Jeremy Clark

According to our database1, Jeremy Clark authored at least 72 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Pepal: Penalizing multimedia breaches and partial leakages.
Int. J. Inf. Sec., February, 2024

Votexx: Extreme Coercion Resistance.
IACR Cryptol. ePrint Arch., 2024

A Shortfall in Investor Expectations of Leveraged Tokens.
Proceedings of the 6th Conference on Advances in Financial Technologies, 2024

2023
Mapping the Privacy Landscape for Central Bank Digital Currencies.
Commun. ACM, March, 2023

Fast and Furious Withdrawals from Optimistic Rollups.
Proceedings of the 5th Conference on Advances in Financial Technologies, 2023

2022
Mapping the Privacy Landscape for Central Bank Digital Currencies: Now is the time to shape what future payment flows will reveal about you.
ACM Queue, 2022

VoteXX: A Solution to Improper Influence in Voter-Verifiable Elections.
IACR Cryptol. ePrint Arch., 2022

Short-lived zero-knowledge proofs and signatures.
IACR Cryptol. ePrint Arch., 2022

Opening Sentences in Academic Writing: How Security Researchers Defeat the Blinking Cursor.
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022

Not so Immutable: Upgradeability of Smart Contracts on Ethereum.
Proceedings of the Financial Cryptography and Data Security. FC 2022 International Workshops, 2022

Lissy: Experimenting with On-Chain Order Books.
Proceedings of the Financial Cryptography and Data Security. FC 2022 International Workshops, 2022

Privacy-Preserving Link Prediction.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022

2021
Systemizing the Challenges of Auditing Blockchain-Based Assets.
J. Inf. Syst., 2021

TokenHook: Secure ERC-20 smart contract.
CoRR, 2021

Trading on-chain: how feasible is regulators' worst-case scenario?
CoRR, 2021

Red-Black Coins: Dai Without Liquidations.
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021

Short Paper: Ballot Secrecy for Liquid Democracy.
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021

Absentia: Secure Multiparty Computation on Ethereum.
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021

SoK: Securing Email - A Stakeholder-Based Analysis.
Proceedings of the Financial Cryptography and Data Security, 2021

SoK: oracles from the ground truth to market manipulation.
Proceedings of the AFT '21: 3rd ACM Conference on Advances in Financial Technologies, Arlington, Virginia, USA, September 26, 2021

2020
Demystifying Stablecoins.
ACM Queue, 2020

sf SecDM: privacy-preserving data outsourcing framework with differential privacy.
Knowl. Inf. Syst., 2020

2019
Blockchain Technology: What Is It Good for?
ACM Queue, 2019

SoK: Blockchain Technology and Its Potential Use Cases.
CoRR, 2019

One-Time Programs Made Practical.
Proceedings of the Financial Cryptography and Data Security, 2019

SoK: Transparent Dishonesty: Front-Running Attacks on Blockchain.
Proceedings of the Financial Cryptography and Data Security, 2019

Short Paper: Deploying PayWord on Ethereum.
Proceedings of the Financial Cryptography and Data Security, 2019

Resolving the Multiple Withdrawal Attack on ERC20 Tokens.
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

Towards Automatically Penalizing Multimedia Breaches (Extended Abstract).
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019

Decentralized and Secure Multimedia Sharing Application over Named Data Networking.
Proceedings of the 6th ACM Conference on Information-Centric Networking, 2019

2018
Automated Penalization of Data Breaches using Crypto-augmented Smart Contracts.
IACR Cryptol. ePrint Arch., 2018

Securing Email.
CoRR, 2018

A first look at the usability of bitcoin key management.
CoRR, 2018

Toward Cryptocurrency Lending.
Proceedings of the Financial Cryptography and Data Security, 2018

Ghazal: Toward Truly Authoritative Web Certificates Using Ethereum.
Proceedings of the Financial Cryptography and Data Security, 2018

A First Look at Browser-Based Cryptojacking.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018

A Discussion on Security Education in Academia.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Bitcoin's Academic Pedigree.
ACM Queue, 2017

Practical Governmental Voting with Unconditional Integrity and Privacy.
Proceedings of the Financial Cryptography and Data Security, 2017

On the Feasibility of Decentralized Derivatives Markets.
Proceedings of the Financial Cryptography and Data Security, 2017

2016
Buy Your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

2015
Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges.
IACR Cryptol. ePrint Arch., 2015

Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2015

On Bitcoin as a public randomness source.
IACR Cryptol. ePrint Arch., 2015

SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

2014
Mixcoin: Anonymity for Bitcoin with accountable mixes.
IACR Cryptol. ePrint Arch., 2014

Baton: certificate agility for android's decentralized signing infrastructure.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

BackRef: Accountability in Anonymous Communication Networks.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Remotegrity: Design and Use of an End-to-End Verifiable Remote Voting System.
IACR Cryptol. ePrint Arch., 2013

Introducing Accountability to Anonymity Networks.
CoRR, 2013

SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

2012
Eperio: Mitigating Technical Complexity in Cryptographic Election Verification.
IACR Cryptol. ePrint Arch., 2012

Cobra: Toward Concurrent Ballot Authorization for Internet Voting.
Proceedings of the 2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2012

CommitCoin: Carbon Dating Commitments with Bitcoin - (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2012

A print magazine on any screen: the wired app story.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012

Understanding and improving app installation security mechanisms through empirical analysis of android.
Proceedings of the SPSM'12, 2012

Tapas: design, implementation, and usability evaluation of a password manager.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Selections: Internet Voting with Over-the-Shoulder Coercion-Resistance.
IACR Cryptol. ePrint Arch., 2011

CommitCoin: Carbon Dating Commitments with Bitcoin.
IACR Cryptol. ePrint Arch., 2011

2010
Corrections to scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.
IEEE Trans. Inf. Forensics Secur., 2010

On the Use of Financial Data as a Random Beacon.
IACR Cryptol. ePrint Arch., 2010

Securing Optical-Scan Voting.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010

Aperio: High Integrity Elections for Developing Countries.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010

Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy.
Proceedings of the 19th USENIX Security Symposium, 2010


2009
Scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.
IEEE Trans. Inf. Forensics Secur., 2009

Not-So Hidden Information: Optimal Contracts for Undue Influence in E2E Voting Systems.
Proceedings of the E-Voting and Identity, Second International Conference, 2009

2008
Scantegrity: End-to-End Voter-Verifiable Optical-Scan Voting.
IEEE Secur. Priv., 2008

Panic Passwords: Authenticating under Duress.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008

Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

2007
Usability of anonymous web browsing: an examination of Tor interfaces and deployability.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007

2005
Constructive Analysis of Iterated Rational Functions.
J. Univers. Comput. Sci., 2005


  Loading...