Edward W. Felten

Affiliations:
  • Princeton University, USA


According to our database1, Edward W. Felten authored at least 107 papers between 1985 and 2023.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2007, "For contributions to security and the public policy of information technology.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
EIP-4844 Economics and Rollup Strategies.
CoRR, 2023

Buying Time: Latency Racing vs. Bidding in Fair Transaction Ordering.
CoRR, 2023

Incentive Schemes for Rollup Validators.
Proceedings of the Mathematical Research for Blockchain Economy: 4th International Conference MARBLE 2023, 2023

Efficient Rollup Batch Posting Strategy on Base Layer.
Proceedings of the Financial Cryptography and Data Security. FC 2023 International Workshops, 2023

Buying Time: Latency Racing vs. Bidding for Transaction Ordering.
Proceedings of the 5th Conference on Advances in Financial Technologies, 2023

2022
Efficient L2 Batch Posting Strategy on L1.
CoRR, 2022

Watching the watchers: bias and vulnerability in remote proctoring software.
Proceedings of the 31st USENIX Security Symposium, 2022

2019
When code isn't law: keynote presentation.
Proceedings of the Symposium on Computer Science and Law, 2019

Watching You Watch: The Tracking Ecosystem of Over-the-Top TV Streaming Devices.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Determining an optimal threshold on the online reserves of a bitcoin exchange.
J. Cybersecur., 2018

A Cryptographic Escrow for Treaty Declarations and Step-by-Step Verification.
CoRR, 2018

Arbitrum: Scalable, private smart contracts.
Proceedings of the 27th USENIX Security Symposium, 2018

2016
Bitcoin and Cryptocurrency Technologies - A Comprehensive Introduction.
Princeton University Press, ISBN: 978-0-691-17169-2, 2016

2015
Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2015

Cookies That Give You Away: The Surveillance Implications of Web Tracking.
Proceedings of the 24th International Conference on World Wide Web, 2015

CONIKS: Bringing Key Transparency to End Users.
Proceedings of the 24th USENIX Security Symposium, 2015

SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Keynote Talk.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
CONIKS: A Privacy-Preserving Consistent Key Service for Secure End-to-End Communication.
IACR Cryptol. ePrint Arch., 2014

Mixcoin: Anonymity for Bitcoin with accountable mixes.
IACR Cryptol. ePrint Arch., 2014

Security Audit of Safeplug "Tor in a Box".
Proceedings of the 4th USENIX Workshop on Free and Open Communications on the Internet, 2014

2012
Privacy and Integrity are Possible in the Untrusted Cloud.
IEEE Data Eng. Bull., 2012

Toward a healthy wireless privacy ecosystem.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

2011
Bubble Trouble: Off-Line De-Anonymization of Bubble Forms.
Proceedings of the 20th USENIX Security Symposium, 2011

"You Might Also Like: " Privacy Risks of Collaborative Filtering.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

2010
SVC: Selector-based View Composition for Web Frameworks.
Proceedings of the USENIX Conference on Web Application Development, 2010

SPORC: Group Collaboration using Untrusted Cloud Resources.
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010

Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs.
Proceedings of the Network and Distributed System Security Symposium, 2010

2009
Lest we remember: cold-boot attacks on encryption keys.
Commun. ACM, 2009

Can DREs Provide Long-Lasting Security? The Case of Return-Oriented Programming and the AVC Advantage.
Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2009

Fingerprinting Blank Paper Using Commodity Scanners.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

2008
In Defense of Pseudorandom Sample Selection.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

Coping with Outside-the-Box Attacks.
Proceedings of the Computer Aided Verification, 20th International Conference, 2008

2007
Security Analysis of the Diebold AccuVote-TS Voting Machine.
Proceedings of the 2007 USENIX/ACCURATE Electronic Voting Technology Workshop, 2007

2006
Digital Rights Management, Spyware, and Security.
IEEE Secur. Priv., 2006

Lessons from the Sony CD DRM Episode.
Proceedings of the 15th USENIX Security Symposium, Vancouver, BC, Canada, July 31, 2006

Password management strategies for online accounts.
Proceedings of the 2nd Symposium on Usable Privacy and Security, 2006

