Edward Felten - Publications

Affiliations: 
Computer Science Princeton University, Princeton, NJ 
Area:
Computer security; network software; technology law and policy.

58 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2015 Bonneau J, Miller A, Clark J, Narayanan A, Kroll JA, Felten EW. SoK: Research perspectives and challenges for bitcoin and cryptocurrencies Proceedings - Ieee Symposium On Security and Privacy. 2015: 104-121. DOI: 10.1109/SP.2015.14  1
2014 Felten EW, Kroll JA. Help wanted on internet security. Scientific American. 311: 14. PMID 24974688 DOI: 10.1038/scientificamerican0714-14  1
2014 Bonneau J, Narayanan A, Miller A, Clark J, Kroll JA, Felten EW. Mixcoin: Anonymity for bitcoin with accountable mixes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8437: 486-504. DOI: 10.1007/978-3-662-45472-5_31  1
2011 Calandrino JA, Kilzer A, Narayanan A, Felten EW, Shmatikov V. "You might also like:" Privacy risks of collaborative filtering Proceedings - Ieee Symposium On Security and Privacy. 231-246. DOI: 10.1109/SP.2011.40  1
2010 Leighton R, Cecil J, Ishakian M, Felten E, Stong E, Safer J, Heinemann R, Goldstein J. Panel three: Implementation-what methods, if any, can be employed to promote the existing rules' attempts to protect private identifier information from internet access? Fordham Law Review. 79: 45-64.  1
2009 Halderman JA, Schoen SD, Heninger N, Clarkson W, Paul W, Calandrino JA, Feldman AJ, Appelbaum J, Felten EW. Lest we remember: Cold-boot attacks on encryption keys Communications of the Acm. 52: 91-98. DOI: 10.1145/1506409.1506429  1
2009 Clarkson W, Weyrich T, Finkelstein A, Heninger N, Halderman JA, Felten EW. Fingerprinting blank paper using commodity scanners Proceedings - Ieee Symposium On Security and Privacy. 301-314. DOI: 10.1109/SP.2009.7  1
2009 Felten E, Craver S, Fridrich J, Dittman J. MM&Sec'09: Proceedings of the 2009 ACM SIGMM - Multimedia and Security Workshop: Foreword Mmandsec'09 - Proceedings of the 11th Acm Multimedia Security Workshop. iii.  1
2008 Felten EW. Coping with outside-the-box attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5123: 3-4. DOI: 10.1007/978-3-540-70545-1_2  1
2006 Gaw S, Felten EW. Password management strategies for online accounts Acm International Conference Proceeding Series. 149: 44-55. DOI: 10.1145/1143120.1143127  1
2006 Felten EW, Halderman JA. Digital rights management, spyware, and security Ieee Security and Privacy. 4: 18-23. DOI: 10.1109/MSP.2006.12  1
2006 Gaw S, Felten EW, Fernandez-Kelly P. Secrecy, flagging, and paranoia: Adoption criteria in encrypted e-mail Conference On Human Factors in Computing Systems - Proceedings. 1: 591-600.  1
2005 Felten EW. DRM and public policy Communications of the Acm. 48: 112. DOI: 10.1145/1070838.1070871  1
2005 Yu H, Rexford J, Felten EW. A distributed reputation approach to cooperative internet routing protection 2005 First Workshop On Secure Network Protocols, Npsec, Held in Conjunction With Icnp 2005: 13th Ieee International Conference On Network Protocols. 2005: 73-78. DOI: 10.1109/NPSEC.2005.1532057  1
2004 Waters B, Juels A, Halderman JA, Felten EW. New client puzzle outsourcing techniques for DoS resistance Proceedings of the Acm Conference On Computer and Communications Security. 246-256.  1
2004 Halderman JA, Waters B, Felten EW. Privacy management for portable recording devices Wpes'04: Proceedings of the 2004 Acm Workshop On Privacy in the Electronic Society. 16-24.  1
2003 Felten EW. A skeptical view of DRM and fair use Communications of the Acm. 46: 56-59. DOI: 10.1145/641205.641232  1
