Ahmed E. Kosba

According to our database1, Ahmed E. Kosba authored at least 23 papers between 2009 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Ethereum Price Prediction using Topological Data Analysis.
Proceedings of the IEEE Global Conference on Artificial Intelligence and Internet of Things, 2022

2020
MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs.
Proceedings of the 29th USENIX Security Symposium, 2020

2018
Verifiable Computation in Practice: Tools and Protocols.
PhD thesis, 2018

xJsnark: A Framework for Efficient Verifiable Computation.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

2017
Solidus: Confidential Distributed Ledger Transactions via PVORM.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab.
Proceedings of the Financial Cryptography and Data Security, 2016

On Scaling Decentralized Blockchains - (A Position Paper).
Proceedings of the Financial Cryptography and Data Security, 2016

The Ring of Gyges: Investigating the Future of Criminal Smart Contracts.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
How to Use SNARKs in Universally Composable Protocols.
IACR Cryptol. ePrint Arch., 2015

Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Ichnaea: A Low-Overhead Robust WLAN Device-Free Passive Localization System.
IEEE J. Sel. Top. Signal Process., 2014

TRUESET: Nearly Practical Verifiable Set Computations.
IACR Cryptol. ePrint Arch., 2014

ADAM: Automated Detection and Attribution of Malicious Webpages.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

TRUESET: Faster Verifiable Set Computations.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

2013
Nuzzer: A Large-Scale Device-Free Passive Localization System for Wireless Environments.
IEEE Trans. Mob. Comput., 2013

ADAM: Automated detection and attribution of malicious webpages.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Robust WLAN Device-free Passive motion detection.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

RF-Based Vehicle Detection and Speed Estimation.
Proceedings of the 75th IEEE Vehicular Technology Conference, 2012

RASID demo: A robust WLAN device-free passive motion detection system.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

RASID: A robust WLAN device-free passive motion detection system.
Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications, 2012

2011
MobiCom 2011 poster: a robust technique for WLAN device-free passive motion detection.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2011

2009
Analysis of a Device-Free Passive Tracking System in Typical Wireless Environments.
Proceedings of the NTMS 2009, 2009


  Loading...