Joseph Bonneau

According to our database1, Joseph Bonneau authored at least 69 papers between 2006 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
"I was told to buy a software or lose my computer. I ignored it": A study of ransomware.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

2018
Verifiable Delay Functions.
IACR Cryptology ePrint Archive, 2018

Blockchain Security at Scale (Dagstuhl Seminar 18461).
Dagstuhl Reports, 2018

Hostile Blockchain Takeovers (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2018

Verifiable Delay Functions.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
Certificate Transparency with Privacy.
PoPETs, 2017

Certificate Transparency with Privacy.
CoRR, 2017

Obstacles to the Adoption of Secure Communication Tools.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin.
Proceedings of the Financial Cryptography and Data Security, 2017

Can Unicorns Help Users Compare Crypto Key Fingerprints?
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
Differentially Private Password Frequency Lists.
IACR Cryptology ePrint Archive, 2016

Differentially Private Password Frequency Lists.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

The Bitcoin Brain Drain: Examining the Use and Abuse of Bitcoin Brain Wallets.
Proceedings of the Financial Cryptography and Data Security, 2016

Incentive Compatibility of Bitcoin Mining Pool Reward Functions.
Proceedings of the Financial Cryptography and Data Security, 2016

EthIKS: Using Ethereum to Audit a CONIKS Key Transparency Log.
Proceedings of the Financial Cryptography and Data Security, 2016

Why Buy When You Can Rent? - Bribery Attacks on Bitcoin-Style Consensus.
Proceedings of the Financial Cryptography and Data Security, 2016

Bitcoin and Cryptocurrency Technologies - A Comprehensive Introduction.
Princeton University Press, ISBN: 978-0-691-17169-2, 2016

2015
Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges.
IACR Cryptology ePrint Archive, 2015

Cracking-Resistant Password Vaults using Natural Language Encoders.
IACR Cryptology ePrint Archive, 2015

Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.
IACR Cryptology ePrint Archive, 2015

On Bitcoin as a public randomness source.
IACR Cryptology ePrint Archive, 2015

Passwords and the evolution of imperfect authentication.
Commun. ACM, 2015

Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at Google.
Proceedings of the 24th International Conference on World Wide Web, 2015

An Empirical Study of Namecoin and Lessons for Decentralized Namespace Design.
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015

CONIKS: Bringing Key Transparency to End Users.
Proceedings of the 24th USENIX Security Symposium, 2015

SoK: Secure Messaging.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Cracking-Resistant Password Vaults Using Natural Language Encoders.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Learning Assigned Secrets for Unlocking Mobile Devices.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015

Upgrading HTTPS in mid-air: An empirical study of strict transport security and key pinning.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

POSTER: Secure Chat for the Masses? User-centered Security to the Rescue.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
CONIKS: A Privacy-Preserving Consistent Key Service for Secure End-to-End Communication.
IACR Cryptology ePrint Archive, 2014

Mixcoin: Anonymity for Bitcoin with accountable mixes.
IACR Cryptology ePrint Archive, 2014

Towards Reliable Storage of 56-bit Secrets in Human Memory.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Fawkescoin - A Cryptocurrency Without Public-Key Cryptography.
Proceedings of the Security Protocols XXII, 2014

FawkesCoin: A Cryptocurrency Without Public-Key Cryptography (Transcript of Discussion).
Proceedings of the Security Protocols XXII, 2014

The Tangled Web of Password Reuse.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Mixcoin: Anonymity for Bitcoin with Accountable Mixes.
Proceedings of the Financial Cryptography and Data Security, 2014

Cognitive disconnect: understanding facebook connect login permissions.
Proceedings of the second ACM conference on Online social networks, 2014

2012
Guessing human-chosen secrets.
PhD thesis, 2012

Statistical Metrics for Individual Password Strength (Transcript of Discussion).
Proceedings of the Security Protocols XX, 2012

Statistical Metrics for Individual Password Strength.
Proceedings of the Security Protocols XX, 2012

The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

It's Not Stealing If You Need It: A Panel on the Ethics of Performing Research Using Public Data of Illicit Origin.
Proceedings of the Financial Cryptography and Data Security, 2012

Linguistic Properties of Multi-word Passphrases.
Proceedings of the Financial Cryptography and Data Security, 2012

A Birthday Present Every Eleven Wallets? The Security of Customer-Chosen Banking PINs.
Proceedings of the Financial Cryptography and Data Security, 2012

2011
The Privacy Landscape: Product Differentiation on Data Collection.
Proceedings of the Economics of Information Security and Privacy III [papers from the Tenth Workshop on Economics and Information Security, 2011

Scrambling for Lightweight Censorship Resistance.
Proceedings of the Security Protocols XIX, 2011

Getting Web Authentication Right (Transcript of Discussion).
Proceedings of the Security Protocols XIX, 2011

Getting Web Authentication Right A Best-Case Protocol for the Remaining Life of Passwords.
Proceedings of the Security Protocols XIX, 2011

2010
Don't Tread on Me: Moderating Access to OSN Data with SpikeStrip.
Proceedings of the 3rd Workshop on Online Social Networks, 2010

The Password Thicket: Technical and Market Failures in Human Authentication on the Web.
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010

Inglorious Installers: Security in the Application Marketplace.
Proceedings of the 9th Annual Workshop on the Economics of Information Security, 2010

Digital Immolation (Transcript of Discussion).
Proceedings of the Security Protocols XVIII, 2010

Digital Immolation - New Directions for Online Protest.
Proceedings of the Security Protocols XVIII, 2010

The Password Game: Negative Externalities from Weak Password Practices.
Proceedings of the Decision and Game Theory for Security, 2010

What's in a Name?
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

2009
The Privacy Jungle: On the Market for Data Protection in Social Networks.
Proceedings of the 8th Annual Workshop on the Economics of Information Security, 2009

Alice and Bob in Love.
Proceedings of the Security Protocols XVII, 2009

Privacy stories: confidence in privacy behaviors through end user programming.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Privacy suites: shared privacy for social networks.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Eight friends are enough: social graph approximation via public listings.
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, 2009

Privacy-enabling social networking over untrusted networks.
Proceedings of the 2nd ACM Workshop on Online Social Networks, 2009

Privacy-enhanced public view for social graphs.
Proceedings of the 2nd ACM Workshop on Social Web Search and Mining, 2009

Prying Data out of a Social Network.
Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, 2009

2006
Robust Final-Round Cache-Trace Attacks Against AES.
IACR Cryptology ePrint Archive, 2006

Cache-Collision Timing Attacks Against AES.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006


  Loading...