Secrecy, flagging, and paranoia: adoption criteria in encrypted email.
Proceedings of the 2006 Conference on Human Factors in Computing Systems, 2006

2005
DRM and public policy.
Commun. ACM, 2005

A convenient method for securely managing passwords.
Proceedings of the 14th international conference on World Wide Web, 2005

2004
Privacy management for portable recording devices.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004

New client puzzle outsourcing techniques for DoS resistance.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

2003
Mechanisms for secure modular programming in Java.
Softw. Pract. Exp., 2003

Understanding Trusted Computing: Will Its Benefits Outweigh Its Drawbacks?
IEEE Secur. Priv., 2003

A skeptical view of DRM and fair use.
Commun. ACM, 2003

Access Control on the Web Using Proof-carrying Authorization.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

Receiver anonymity via incomparable public keys.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2002
A General and Flexible Access-Control System for the Web.
Proceedings of the 11th USENIX Security Symposium, 2002

Informed Consent in the Mozilla Browser: Implementing Value Sensitive Design.
Proceedings of the 35th Hawaii International Conference on System Sciences (HICSS-35 2002), 2002

Users' conceptions of risks and harms on the web: a comparative study.
Proceedings of the Extended abstracts of the 2002 Conference on Human Factors in Computing Systems, 2002

Users' conceptions of web security: a comparative study.
Proceedings of the Extended abstracts of the 2002 Conference on Human Factors in Computing Systems, 2002

Attacking an Obfuscated Cipher by Injecting Faults.
Proceedings of the Security and Privacy in Digital Rights Management, 2002

2001
Computer Security: Competing Concepts
CoRR, 2001

Reading Between the Lines: Lessons from the SDMI Challenge.
Proceedings of the 10th USENIX Security Symposium, 2001

Analysis of attacks on SDMI audio watermarks.
Proceedings of the IEEE International Conference on Acoustics, 2001

Cookies and web browser design: toward realizing informed consent online.
Proceedings of the CHI 2001 Conference on Human Factors in Computing Systems, Seattle, WA, USA, March 31, 2001

2000
SAFKASI: a security mechanism for language-based systems.
ACM Trans. Softw. Eng. Methodol., 2000

Statically Scanning Java Code: Finding Security Vulnerabilities.
IEEE Softw., 2000

Technological access control interferes with noninfringing scholarship.
Commun. ACM, 2000

Dr. Felton Goes to Washington: A Personal View of the Microsoft Antitrust Case.
Proceedings of the 14th Conference on Systems Administration (LISA 2000), 2000

Timing attacks on Web privacy.
Proceedings of the CCS 2000, 2000

Efficient Commerce Protocols based on One-Time Pads.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

1999
Hand-Held Computers Can Be Better Smart Cards.
Proceedings of the 8th USENIX Security Symposium, Washington, DC, USA, August 23-26, 1999, 1999

Proof-Carrying Authentication.
Proceedings of the CCS '99, 1999

1998
Mobile Code and Security - Guest Editors' Introduction.
IEEE Internet Comput., 1998

Understanding Java Stack Inspection.
Proceedings of the Security and Privacy, 1998

Performance Measurements for Multithreaded Programs.
Proceedings of the 1998 ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems, 1998

Retrospective: Virtual Memory Mapped Network Interface for the SHRIMP Multicomputer.
Proceedings of the 25 Years of the International Symposia on Computer Architecture (Selected Papers)., 1998

Design Choices in the SHRIMP System: An Empirical Study.
Proceedings of the 25th Annual International Symposium on Computer Architecture, 1998

Performance Issues of a Distributed Frame Buffer on a Multicomputer.
Proceedings of the 1998 ACM SIGGRAPH/EUROGRAPHICS Workshop on Graphics Hardware, Lisbon, Portugal, August 31, 1998

1997
Client-server computing on Shrimp.
IEEE Micro, 1997

Fast RPC on the SHRIMP Virtual Memory Mapped Network Interface.
J. Parallel Distributed Comput., 1997

Webware Security.
Commun. ACM, 1997

Extensible Security Architecture for Java.
Proceedings of the Sixteenth ACM Symposium on Operating System Principles, 1997

