Follow
Joshua Kroll
Title
Cited by
Cited by
Year
Sok: Research perspectives and challenges for bitcoin and cryptocurrencies
J Bonneau, A Miller, J Clark, A Narayanan, JA Kroll, EW Felten
2015 IEEE Symposium on Security and Privacy, 104-121, 2015
16432015
SoK: Research perspectives and challenges for Bitcoin and cryptocurrencies
J Bonneau, A Miller, J Clark, A Narayanan, JA Kroll, EW Felten
Security and Privacy (SP), 2015 IEEE Symposium on, 104-121, 2015
16432015
Accountable Algorithms
JA Kroll
Princeton University, 2015
13942015
The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries
JA Kroll, IC Davey, EW Felten
Proceedings of WEIS 2013, 2013
8312013
Mixcoin: Anonymity for Bitcoin with accountable mixes
J Bonneau, A Narayanan, A Miller, J Clark, JA Kroll
Financial Cryptography, 0
608*
Trust but verify: A guide to algorithms and the law
DR Desai, JA Kroll
Harv. JL & Tech. 31, 1, 2017
3252017
The fallacy of inscrutability
JA Kroll
Phil. Trans. R. Soc. A 376 (2133), 20180084, 2018
1402018
Securing Bitcoin wallets via threshold signatures
S Goldfeder, J Bonneau, EW Felten, JA Kroll, A Narayanan
Princeton University, http://www. cs. princeton. edu/∼ stevenag/bitcoin …, 2014
109*2014
Network Hygiene, Incentives, and Regulation: Deployment of Source Address Validation in the Internet
M Luckie, R Beverly, R Koga, K Keys, JA Kroll, k claffy
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
1082019
This Thing Called Fairness: Disciplinary Confusion Realizing a Value in Technology
DK Mulligan, JA Kroll, N Kohli, RY Wong
arXiv preprint arXiv:1909.11869, 2019
1082019
Securing Bitcoin wallets via threshold signatures
S Goldfeder, J Bonneau, EW Felten, JA Kroll, A Narayanan
105*2014
Accountable Algorithms’(2017)
JA Kroll, J Huey, S Barocas, EW Felten, JR Reidenberg, DG Robinson, ...
University of Pennsylvania Law Review 165, 633, 0
87
Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme
S Goldfeder, R Gennaro, H Kalodner, J Bonneau, JA Kroll, EW Felten, ...
et al., 2015
762015
Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme
S Goldfeder, R Gennaro, H Kalodner, J Bonneau, JA Kroll, EW Felten, ...
et al., 2015
762015
On decentralizing prediction markets and order books
J Clark, J Bonneau, EW Felten, JA Kroll, A Miller, A Narayanan
Workshop on the Economics of Information Security, State College …, 2014
522014
Outlining Traceability: A Principle for Operationalizing Accountability in Computing Systems
JA Kroll
Proceedings of the 2021 ACM Conference on Fairness, Accountability, and …, 2021
482021
Accountability in Computer Systems
JA Kroll
The Oxford Handbook of the Ethics of AI. Dubber, Markus D., Frank Pasquale …, 2020
402020
Data Science Data Governance [AI Ethics]
JA Kroll
IEEE Security & Privacy 16 (6), 61-70, 2018
392018
Portable Software Fault Isolation
JA Kroll, G Stewart, AW Appel
33*
Research perspectives on bitcoin and secondgeneration cryptocurrencies
J Bonneau, A Miller, J Clark, A Narayanan, JA Kroll, EW Felten
IEEE Symposium on Security and Privacy. IEEE, 2015
252015
The system can't perform the operation now. Try again later.
Articles 1–20