ÆÈ·Î¿ì
Joseph Bonneau
Joseph Bonneau
cs.nyu.eduÀÇ À̸ÞÀÏ È®ÀÎµÊ - ȨÆäÀÌÁö
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Bitcoin and cryptocurrency technologies: a comprehensive introduction
A Narayanan, J Bonneau, E Felten, A Miller, S Goldfeder
Princeton University Press, 2016
23102016
Sok: Research perspectives and challenges for bitcoin and cryptocurrencies
J Bonneau, A Miller, J Clark, A Narayanan, JA Kroll, EW Felten
2015 IEEE symposium on security and privacy, 104-121, 2015
14782015
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes
J Bonneau, C Herley, PC Van Oorschot, F Stajano
2012 IEEE symposium on security and privacy, 553-567, 2012
12602012
The science of guessing: analyzing an anonymized corpus of 70 million passwords
J Bonneau
2012 IEEE symposium on security and privacy, 538-552, 2012
8672012
The tangled web of password reuse.
A Das, J Bonneau, M Caesar, N Borisov, XF Wang
NDSS 14 (2014), 23-26, 2014
5462014
Mixcoin: Anonymity for Bitcoin with accountable mixes
J Bonneau, A Narayanan, A Miller, J Clark, JA Kroll, EW Felten
539*
Cache-collision timing attacks against AES
J Bonneau, I Mironov
CHES 4249, 201-215, 2006
4892006
Verifiable delay functions
D Boneh, J Bonneau, B Bünz, B Fisch
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology ¡¦, 2018
3892018
The privacy jungle: On the market for data protection in social networks
J Bonneau, S Preibusch
Economics of Information Security and Privacy, 121-167, 2010
3232010
Passwords and the evolution of imperfect authentication
J Bonneau, C Herley, PC Van Oorschot, F Stajano
Communications of the ACM 58 (7), 78-87, 2015
3032015
CONIKS: Bringing Key Transparency to End Users
MS Melara, A Blankstein, J Bonneau, EW Felten, MJ Freedman
24th {USENIX} Security Symposium ({USENIX} Security 15), 383-398, 2015
2832015
Prying data out of a social network
J Bonneau, J Anderson, G Danezis
2009 international conference on advances in social network analysis and ¡¦, 2009
2752009
The Password Thicket: Technical and Market Failures in Human Authentication on the Web.
J Bonneau, S Preibusch
WEIS, 2010
2572010
SoK: Secure Messaging
N Unger, S Dechand, J Bonneau, S Fahl, H Perl, I Goldberg, M Smith
2542015
An Empirical Study of Namecoin and Lessons for Decentralized Namespace Design.
HA Kalodner, M Carlsten, PM Ellenbogen, J Bonneau, A Narayanan
WEIS 1 (1), 1-23, 2015
2152015
Why buy when you can rent? Bribery attacks on Bitcoin consensus
J Bonneau
International Conference on Financial Cryptography and Data Security, 19-26, 2016
211*2016
A birthday present every eleven wallets? The security of customer-chosen banking PINs
J Bonneau, S Preibusch, R Anderson
Financial Cryptography and Data Security, 2012, 2012
2102012
Incentive compatibility of bitcoin mining pool reward functions
O Schrijvers, J Bonneau, D Boneh, T Roughgarden
Financial Cryptography and Data Security: 20th International Conference, FC ¡¦, 2017
1952017
On bitcoin as a public randomness source
J Bonneau, J Clark, S Goldfeder
Cryptology ePrint Archive, 2015
1902015
Eight friends are enough: social graph approximation via public listings
J Bonneau, J Anderson, R Anderson, F Stajano
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, 13-18, 2009
1692009
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20