Edward Felten

Affiliations: 
Computer Science Princeton University, Princeton, NJ 
Area:
Computer security; network software; technology law and policy.
Google:
"Edward Felten"

Children

Sign in to add trainee
Dirk Balfanz grad student 2001 Princeton
Brent R. Waters grad student 2004 Princeton
Shirley Gaw grad student 2009 Princeton
John A. Halderman grad student 2009 Princeton
Matthias Jacob grad student 2009 Princeton
Joseph A. Calandrino grad student 2012 Princeton
William B. Clarkson grad student 2012 Princeton
Ariel J. Feldman grad student 2012 Princeton
Harlan M. Yu grad student 2012 Princeton
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Bonneau J, Miller A, Clark J, et al. (2015) SoK: Research perspectives and challenges for bitcoin and cryptocurrencies Proceedings - Ieee Symposium On Security and Privacy. 2015: 104-121
Felten EW, Kroll JA. (2014) Help wanted on internet security. Scientific American. 311: 14
Bonneau J, Narayanan A, Miller A, et al. (2014) Mixcoin: Anonymity for bitcoin with accountable mixes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8437: 486-504
Calandrino JA, Kilzer A, Narayanan A, et al. (2011) "You might also like:" Privacy risks of collaborative filtering Proceedings - Ieee Symposium On Security and Privacy. 231-246
Leighton R, Cecil J, Ishakian M, et al. (2010) Panel three: Implementation-what methods, if any, can be employed to promote the existing rules' attempts to protect private identifier information from internet access? Fordham Law Review. 79: 45-64
Halderman JA, Schoen SD, Heninger N, et al. (2009) Lest we remember: Cold-boot attacks on encryption keys Communications of the Acm. 52: 91-98
Clarkson W, Weyrich T, Finkelstein A, et al. (2009) Fingerprinting blank paper using commodity scanners Proceedings - Ieee Symposium On Security and Privacy. 301-314
Felten E, Craver S, Fridrich J, et al. (2009) MM&Sec'09: Proceedings of the 2009 ACM SIGMM - Multimedia and Security Workshop: Foreword Mmandsec'09 - Proceedings of the 11th Acm Multimedia Security Workshop. iii
Felten EW. (2008) Coping with outside-the-box attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5123: 3-4
Gaw S, Felten EW. (2006) Password management strategies for online accounts Acm International Conference Proceeding Series. 149: 44-55
See more...