Reducing Waiting Costs in User-Level Communication.
Proceedings of the 11th International Parallel Processing Symposium (IPPS '97), 1997

Stream Sockets on SHRIMP.
Proceedings of the Communication and Architectural Support for Network-Based Parallel Computing, 1997

Java security - hostile applets, holes and antidotes: what every netscape and internet explorer user needs to know.
Wiley, ISBN: 978-0-471-17842-2, 1997

1996
Implementation and Performance of Integrated Application-Controlled File Caching, Prefetching, and Disk Scheduling.
ACM Trans. Comput. Syst., 1996

Java Security: From HotJava to Netscape and Beyond.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996

Integrating Parallel Prefetching and Caching.
Proceedings of the 1996 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, 1996

A Trace-Driven Comparison of Algorithms for Parallel Prefetching and Caching.
Proceedings of the Second USENIX Symposium on Operating Systems Design and Implementation (OSDI), 1996

Early Experience with Message-Passing on the SHRIMP Multicomputer.
Proceedings of the 23rd Annual International Symposium on Computer Architecture, 1996

Software Support for Virtual Memory-Mapped Communication.
Proceedings of IPPS '96, 1996

Design and Implementation of NX Message Passing Using Shrimp Virtual Memory Mapped Communication.
Proceedings of the 1996 International Conference on Parallel Processing, 1996

Improving Release-Consistent Shared Virtual Memory Using Automatic Update.
Proceedings of the Second International Symposium on High-Performance Computer Architecture, 1996

Protected, User-Level DMA for the SHRIMP Network Interface.
Proceedings of the Second International Symposium on High-Performance Computer Architecture, 1996

Flexible, extensible Java security using digital signatures.
Proceedings of the Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996, 1996

1995
Virtual-Memory-Mapped Network Interfaces.
IEEE Micro, 1995

A Study of Integrated Prefetching and Caching Strategies.
Proceedings of the 1995 ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems, 1995

Synchronization for a multi-port frame buffer on a mesh-connected multicomputer.
Proceedings of the IEEE Symposium on Parallel Rendering, 1995

Evaluating Multi-Port Frame Buffer Designs for a Mesh-Connected Multicomputer.
Proceedings of the 22nd Annual International Symposium on Computer Architecture, 1995

1994
Application-Controlled File Caching Policies.
Proceedings of the USENIX Summer 1994 Technical Conference, 1994

Implementation and Performance of Application-Controlled File Caching.
Proceedings of the First USENIX Symposium on Operating Systems Design and Implementation (OSDI), 1994

Virtual Memory Mapped Network Interface for the SHRIMP Multicomputer.
Proceedings of the 21st Annual International Symposium on Computer Architecture. Chicago, 1994

Two virtual memory mapped network interface designs.
Proceedings of the Hot Interconnects II, 1994

1992
Large-step markov chains for the TSP incorporating local search heuristics.
Oper. Res. Lett., 1992

Performance Issues in Non-blocking Synchronization on Shared-memory Multiprocessors.
Proceedings of the Eleventh Annual ACM Symposium on Principles of Distributed Computing, 1992

1991
Large-Step Markov Chains for the Traveling Salesman Problem.
Complex Syst., 1991

1990
Benchmarking Advanced Architecture Computers.
Concurr. Pract. Exp., 1990

1988
A Highly Parallel Chess Program.
Proceedings of the International Conference on Fifth Generation Computer Systems, 1988

Chess on a hypercube.
Proceedings of the Third Conference on Hypercube Concurrent Computers and Applications, 1988

A safe vertex.
Proceedings of the Third Conference on Hypercube Concurrent Computers and Applications, 1988

Coherent parallel C.
Proceedings of the Third Conference on Hypercube Concurrent Computers and Applications, 1988

Best-first branch-and bound on a hypercube.
Proceedings of the Third Conference on Hypercube Concurrent Computers and Applications, 1988

Generalized signals: an interrupt-based communication system for hypercubes.
Proceedings of the Third Conference on Hypercube Concurrent Computers and Applications, 1988

1985
The Traveling Salesman Problem on a Hypercubic, MIMD Computer.
Proceedings of the International Conference on Parallel Processing, 1985


  Loading...