Arvind Narayanan
Arvind Narayanan
Verified email at - Homepage
Cited by
Cited by
Robust de-anonymization of large sparse datasets
A Narayanan, V Shmatikov
Security and Privacy, 2008. SP 2008. IEEE Symposium on, 111-125, 2008
Semantics derived automatically from language corpora contain human-like biases
A Caliskan, JJ Bryson, A Narayanan
Science 356 (6334), 183-186, 2017
Bitcoin and cryptocurrency technologies: A comprehensive introduction
A Narayanan, J Bonneau, E Felten, A Miller, S Goldfeder
Princeton University Press, 2016
Fairness and Machine Learning: Limitations and Opportunities
S Barocas, M Hardt, A Narayanan
MIT Press., 2023
De-anonymizing social networks
A Narayanan, V Shmatikov
IEEE Symposium on Security and Privacy 2009, 2009
Research perspectives and challenges for Bitcoin and cryptocurrencies
J Bonneau, A Miller, J Clark, A Narayanan, JA Kroll, EW Felten
Security and Privacy (SP), 2015 IEEE Symposium on, 104-121, 2015
The Web never forgets: Persistent tracking mechanisms in the wild
G Acar, C Eubank, S Englehardt, M Juarez, A Narayanan, C Diaz
ACM SIGSAC Conference on Computer and Communications Security, 674-689, 2014
Online tracking: A 1-million-site measurement and analysis
S Englehardt, A Narayanan
ACM Conference on Computer and Communications Security, 2016
Mixcoin: Anonymity for bitcoin with accountable mixes
J Bonneau, A Narayanan, A Miller, J Clark, JA Kroll, EW Felten
Financial Cryptography and Data Security: 18th International Conference, FC …, 2014
Fast dictionary attacks on passwords using time-space tradeoff
A Narayanan, V Shmatikov
Proceedings of the 12th ACM conference on Computer and communications …, 2005
Dark patterns at scale: Findings from a crawl of 11K shopping websites
A Mathur, G Acar, MJ Friedman, E Lucherini, J Mayer, M Chetty, ...
Proceedings of the ACM on human-computer interaction 3 (CSCW), 1-32, 2019
Myths and fallacies of personally identifiable information
A Narayanan, V Shmatikov
Communications of the ACM 53 (6), 24-26, 2010
Routes for breaching and protecting genetic privacy
Y Erlich, A Narayanan
Nature Reviews Genetics 15 (6), 409-421, 2014
Adnostic: Privacy preserving targeted advertising
V Toubiana, A Narayanan, D Boneh, H Nissenbaum, S Barocas
17th Network and Distributed System Security Symposium, 2010
Location Privacy via Private Proximity Testing
A Narayanan, N Thiagarajan, M Lakhani, M Hamburg, D Boneh
18th Network and Distributed System Security Symposium, 2011
On the instability of Bitcoin without the block reward
M Carlsten, H Kalodner, SM Weinberg, A Narayanan
ACM Conference on Computer and Communications Security, 2016
Keeping the Smart Home Private with Smart (er) IoT Traffic Shaping
N Apthorpe, DY Huang, D Reisman, A Narayanan, N Feamster
Proceedings on Privacy Enhancing Technologies 2019, 2019
Bitcoin's academic pedigree
A Narayanan, J Clark
Communications of the ACM 60 (12), 36-45, 2017
“You Might Also Like:” Privacy Risks of Collaborative Filtering
JA Calandrino, A Kilzer, A Narayanan, EW Felten, V Shmatikov
Security and Privacy (SP), 2011 IEEE Symposium on, 231-246, 2011
Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security
R Gennaro, S Goldfeder, A Narayanan
Applied Cryptography and Network Security, 13, 2016
The system can't perform the operation now. Try again later.
Articles 1–20