Hyperledger fabric: a distributed operating system for permissioned blockchains E Androulaki, A Barger, V Bortnikov, C Cachin, K Christidis, A De Caro, ... Proceedings of the thirteenth EuroSys conference, 1-15, 2018 | 5061 | 2018 |
Evaluating user privacy in bitcoin E Androulaki, GO Karame, M Roeschlin, T Scherer, S Capkun Financial Cryptography and Data Security: 17th International Conference, FC …, 2013 | 1026 | 2013 |
Double-spending fast payments in bitcoin GO Karame, E Androulaki, S Capkun Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 1025 | 2012 |
A secure data deduplication scheme for cloud storage J Stanek, A Sorniotti, E Androulaki, L Kencl Financial Cryptography and Data Security: 18th International Conference, FC …, 2014 | 326 | 2014 |
Methods, media, and systems for detecting attack on a digital processing device SJ Stolfo, WJ Li, AD Keromylis, E Androulaki US Patent 8,789,172, 2014 | 313 | 2014 |
Misbehavior in bitcoin: A study of double-spending and accountability GO Karame, E Androulaki, M Roeschlin, A Gervais, S Čapkun ACM Transactions on Information and System Security (TISSEC) 18 (1), 1-32, 2015 | 307 | 2015 |
System, method, and computer program product for privacy-preserving transaction validation mechanisms for smart contracts that are included in a ledger E Androulaki, A DeCaro, T Kramp, A Sorniotti, M Vukolic US Patent 9,992,028, 2018 | 191 | 2018 |
Reputation systems for anonymous networks E Androulaki, SG Choi, SM Bellovin, T Malkin Privacy Enhancing Technologies: 8th International Symposium, PETS 2008 …, 2008 | 172 | 2008 |
Bitcoin and blockchain security GO Karame, E Androulaki Artech House, 2016 | 145 | 2016 |
A study of malcode-bearing documents WJ Li, S Stolfo, A Stavrou, E Androulaki, AD Keromytis Detection of Intrusions and Malware, and Vulnerability Assessment: 4th …, 2007 | 126 | 2007 |
Channels: Horizontal scaling and confidentiality on permissioned blockchains E Androulaki, C Cachin, A De Caro, E Kokoris-Kogias Computer Security: 23rd European Symposium on Research in Computer Security …, 2018 | 114 | 2018 |
Privacy-preserving auditable token payments in a permissioned blockchain system E Androulaki, J Camenisch, AD Caro, M Dubovitskaya, K Elkhiyaoui, ... Proceedings of the 2nd ACM Conference on Advances in Financial Technologies …, 2020 | 74 | 2020 |
PAR: Payment for anonymous routing E Androulaki, M Raykova, S Srivatsan, A Stavrou, SM Bellovin Privacy Enhancing Technologies: 8th International Symposium, PETS 2008 …, 2008 | 73 | 2008 |
Resisting replay attacks efficiently in a permissioned and privacy-preserving blockchain network E Androulaki, A De Caro, T Kramp, DW Kravitz, A Sorniotti, M Vukolic US Patent 10,230,756, 2019 | 67 | 2019 |
Network system and method for transferring cryptocurrencies between a user account and a receiving account E Androulaki, A Kind, I Koltsidas US Patent 11,295,302, 2022 | 48 | 2022 |
Reconciling end-to-end confidentiality and data reduction in cloud storage N Baracaldo, E Androulaki, J Glider, A Sorniotti Proceedings of the 6th Edition of the ACM Workshop on Cloud Computing …, 2014 | 47 | 2014 |
Endorsement in hyperledger fabric E Androulaki, A De Caro, M Neugschwandtner, A Sorniotti 2019 IEEE International Conference on Blockchain (Blockchain), 510-519, 2019 | 46 | 2019 |
Shared data encryption and confidentiality E Androulaki, N Baracaldo, JS Glider, A Sorniotti US Patent 9,397,832, 2016 | 43 | 2016 |
Hiding transaction amounts and balances in bitcoin E Androulaki, GO Karame Trust and Trustworthy Computing: 7th International Conference, TRUST 2014 …, 2014 | 43 | 2014 |
Two bitcoins at the price of one G Karame, E Androulaki, S Capkun Double-spending attacks on fast payments in bitcoin. IACR Cryptol. ePrint …, 2012 | 43 | 2012 |