Neha Narula

According to our database1, Neha Narula authored at least 19 papers between 2005 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Framework for Programmability in Digital Currency.
CoRR, 2023

Hamilton: A High-Performance Transaction Processor for Central Bank Digital Currencies.
Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation, 2023

2022
A High Performance Payment Processing System Designed for Central Bank Digital Currencies.
IACR Cryptol. ePrint Arch., 2022

2021
Going from bad to worse: from Internet voting to blockchain voting.
J. Cybersecur., 2021

The Power of Random Symmetry-Breaking in Nakamoto Consensus.
Proceedings of the 35th International Symposium on Distributed Computing, 2021

2020
A Lower Bound for Byzantine Agreement and Consensus for Adaptive Adversaries using VDFs.
CoRR, 2020

Double-Spend Counterattacks: Threat of Retaliation in Proof-of-Work Systems.
CoRR, 2020

Responsible vulnerability disclosure in cryptocurrencies.
Commun. ACM, 2020

2019
Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency.
IACR Cryptol. ePrint Arch., 2019

2018
zkLedger: Privacy-Preserving Auditing for Distributed Ledgers.
IACR Cryptol. ePrint Arch., 2018

2015
Parallel execution for conflicting transactions.
PhD thesis, 2015

A Multicore Database is not a Distributed System.
Proceedings of the Seventh Biennial Conference on Innovative Data Systems Research, 2015

2014
Phase Reconciliation for Contended In-Memory Transactions.
Proceedings of the 11th USENIX Symposium on Operating Systems Design and Implementation, 2014

Easy Freshness with Pequod Cache Joins.
Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation, 2014

2012
Executing Web Application Queries on a Partitioned Database.
Proceedings of the 3rd USENIX Conference on Web Application Development, 2012

2011
Intrusion recovery for database-backed web applications.
Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, 2011

2010
Native Client: a sandbox for portable, untrusted x86 native code.
Commun. ACM, 2010

2009
Privacy-preserving browser-side scripting with BFlow.
Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009, 2009

2005
Read/Write Based Fast-Path Transformation for FCFS Mutual Exclusion.
Proceedings of the SOFSEM 2005: Theory and Practice of Computer Science, 2005


  Loading...