Bitcoin and cryptocurrency technologies: a comprehensive introduction A Narayanan, J Bonneau, E Felten, A Miller, S Goldfeder Princeton University Press, 2016 | 2945 | 2016 |
Sok: Research perspectives and challenges for bitcoin and cryptocurrencies J Bonneau, A Miller, J Clark, A Narayanan, JA Kroll, EW Felten 2015 IEEE symposium on security and privacy, 104-121, 2015 | 1739 | 2015 |
The quest to replace passwords: A framework for comparative evaluation of web authentication schemes J Bonneau, C Herley, PC Van Oorschot, F Stajano 2012 IEEE symposium on security and privacy, 553-567, 2012 | 1406 | 2012 |
The science of guessing: analyzing an anonymized corpus of 70 million passwords J Bonneau 2012 IEEE symposium on security and privacy, 538-552, 2012 | 929 | 2012 |
Mixcoin: Anonymity for Bitcoin with accountable mixes J Bonneau, A Narayanan, A Miller, J Clark, JA Kroll, EW Felten | 619* | |
The tangled web of password reuse. A Das, J Bonneau, M Caesar, N Borisov, XF Wang NDSS 14 (2014), 23-26, 2014 | 608 | 2014 |
Verifiable delay functions D Boneh, J Bonneau, B Bünz, B Fisch Annual international cryptology conference, 757-788, 2018 | 588 | 2018 |
Cache-collision timing attacks against AES J Bonneau, I Mironov Cryptographic Hardware and Embedded Systems-CHES 2006: 8th International …, 2006 | 529 | 2006 |
Passwords and the evolution of imperfect authentication J Bonneau, C Herley, PC Van Oorschot, F Stajano Communications of the ACM 58 (7), 78-87, 2015 | 352 | 2015 |
CONIKS: Bringing Key Transparency to End Users MS Melara, A Blankstein, J Bonneau, EW Felten, MJ Freedman 24th {USENIX} Security Symposium ({USENIX} Security 15), 383-398, 2015 | 338 | 2015 |
The privacy jungle: On the market for data protection in social networks J Bonneau, S Preibusch Economics of Information Security and Privacy, 121-167, 2010 | 338 | 2010 |
SoK: Secure Messaging N Unger, S Dechand, J Bonneau, S Fahl, H Perl, I Goldberg, M Smith | 288 | 2015 |
The Password Thicket: Technical and Market Failures in Human Authentication on the Web. J Bonneau, S Preibusch WEIS, 2010 | 281 | 2010 |
Prying data out of a social network J Bonneau, J Anderson, G Danezis 2009 international conference on advances in social network analysis and …, 2009 | 280 | 2009 |
An Empirical Study of Namecoin and Lessons for Decentralized Namespace Design. HA Kalodner, M Carlsten, PM Ellenbogen, J Bonneau, A Narayanan WEIS 1 (1), 1-23, 2015 | 251 | 2015 |
Why buy when you can rent? Bribery attacks on Bitcoin consensus J Bonneau International Conference on Financial Cryptography and Data Security, 19-26, 2016 | 243 | 2016 |
Financial cryptography and data security J Bonneau, S Preibusch, R Anderson Springer International Publishing, 2020 | 236* | 2020 |
Incentive compatibility of bitcoin mining pool reward functions O Schrijvers, J Bonneau, D Boneh, T Roughgarden Financial Cryptography and Data Security: 20th International Conference, FC …, 2017 | 225 | 2017 |
On Bitcoin as a public randomness source J Bonneau, J Clark, S Goldfeder Cryptology ePrint Archive, 2015 | 220 | 2015 |
Obstacles to the adoption of secure communication tools R Abu-Salma, MA Sasse, J Bonneau, A Danilova, A Naiakshina, M Smith 2017 IEEE Symposium on Security and Privacy (SP), 137-153, 2017 | 199 | 2017 |