Browse by UCL people
Group by: Type | Date
Number of items: 29.
Article
Danezis, G;
Meiklejohn, S;
(2016)
Centrally Banked Cryptocurrencies.
Journal of Cryptology
, Article 502.
|
Meiklejohn, S;
(2018)
Top Ten Obstacles along Distributed Ledgers' Path to Adoption.
IEEE Security & Privacy
, 16
(4)
pp. 13-19.
10.1109/MSP.2018.3111235.
|
Meiklejohn, S;
Mercer, R;
(2018)
Möbius: Trustless Tumbling for Transaction Privacy.
Proceedings on Privacy Enhancing Technologies (PoPETs)
, 2018
(2)
pp. 105-121.
10.1515/popets-2018-0015.
|
Meiklejohn, S;
Pomarole, M;
Jordan, G;
Levchenko, K;
Mccoy, D;
Voelker, GM;
Savage, S;
(2016)
A Fistful of Bitcoins: Characterizing Payments among Men with No Names.
Communications of the ACM
, 59
(4)
pp. 86-93.
10.1145/2896384.
|
Proceedings paper
Al-Bassam, M;
Meiklejohn, S;
(2017)
Contour: A Practical System for Binary Transparency.
In: Garcia-Alfaro, J and Herrera-Joancomartí, J and Livraga, G and Rios, R, (eds.)
Data Privacy Management, Cryptocurrencies and Blockchain Technology.
(pp. pp. 94-110).
Springer: Cham, Switzerland.
|
Azouvi, S;
Al-Bassam, M;
Meiklejohn, S;
(2017)
Who am I? Secure identity registration on distributed ledgers.
In: Garcia-Alfaro, J and Navarro-Arribas, G and Hartenstein, H and Herrera-Joancomartí, J, (eds.)
Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2017 International Workshops, DPM 2017 and CBT 2017: Proceedings.
(pp. pp. 373-389).
Springer: Cham, Switzerland.
|
Azouvi, S;
Maller, M;
Meiklejohn, S;
(2018)
Egalitarian Society or Benevolent Dictatorship: The State of Cryptocurrency Governance.
In: Zohar, A and Eyal, I and Teague, V and Clark, J and Bracciali, A and Pintore, F and Sala, M, (eds.)
Financial Cryptography and Data Security: FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, Revised Selected Papers.
(pp. pp. 127-143).
Springer: Cham, Switzerland.
|
Bano, S;
Sonnino, A;
Al-Bassam, M;
Azouvi, S;
McCorry, P;
Meiklejohn, S;
Danezis, G;
(2019)
SoK: Consensus in the Age of Blockchains.
In:
AFT '19: Proceedings of the 1st ACM Conference on Advances in Financial Technologies.
(pp. pp. 183-198).
ACM: Association for Computing Machinery: New York, NY, USA.
|
Bell, James;
Gascon, Adria;
Lepoint, Tancrede;
Li, Baiyu;
Meiklejohn, Sarah;
Raykova, Mariana;
Yun, Cathie;
(2023)
ACORN: Input Validation for Secure Aggregation.
In:
Proceedings of the 32nd USENIX Security Symposium.
(pp. pp. 4805-4822).
USENIX: Anaheim, CA, USA.
|
Chase, M;
Maller, M;
Meiklejohn, S;
(2016)
Déjà Q all over again: Tighter and broader reductions of q-type assumptions.
In:
ASIACRYPT 2016: Advances in Cryptology – ASIACRYPT 2016.
(pp. pp. 655-681).
Springer International Publishing AG
|
Chase, M;
Meiklejohn, S;
(2016)
Transparency overlays and applications.
In: Weippl, E and Katzenbeisser, S and Kruegel, C and Myers, A and Halevi, S, (eds.)
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security.
(pp. pp. 168-179).
Association for Computing Machinery (ACM): New York, NY, USA.
|
Crites, EC;
Maller, M;
Meiklejohn, S;
Mercer, R;
(2020)
Reputable List Curation from Decentralized Voting.
In:
Proceedings on Privacy Enhancing Technologies.
(pp. pp. 297-320).
Sciendo
|
Danezis, G;
Meiklejohn, S;
(2016)
Centrally Banked Cryptocurrencies.
In:
Proceedings of the NDSS Symposium 2016.
Internet Society: San Diego, CA, USA.
|
Fauzi, P;
Meiklejohn, S;
Mercer, R;
Orlandi, C;
(2019)
Quisquis: A new design for anonymous cryptocurrencies.
In:
Advances in Cryptology – ASIACRYPT 2019.
(pp. pp. 649-678).
: Cham, Switzerland.
|
Groth, J;
Kohlweiss, M;
Maller, M;
Meiklejohn, S;
Miers, I;
(2018)
Updatable and universal common reference strings with applications to zk-SNARKs.
In: Shacham, H and Boldyreva, A, (eds.)
Advances in Cryptology – CRYPTO 2018. CRYPTO 2018. Lecture Notes in Computer Science, vol 10993.