2003 Felten EW. Understanding trusted computing: Will its benefits outweigh its drawbacks? Ieee Security and Privacy. 1: 60-62. DOI: 10.1109/MSECP.2003.1203224  1
2003 Bauer L, Schneider MA, Felten EW, Appel AW. Access control on the Web using proof-carrying authorization Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2003. 2: 117-119. DOI: 10.1109/DISCEX.2003.1194942  1
2003 Bauer L, Appel AW, Felten EW. Mechanisms for secure modular programming in Java Software - Practice and Experience. 33: 461-480. DOI: 10.1002/Spe.516  1
2003 Jacob M, Boneh D, Felten E. Attacking an obfuscated cipher by injecting faults Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2696: 16-31.  1
2003 Waters BR, Felten EW, Sahai A. Receiver anonymity via Incomparable Public Keys Proceedings of the Acm Conference On Computer and Communications Security. 112-121.  1
2002 Friedman B, Howe DC, Felten E. Informed consent in the Mozilla browser: Implementing value-sensitive design Proceedings of the Annual Hawaii International Conference On System Sciences. 2002. DOI: 10.1109/HICSS.2002.994366  1
2002 Friedman B, Hurley D, Howe DC, Felten E, Nissenbaum H. Users' conceptions of web security: A comparative study Conference On Human Factors in Computing Systems - Proceedings. 746-747.  1
2002 Friedman B, Nissenbaum H, Hurley D, Howe DC, Felten E. Users' conceptions of risks and harms on the Web: A comparative study Conference On Human Factors in Computing Systems - Proceedings. 614-615.  1
2001 Millett LI, Friedmann B, Felten E. Cookies and web browser design: Toward realizing informed consent online Conference On Human Factors in Computing Systems - Proceedings. 46-52.  1
2001 Wu M, Craver SA, Felten EW, Liu B. Analysis of attacks on SDMI audio watermarks Icassp, Ieee International Conference On Acoustics, Speech and Signal Processing - Proceedings. 3: 1369-1372.  1
2000 Wallach DS, Appel AW, Felten EW. SAFKASI: A security mechanism for language-based systems Acm Transactions On Software Engineering and Methodology. 9: 341-378. DOI: 10.1145/363516.363520  1
2000 Schneider MA, Felten EW. Efficient commerce protocols based on one-time pads Proceedings - Annual Computer Security Applications Conference, Acsac. 2000: 317-326. DOI: 10.1109/ACSAC.2000.898886  1
2000 Viega J, McGraw G, Mutdosch T, Felten EW. Statically scanning Java code: Finding security vulnerabilities Ieee Software. 17: 68-74. DOI: 10.1109/52.877869  1
2000 Appel AW, Felten EW. Technological access control interferes with noninfringing scholarship Communications of the Acm. 43: 21-23.  1
2000 Felten EW, Schneider MA. Timing attacks on web privacy Proceedings of the Acm Conference On Computer and Communications Security. 25-32.  1
1999 Appel AW, Felten EW. Proof-carrying authentication Proceedings of the Acm Conference On Computer and Communications Security. 52-62.  1
1998 McGraw G, Felten EW. Mobile code and security Ieee Internet Computing. 2: 26-29.  1
1998 Ji M, Felten EW, Li K. Performance measurements for multithreaded programs Performance Evaluation Review. 26: 161-170.  1
1998 Wei B, Clark DW, Felten EW, Li K, Stoll G. Performance issues of a distributed frame buffer on a multicomputer Proceedings of the Siggraph/Eurographics Workshop On Graphics Hardware. 87-96.  1
1998 Wallach DS, Felten EW. Understanding Java stack inspection Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 52-63.  1
1998 Blumrich MA, Alpert RD, Chen Y, Clark DW, Damianakis SN, Dubnicki C, Felten EW, Iftode L, Li K, Martonosi M, Shillner RA. Design choices in the SHRIMP system: an empirical study Conference Proceedings - Annual International Symposium On Computer Architecture, Isca. 330-341.  1
