Edward Felten

Results: 76



#Item
1Cross-Site Request Forgeries: Exploitation and Prevention William Zeller? and Edward W. Felten?† ? ? †

Cross-Site Request Forgeries: Exploitation and Prevention William Zeller? and Edward W. Felten?† ? ? †

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2009-10-21 17:43:44
    2On Decentralizing Prediction Markets & Order Books Jeremy Clark, Joseph Bonneau, Edward W. Felten, Joshua A. Kroll, Andrew Miller, & Arvind Narayanan

    On Decentralizing Prediction Markets & Order Books Jeremy Clark, Joseph Bonneau, Edward W. Felten, Joshua A. Kroll, Andrew Miller, & Arvind Narayanan

    Add to Reading List

    Source URL: users.encs.concordia.ca

    Language: English - Date: 2014-07-04 17:01:34
      3SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies  Joseph Bonneau∗†‡ , Andrew Miller§ , Jeremy Clark¶ , Arvind Narayanan∗ , Joshua A. Kroll∗ , Edward W. Felten∗ University, † Stan

      SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies Joseph Bonneau∗†‡ , Andrew Miller§ , Jeremy Clark¶ , Arvind Narayanan∗ , Joshua A. Kroll∗ , Edward W. Felten∗ University, † Stan

      Add to Reading List

      Source URL: www.jbonneau.com

      Language: English - Date: 2018-05-15 14:47:17
      4The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries Joshua A. Kroll, Ian C. Davey, and Edward W. Felten Princeton University Abstract The Bitcoin digital currency depends for its correctness and st

      The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries Joshua A. Kroll, Ian C. Davey, and Edward W. Felten Princeton University Abstract The Bitcoin digital currency depends for its correctness and st

      Add to Reading List

      Source URL: www.econinfosec.org

      - Date: 2013-07-10 18:15:54
        5Security Analysis of the Diebold AccuVote-TS Voting Machine Ariel J. Feldman* , J. Alex Halderman* , and Edward W. Felten*,† * Center for Information Technology Policy and Dept. of Computer Science, Princeton Universit

        Security Analysis of the Diebold AccuVote-TS Voting Machine Ariel J. Feldman* , J. Alex Halderman* , and Edward W. Felten*,† * Center for Information Technology Policy and Dept. of Computer Science, Princeton Universit

        Add to Reading List

        Source URL: www.usenix.org

        - Date: 2007-07-03 10:25:07
          6S AFKASI1: A Security Mechanism for Language-based Systems Dan S. Wallach Rice University Andrew W. Appel and Edward W. Felten Princeton University

          S AFKASI1: A Security Mechanism for Language-based Systems Dan S. Wallach Rice University Andrew W. Appel and Edward W. Felten Princeton University

          Add to Reading List

          Source URL: www.cs.rice.edu

          - Date: 2000-10-31 20:50:34
            7Reuse and Recycle: Online Password Management Shirley Gaw Edward Felten  Dept of Computer Science

            Reuse and Recycle: Online Password Management Shirley Gaw Edward Felten Dept of Computer Science

            Add to Reading List

            Source URL: cups.cs.cmu.edu

            - Date: 2005-06-21 09:58:18
              8HARLAN YU 1200 18th Street NW Suite 808 Washington, DCEDUCATION

              HARLAN YU 1200 18th Street NW Suite 808 Washington, DCEDUCATION

              Add to Reading List

              Source URL: www.teamupturn.com

              Language: English - Date: 2015-03-30 17:29:03
              9DAVID G. ROBINSON 1200 18th St., NW Suite 808, Washington DC9726  EXPERIENCE Principal, Upturn LLC (formerly Robinson & Yu LLC)

              DAVID G. ROBINSON 1200 18th St., NW Suite 808, Washington DC9726 EXPERIENCE Principal, Upturn LLC (formerly Robinson & Yu LLC)

              Add to Reading List

              Source URL: www.teamupturn.com

              Language: English - Date: 2015-07-20 15:27:57