Ahmed E. Kosba

According to our database1, Ahmed E. Kosba authored at least 23 papers between 2009 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Ethereum Price Prediction using Topological Data Analysis.
Proceedings of the IEEE Global Conference on Artificial Intelligence and Internet of Things, 2022

2020
MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs.
IACR Cryptol. ePrint Arch., 2020

2018
Verifiable Computation in Practice: Tools and Protocols.
PhD thesis, 2018

xJsnark: A Framework for Efficient Verifiable Computation.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

2017
Solidus: Confidential Distributed Ledger Transactions via PVORM.
IACR Cryptol. ePrint Arch., 2017

2016
The Ring of Gyges: Investigating the Future of Criminal Smart Contracts.
IACR Cryptol. ePrint Arch., 2016

On Scaling Decentralized Blockchains - (A Position Paper).
Proceedings of the Financial Cryptography and Data Security, 2016

2015
How to Use SNARKs in Universally Composable Protocols.
IACR Cryptol. ePrint Arch., 2015

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts.
IACR Cryptol. ePrint Arch., 2015

Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab.
IACR Cryptol. ePrint Arch., 2015

Nonoutsourceable Scratch-Off Puzzles to Discourage Bitcoin Mining Coalitions.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Ichnaea: A Low-Overhead Robust WLAN Device-Free Passive Localization System.
IEEE J. Sel. Top. Signal Process., 2014

TRUESET: Nearly Practical Verifiable Set Computations.
IACR Cryptol. ePrint Arch., 2014

ADAM: Automated Detection and Attribution of Malicious Webpages.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

TRUESET: Faster Verifiable Set Computations.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

2013
Nuzzer: A Large-Scale Device-Free Passive Localization System for Wireless Environments.
IEEE Trans. Mob. Comput., 2013

ADAM: Automated detection and attribution of malicious webpages.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Robust WLAN Device-free Passive motion detection.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

RF-Based Vehicle Detection and Speed Estimation.
Proceedings of the 75th IEEE Vehicular Technology Conference, 2012

RASID demo: A robust WLAN device-free passive motion detection system.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

RASID: A robust WLAN device-free passive motion detection system.
Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications, 2012

2011
MobiCom 2011 poster: a robust technique for WLAN device-free passive motion detection.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2011

2009
Analysis of a Device-Free Passive Tracking System in Typical Wireless Environments.
Proceedings of the NTMS 2009, 2009


  Loading...