关注
Elli Androulaki
Elli Androulaki
IBM Research
在 zurich.ibm.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
Hyperledger fabric: a distributed operating system for permissioned blockchains
E Androulaki, A Barger, V Bortnikov, C Cachin, K Christidis, A De Caro, ...
Proceedings of the thirteenth EuroSys conference, 1-15, 2018
47112018
Double-spending fast payments in bitcoin
GO Karame, E Androulaki, S Capkun
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
9922012
Evaluating user privacy in bitcoin
E Androulaki, GO Karame, M Roeschlin, T Scherer, S Capkun
Financial Cryptography and Data Security: 17th International Conference, FC …, 2013
9872013
A secure data deduplication scheme for cloud storage
J Stanek, A Sorniotti, E Androulaki, L Kencl
Financial Cryptography and Data Security: 18th International Conference, FC …, 2014
3132014
Methods, media, and systems for detecting attack on a digital processing device
SJ Stolfo, WJ Li, AD Keromylis, E Androulaki
US Patent 8,789,172, 2014
3072014
Misbehavior in bitcoin: A study of double-spending and accountability
GO Karame, E Androulaki, M Roeschlin, A Gervais, S Čapkun
ACM Transactions on Information and System Security (TISSEC) 18 (1), 1-32, 2015
2972015
System, method, and computer program product for privacy-preserving transaction validation mechanisms for smart contracts that are included in a ledger
E Androulaki, A DeCaro, T Kramp, A Sorniotti, M Vukolic
US Patent 9,992,028, 2018
1762018
Reputation systems for anonymous networks
E Androulaki, SG Choi, SM Bellovin, T Malkin
Privacy Enhancing Technologies: 8th International Symposium, PETS 2008 …, 2008
1692008
Bitcoin and blockchain security
GO Karame, E Androulaki
Artech House, 2016
1432016
A study of malcode-bearing documents
WJ Li, S Stolfo, A Stavrou, E Androulaki, AD Keromytis
Detection of Intrusions and Malware, and Vulnerability Assessment: 4th …, 2007
1232007
Channels: Horizontal scaling and confidentiality on permissioned blockchains
E Androulaki, C Cachin, A De Caro, E Kokoris-Kogias
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
1062018
PAR: Payment for anonymous routing
E Androulaki, M Raykova, S Srivatsan, A Stavrou, SM Bellovin
Privacy Enhancing Technologies: 8th International Symposium, PETS 2008 …, 2008
722008
Privacy-preserving auditable token payments in a permissioned blockchain system
E Androulaki, J Camenisch, AD Caro, M Dubovitskaya, K Elkhiyaoui, ...
Proceedings of the 2nd ACM Conference on Advances in Financial Technologies …, 2020
642020
Resisting replay attacks efficiently in a permissioned and privacy-preserving blockchain network
E Androulaki, A De Caro, T Kramp, DW Kravitz, A Sorniotti, M Vukolic
US Patent 10,230,756, 2019
642019
Reconciling end-to-end confidentiality and data reduction in cloud storage
N Baracaldo, E Androulaki, J Glider, A Sorniotti
Proceedings of the 6th Edition of the ACM Workshop on Cloud Computing …, 2014
472014
Network system and method for transferring cryptocurrencies between a user account and a receiving account
E Androulaki, A Kind, I Koltsidas
US Patent 11,295,302, 2022
452022
Shared data encryption and confidentiality
E Androulaki, N Baracaldo, JS Glider, A Sorniotti
US Patent 9,397,832, 2016
432016
Hiding transaction amounts and balances in bitcoin
E Androulaki, GO Karame
Trust and Trustworthy Computing: 7th International Conference, TRUST 2014 …, 2014
432014
Endorsement in hyperledger fabric
E Androulaki, A De Caro, M Neugschwandtner, A Sorniotti
2019 IEEE International Conference on Blockchain (Blockchain), 510-519, 2019
422019
Two bitcoins at the price of one
G Karame, E Androulaki, S Capkun
Double-spending attacks on fast payments in bitcoin. IACR Cryptol. ePrint …, 2012
422012
系统目前无法执行此操作,请稍后再试。
文章 1–20