE Symposium on Security and Privacy, 944-961, 2018 | 51 | 2018 |
A programmer’s guide to ethereum and serpent K Delmolino, M Arnett, A Kosba, A Miller, E Shi URL: https://mc2-umd. github. io/ethereumlab/docs/serpent_tutorial. pdf, 22-23, 2015 | 25 | 2015 |
ADAM: Automated detection and attribution of malicious webpages AE Kosba, A Mohaisen, A West, T Tonn, HK Kim International Workshop on Information Security Applications, 3-16, 2014 | 17 | 2014 |
RASID demo: A robust WLAN device-free passive motion detection system AE Kosba, M Youssef 2012 IEEE International Conference on Pervasive Computing and Communications …, 2012 | 16 | 2012 |
MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs A Kosba, D Papadopoulos, C Papamanthou, D Song USENIX Security Symposium 2020, 2020 | 13 | 2020 |
Lab: Step by Step towards Programming a Safe Smart Contract K Delmolino, M Arnett, A Kosba, A Miller, E Shi | 3 | 2015 |
PREPRINT: Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions A Miller, E Shi, A Kosba, J Katz Thesis. University of Maryland, College Park, 2015. Print, 0 | 1 | |