Zobrazeno 1 - 10
of 1 298
pro vyhledávání: '"Ari Juels"'
Autor:
Tadayoshi Kohno
Publikováno v:
IEEE Pervasive Computing. 7:10-11
An interview with Ari Juels, chief scientist and director of RSA Laboratories and a leading expert in computer security in general and in RFID security and privacy in particular. This interview is part of a special issue on implantable electronics.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Non-fungible tokens (NFTs)} are digital objects that reside on blockchains and are typically associated with unique digital media, such as images or music. A recent frenzy of popular interest has given rise seemingly overnight to a multi-billion NFT
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4503be0e1776d35cc685d84d2769a4e8
https://doi.org/10.31235/osf.io/gwzd7
https://doi.org/10.31235/osf.io/gwzd7
Most permissionless blockchain networks run on peer-to-peer (P2P) networks, which offer flexibility and decentralization at the expense of performance (e.g., network latency). Historically, this tradeoff has not been a bottleneck for most blockchains
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::f35e1f82647f55f5eb82f85f96cb8dc4
http://arxiv.org/abs/2205.06837
http://arxiv.org/abs/2205.06837
Autor:
Warren He, Dawn Song, Ari Juels, Raymond Cheng, Fan Zhang, Jernej Kos, Noah R. Johnson, Nicholas Hynes, Andrew Miller
Publikováno v:
IEEE Security & Privacy. 18:17-27
Although smart contracts inherit the availability and other security assurances of the blockchain, they are impeded by lack of confidentiality and poor performance. We present Ekiden, a system that aims to close these critical gaps by combining the b
Publikováno v:
IEEE Security & Privacy. 17:53-61
The Hydra Framework is a new, principled approach to modeling and detecting security-critical bugs. Fusing a variant of classical N-version (redundant) programming with automated bug bounty payouts, Hydra provides economically rigorous and cost-effec
Autor:
Tyrone Lobban, Christine Moy, Alexander Frolov, Harjasleen Malvai, Ari Juels, Nerla Jean-Louis, Andrew Miller, Fan Zhang, Tyler Kell, Deepak Maram
Publikováno v:
IEEE Symposium on Security and Privacy
We present CanDID, a platform for practical, user-friendly realization of decentralized identity, the idea of empowering end users with management of their own credentials.While decentralized identity promises to give users greater control over their
Autor:
Ari Juels
Fears of a weaponized blockchain become reality when a software developer races to deactivate the rogue smart contract targeting him for assassination. Life is comfortable for a prominent, if schlubby, developer at a New York City blockchain company.
Publikováno v:
CCS
Proof-of-work (PoW) cryptocurrency blockchains like Bitcoin secure vast amounts of money. Their operators, called miners, expend resources to generate blocks and receive monetary rewards for their effort. Blockchains are, in principle, attractive tar
Autor:
Andrew Miller, Srdjan Capkun, Giulia Fanti, Ittay Eyal, Bryan Ford, Fan Zhang, Sarah Meiklejohn, Ari Juels, Kari Kostiainen, Karl Wüst, James Grimmelmann, Eswar Prasad, Sarah Allen
Central banks around the world are exploring and in some cases even piloting Central Bank Digital Currencies (CBDCs). CBDCs promise to realize a broad range of new capabilities, including direct government disbursements to citizens, frictionless cons
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4530e0d67c4d70732e2aecc544dddb16
https://doi.org/10.3386/w27634
https://doi.org/10.3386/w27634