Elli Androulaki
Elli Androulaki
IBM Research
Verified email at zurich.ibm.com
Cited by
Cited by
Hyperledger fabric: a distributed operating system for permissioned blockchains
E Androulaki, A Barger, V Bortnikov, C Cachin, K Christidis, A De Caro, ...
Proceedings of the thirteenth EuroSys conference, 1-15, 2018
Evaluating user privacy in bitcoin
E Androulaki, GO Karame, M Roeschlin, T Scherer, S Capkun
International Conference on Financial Cryptography and Data Security, 34-51, 2013
Double-spending fast payments in bitcoin
GO Karame, E Androulaki, S Capkun
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
A secure data deduplication scheme for cloud storage
J Stanek, A Sorniotti, E Androulaki, L Kencl
International conference on financial cryptography and data security, 99-118, 2014
Methods, media, and systems for detecting attack on a digital processing device
SJ Stolfo, W Li, AD Keromylis, E Androulaki
US Patent 8,789,172, 2014
Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin.
G Karame, E Androulaki, S Capkun
IACR Cryptol. ePrint Arch. 2012 (248), 2012
Misbehavior in bitcoin: A study of double-spending and accountability
GO Karame, E Androulaki, M Roeschlin, A Gervais, S Čapkun
ACM Transactions on Information and System Security (TISSEC) 18 (1), 1-32, 2015
Reputation systems for anonymous networks
E Androulaki, SG Choi, SM Bellovin, T Malkin
International Symposium on Privacy Enhancing Technologies Symposium, 202-218, 2008
A study of malcode-bearing documents
WJ Li, S Stolfo, A Stavrou, E Androulaki, AD Keromytis
International conference on detection of intrusions and malware, and …, 2007
Bitcoin and blockchain security
GO Karame, E Androulaki
Artech House, 2016
PAR: Payment for anonymous routing
E Androulaki, M Raykova, S Srivatsan, A Stavrou, SM Bellovin
International Symposium on Privacy Enhancing Technologies Symposium, 219-236, 2008
System, method, and computer program product for privacy-preserving transaction validation mechanisms for smart contracts that are included in a ledger
E Androulaki, A Decaro, T Kramp, A Sorniotti, M Vukolic
US Patent 9,992,028, 2018
Channels: Horizontal scaling and confidentiality on permissioned blockchains
E Androulaki, C Cachin, A De Caro, E Kokoris-Kogias
European Symposium on Research in Computer Security, 111-131, 2018
Biocompatible mesh for tissue repair
K Greenawalt, T Butler
US Patent App. 10/341,121, 2003
Hiding transaction amounts and balances in bitcoin
E Androulaki, GO Karame
International Conference on Trust and Trustworthy Computing, 161-178, 2014
Two bitcoins at the price of one
GO Karame, E Androulaki, S Capkun
Double-spending attacks on fast payments in bitcoin. IACR Cryptol. ePrint …, 2012
Cryptography and protocols in hyperledger fabric
E Androulaki, C Cachin, A De Caro, A Kind, M Osborne
Real-World Cryptography Conference, 12-14, 2017
Shared data encryption and confidentiality
E Androulaki, N Baracaldo, JS Glider, A Sorniotti
US Patent 9,397,832, 2016
Enforcing location and time-based access control on cloud-stored data
E Androulaki, C Soriente, L Malisa, S Capkun
2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014
Reconciling end-to-end confidentiality and data reduction in cloud storage
N Baracaldo, E Androulaki, J Glider, A Sorniotti
Proceedings of the 6th Edition of the ACM Workshop on Cloud Computing …, 2014
The system can't perform the operation now. Try again later.
Articles 1–20