1997 Damianakis SN, Bilas A, Dubnicki C, Felten EW. Client-server computing on shrimp Ieee Micro. 17: 8-17. DOI: 10.1109/40.566186  1
1997 Damianakis SN, Dubnicki C, Felten EW. Stream sockets on SHRIMP Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1199: 16-30. DOI: 10.1007/3-540-62573-9_2  1
1997 Bilas A, Felten EW. Fast RPC on the SHRIMP virtual memory mapped network interface Journal of Parallel and Distributed Computing. 40: 138-146. DOI: 10.1006/jpdc.1996.1272  1
1997 Damianakis SN, Chen Y, Felten EW. Reducing waiting costs in user-level communication Proceedings of the International Parallel Processing Symposium, Ipps. 381-387.  1
1997 Wallach DS, Balfanz D, Dean D, Felten EW. Extensible Security Architectures for Java Operating Systems Review (Acm). 31: 116-128.  1
1996 Kimbrel T, Cao P, Felten EW, Karlin AR, Li K. Integrated parallel prefetching and caching Performance Evaluation Review. 24: 262-263.  1
1996 Cao P, Felten EW, Karlin AR, Li K. Implementation and Performance of Integrated Application-Controlled File Caching, Prefetching, and Disk Scheduling Acm Transactions On Computer Systems. 14: 311-343.  1
1996 Felten EW, Alpert RD, Bilas A, Blumrich MA, Clark DW, Damianakis SN, Dubnicki C, Iftode L, Li K. Early experience with message-passing on the SHRIMP multicomputer Conference Proceedings - Annual International Symposium On Computer Architecture, Isca. 296-307.  1
1996 Dean D, Felten EW, Wallach DS. Java security: from HotJava to netscape and beyond Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 190-200.  1
1996 Blumrich MA, Dubnicki C, Felten EW, Li K. Protected, user-level DMA for the SHRIMP network interface Ieee High-Performance Computer Architecture Symposium Proceedings. 154-165.  1
1996 Dubnicki C, Iftode L, Felten EW, Li K. Software support for virtual memory-mapped communication Ieee Symposium On Parallel and Distributed Processing - Proceedings. 372-381.  1
1996 Iftode L, Dubnicki C, Felten EW, Li K. Improving release-consistent shared virtual memory using automatic update Ieee High-Performance Computer Architecture Symposium Proceedings. 14-25.  1
1995 Blumrich MA, Dubnicki C, Felten EW, Li K, Mesarina MR. Virtual-Memory-Mapped Network Interfaces Ieee Micro. 15: 21-28. DOI: 10.1109/40.342014  1
1995 Wei B, Stoll G, Clark DW, Felten EW, Li K, Hanrahan P. Synchronization for a multi-port frame buffer on a mesh-connected multicomputer Proc 1995 Parall Rendering Symp. 81-88.  1
1995 Stoll G, Wei B, Clark D, Felten EW, Li K, Hanrahan P. Evaluating multi-port frame buffer designs for a mesh-connected multicomputer Conference Proceedings - Annual International Symposium On Computer Architecture, Isca. 96-105.  1
1994 Blumrich MA, Li K, Alpert R, Dubnicki C, Felten EW, Sandberg J. Virtual memory mapped network interface for the SHRIMP multicomputer Conference Proceedings - Annual International Symposium On Computer Architecture, Isca. 142-153.  1
1992 Martin O, Otto SW, Felten EW. Large-step markov chains for the TSP incorporating local search heuristics Operations Research Letters. 11: 219-224. DOI: 10.1016/0167-6377(92)90028-2  1
1992 Alemany J, Felten EW. Performance issues in non-blocking synchronization on shared-memory multiprocessors Proceedings of the Annual Acm Symposium On Principles of Distributed Computing. 125-134.  1
1992 Felten EW, McNamee D. Improving the performance of message-passing applications by multithreading Proccedings of the Scalable High Performance Computing Conference-Shpcc-92. 84-89.  1
1985 Felten E, Karlin S, Otto SW. TRAVELING SALEMAN PROBLEM ON A HYPERCUBIC, MIMD COMPUTER Proceedings of the International Conference On Parallel Processing. 6-10.  1
Show low-probability matches.