(pp. pp. 698-728).
Springer: Cham.
|
Henzinger, Alexandra;
Hong, Matthew M;
Corrigan-Gibbs, Henry;
Meiklejohn, Sarah;
Vaikuntanathan, Vinod;
(2023)
One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval.
In:
Proceedings of the 32nd USENIX Security Symposium.
(pp. pp. 3889-3905).
USENIX: Anaheim, CA, USA.
|
Judmayer, Aljosha;
Stifter, Nicholas;
Zamyatin, Alexei;
Tsabary, Itay;
Eyal, Ittay;
Gazi, Peter;
Meiklejohn, Sarah;
(2021)
Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies.
In: Bernhard, M and Bracciali, A and Gudgeon, L and Haines, T and KlagesMundt, A and Matsuo, S and Perez, D and Sala, M and Werner, S, (eds.)
Financial Cryptography and Data Security. FC 2021 International Workshops.
(pp. pp. 533-549).
Springer Nature
|
Kappos, George;
Yousaf, Haaroon;
Stutz, Rainer;
Rollet, Sofia;
Haslhofer, Bernhard;
Meiklejohn, Sarah;
(2022)
How to Peel a Million: Validating and Expanding Bitcoin Clusters.
In: Butler, Kevin RB and Thomas, Kurt, (eds.)
Proceedings of the 31st Usenix Security Symposium.
(pp. pp. 2207-2223).
USENIX ASSOC: Boston, MA, USA.
|
Kappos, G;
Yousaf, H;
Maller, M;
Meiklejohn, S;
(2018)
An Empirical Analysis of Anonymity in Zcash.
In: Enck, W and Felt, AP, (eds.)
Proceedings of USENIX Security '18.
(pp. pp. 463-477).
USENIX Association: Baltimore, MD, USA.
|
Maller, M;
Bowe, S;
Kohlweiss, M;
Meiklejohn, S;
(2019)
Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updatable Structured Reference Strings.
In:
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security.
(pp. pp. 2111-2128).
Association for Computing Machinery (ACM): New York, NY, USA.
|
McCorry, P;
Bakshi, S;
Bentov, I;
Meiklejohn, S;
Miller, A;
(2019)
Pisa: Arbitration outsourcing for state channels.
In:
AFT '19: Proceedings of the 1st ACM Conference on Advances in Financial Technologies.
(pp. pp. 16-30).
ACM: New York, NY, USA.
|
McCorry, P;
Hicks, A;
Meiklejohn, S;
(2019)
Smart contracts for bribing miners.
In: Zohar, A, (ed.)
Proceedings of International Conference on Financial Cryptography and Data Security, FC 2018. Lecture Notes in Computer Science, vol 10958.
(pp. pp. 3-18).
Springer: Berlin, Heidelberg.
|
Reibel, P;
Yousaf, H;
Meiklejohn, S;
(2019)
Short Paper: An Exploration of Code Diversity in the Cryptocurrency Landscape.
In:
Financial Cryptography and Data Security.
(pp. pp. 73-83).
Springer: Cham, Switzerland.
|
Wei, Miranda;
Consolvo, Sunny;
Kelley, Patrick Gage;
Kohno, Tadayoshi;
Matthews, Tara;
Meiklejohn, Sarah;
Roesner, Franziska;
... Umbach, Rebecca; + view all
(2024)
Understanding Help-Seeking and Help-Giving on Social Media for Image-Based Sexual Abuse.
In: Balzarotti, Davide and Xu, Wenyuan, (eds.)
SEC '24: Proceedings of the 33rd USENIX Conference on Security Symposium.
(pp. pp. 4391-4408).
USENIX Association: Berkeley, CA, United States.
|
Yousaf, H;
Kappos, G;
Meiklejohn, S;
(2019)
Tracing transactions across cryptocurrency ledgers.
In:
SEC'19: Proceedings of the 28th USENIX Conference on Security Symposium.
(pp. pp. 837-850).
ACM: Berkeley (CA), USA.
|
Yousaf, H;
Kappos, G;
Piotrowska, A;
Kanjalkar, S;
Delgado-Segura, S;
Miller, A;
Meiklejohn, S;
(2021)
An Empirical Analysis of Privacy in the Lightning Network.
In:
Financial Cryptography and Data Security. FC 2021. Lecture Notes in Computer Science, vol 12674.
Springer, Berlin, Heidelberg: Online conference.
|
Working / discussion paper
Chase, M;
Meiklejohn, S;
(2016)
Transparency Overlays and Applications.
Cryptology ePrint Archive
|
Gurkan, K;
Jovanovic, P;
Maller, M;
Meiklejohn, S;
Stern, G;
Tomescu, A;
(2021)
Aggregatable Distributed Key Generation.
IACR Cryptology ePrint Archive: Online.
|
Meiklejohn, S;
Mercer, R;
(2018)
Möbius: Trustless Tumbling for Transaction Privacy.
UCL Department of Computer Science: London, UK.
|