Kevin Lee
Kevin Lee
J.P. Morgan AI Research
Verified email at - Homepage
Cited by
Cited by
An Empirical Analysis of Traceability in the Monero Blockchain
M Möser, K Soska, E Heilman, K Lee, H Heffan, S Srivastava, K Hogan, ...
Proceedings on Privacy Enhancing Technologies 2018 (3), 143-163, 2018
BlockSci: Design and applications of a blockchain analysis platform
H Kalodner, M Möser, K Lee, S Goldfeder, M Plattner, A Chator, ...
29th USENIX Security Symposium (USENIX Security 20), 2721-2738, 2020
Adapting Security Warnings to Counter Online Disinformation
B Kaiser, J Wei, E Lucherini, K Lee, JN Matias, J Mayer
30th USENIX Security Symposium (USENIX Security 21), 1163-1180, 2021
An Empirical Study of Wireless Carrier Authentication for SIM Swaps
K Lee, B Kaiser, J Mayer, A Narayanan
Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 61-79, 2020
Password policies of most top websites fail to follow best practices
K Lee, S Sjöberg, A Narayanan
Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 561-580, 2022
Security and Privacy Risks of Number Recycling at Mobile Carriers in the United States
K Lee, A Narayanan
2021 APWG Symposium on Electronic Crime Research (eCrime), 1-17, 2021
Authenticated Data Structures for Privacy-Preserving Monero Light Clients
K Lee, A Miller
2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 20-28, 2018
Security Policy Audits: Why and How
A Narayanan, K Lee
IEEE Security & Privacy 21 (2), 77-81, 2023
The Digital-Safety Risks of Financial Technologies for Survivors of Intimate Partner Violence
R Bellini, K Lee, MA Brown, J Shaffer, R Bhalerao, T Ristenpart
32nd USENIX Security Symposium (USENIX Security 23), 87-104, 2023
Shortchanged: Uncovering and Analyzing Intimate Partner Financial Abuse in Consumer Complaints
A Bhattacharya, K Lee, V Ravi, J Staddon, R Bellini
The Research-Practice Gap in User Authentication
K Lee
Princeton University, 2022
Towards Creating a Thin Client for Monero
K Lee
The system can't perform the operation now. Try again later.
Articles 1–12