Jeremy Clark
According to our database1,
Jeremy Clark
authored at least 72 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Int. J. Inf. Sec., February, 2024
Proceedings of the 6th Conference on Advances in Financial Technologies, 2024
2023
Commun. ACM, March, 2023
Proceedings of the 5th Conference on Advances in Financial Technologies, 2023
2022
Mapping the Privacy Landscape for Central Bank Digital Currencies: Now is the time to shape what future payment flows will reveal about you.
ACM Queue, 2022
IACR Cryptol. ePrint Arch., 2022
Opening Sentences in Academic Writing: How Security Researchers Defeat the Blinking Cursor.
Proceedings of the SIGCSE 2022: The 53rd ACM Technical Symposium on Computer Science Education, 2022
Proceedings of the Financial Cryptography and Data Security. FC 2022 International Workshops, 2022
Proceedings of the Financial Cryptography and Data Security. FC 2022 International Workshops, 2022
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2022
2021
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the AFT '21: 3rd ACM Conference on Advances in Financial Technologies, Arlington, Virginia, USA, September 26, 2021
2020
Knowl. Inf. Syst., 2020
2019
Proceedings of the Financial Cryptography and Data Security, 2019
Proceedings of the Financial Cryptography and Data Security, 2019
Proceedings of the Financial Cryptography and Data Security, 2019
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019
Proceedings of the 6th ACM Conference on Information-Centric Networking, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Financial Cryptography and Data Security, 2018
Proceedings of the Financial Cryptography and Data Security, 2018
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the Financial Cryptography and Data Security, 2017
2016
Buy Your Coffee with Bitcoin: Real-World Deployment of a Bitcoin Point of Sale Terminal.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
2013
IACR Cryptol. ePrint Arch., 2013
SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the 2012 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections, 2012
Proceedings of the Financial Cryptography and Data Security, 2012
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2012
Understanding and improving app installation security mechanisms through empirical analysis of android.
Proceedings of the SPSM'12, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
IACR Cryptol. ePrint Arch., 2011
2010
Corrections to scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.
IEEE Trans. Inf. Forensics Secur., 2010
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010
Scantegrity II Municipal Election at Takoma Park: The First E2E Binding Governmental Election with Ballot Privacy.
Proceedings of the 19th USENIX Security Symposium, 2010
Proceedings of the Electronic Voting 2010, 2010
2009
Scantegrity II: end-to-end verifiability by voters of optical scan elections through confirmation codes.
IEEE Trans. Inf. Forensics Secur., 2009
Not-So Hidden Information: Optimal Contracts for Undue Influence in E2E Voting Systems.
Proceedings of the E-Voting and Identity, Second International Conference, 2009
2008
IEEE Secur. Priv., 2008
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008
Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008
2007
Usability of anonymous web browsing: an examination of Tor interfaces and deployability.
Proceedings of the 3rd Symposium on Usable Privacy and Security, 2007
2005