Остановите войну!
for scientists:
default search action
Ghassan Karame
- > Home > Persons > Ghassan Karame
Publications
- 2021
- [c48]Karl Wüst, Loris Diana, Kari Kostiainen, Ghassan Karame, Sinisa Matetic, Srdjan Capkun:
Bitcontracts: Supporting Smart Contracts in Legacy Blockchains. NDSS 2021 - 2019
- [j13]Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun:
Securing Cloud Data Under Key Exposure. IEEE Trans. Cloud Comput. 7(3): 838-849 (2019) - [c41]Sinisa Matetic, Karl Wüst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, Srdjan Capkun:
BITE: Bitcoin Lightweight Client Privacy using Trusted Execution. USENIX Security Symposium 2019: 783-800 - [i23]Karl Wüst, Loris Diana, Kari Kostiainen, Ghassan Karame, Sinisa Matetic, Srdjan Capkun:
Bitcontracts: Adding Expressive Smart Contracts to Legacy Cryptocurrencies. IACR Cryptol. ePrint Arch. 2019: 857 (2019) - 2018
- [j10]Ghassan Karame, Srdjan Capkun:
Blockchain Security and Privacy. IEEE Secur. Priv. 16(4): 11-12 (2018) - [j9]Hubert Ritzdorf, Claudio Soriente, Ghassan O. Karame, Srdjan Marinovic, Damian Gruber, Srdjan Capkun:
Toward Shared Ownership in the Cloud. IEEE Trans. Inf. Forensics Secur. 13(12): 3019-3034 (2018) - [i19]Sinisa Matetic, Karl Wüst, Moritz Schneider, Kari Kostiainen, Ghassan Karame, Srdjan Capkun:
BITE: Bitcoin Lightweight Client Privacy using Trusted Execution. IACR Cryptol. ePrint Arch. 2018: 803 (2018) - 2017
- [i17]Hubert Ritzdorf, Claudio Soriente, Ghassan O. Karame, Srdjan Marinovic, Damian Gruber, Srdjan Capkun:
Towards Shared Ownership in the Cloud. IACR Cryptol. ePrint Arch. 2017: 227 (2017) - 2016
- [c36]Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, Srdjan Capkun:
On the Security and Performance of Proof of Work Blockchains. CCS 2016: 3-16 - [c35]Hubert Ritzdorf, Ghassan Karame, Claudio Soriente, Srdjan Capkun:
On Information Leakage in Deduplicated Storage Systems. CCSW 2016: 61-72 - [i12]Arthur Gervais, Ghassan O. Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, Srdjan Capkun:
On the Security and Performance of Proof of Work Blockchains. IACR Cryptol. ePrint Arch. 2016: 555 (2016) - 2015
- [j6]Ghassan O. Karame, Elli Androulaki, Marc Roeschlin, Arthur Gervais, Srdjan Capkun:
Misbehavior in Bitcoin: A Study of Double-Spending and Accountability. ACM Trans. Inf. Syst. Secur. 18(1): 2:1-2:32 (2015) - [c31]Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun:
Tampering with the Delivery of Blocks and Transactions in Bitcoin. CCS 2015: 692-705 - [c26]Claudio Soriente, Ghassan O. Karame, Hubert Ritzdorf, Srdjan Marinovic, Srdjan Capkun:
Commune: Shared Ownership in an Agnostic Cloud. SACMAT 2015: 39-50 - [i9]Arthur Gervais, Hubert Ritzdorf, Ghassan O. Karame, Srdjan Capkun:
Tampering with the Delivery of Blocks and Transactions in Bitcoin. IACR Cryptol. ePrint Arch. 2015: 578 (2015) - 2014
- [j5]Arthur Gervais, Ghassan O. Karame, Vedran Capkun, Srdjan Capkun:
Is Bitcoin a Decentralized Currency? IEEE Secur. Priv. 12(3): 54-60 (2014) - [j4]Ghassan Karame, Aurélien Francillon, Victor Budilivschi, Srdjan Capkun, Vedran Capkun:
Microcomputations as Micropayments in Web-based Services. ACM Trans. Internet Techn. 13(3): 8:1-8:23 (2014) - [c23]Arthur Gervais, Srdjan Capkun, Ghassan O. Karame, Damian Gruber:
On the privacy provisions of Bloom filters in lightweight bitcoin clients. ACSAC 2014: 326-335 - [i7]Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun:
Securing Cloud Data in the New Attacker Model. IACR Cryptol. ePrint Arch. 2014: 556 (2014) - [i6]Arthur Gervais, Ghassan O. Karame, Damian Gruber, Srdjan Capkun:
On the Privacy Provisions of Bloom Filters in Lightweight Bitcoin Clients. IACR Cryptol. ePrint Arch. 2014: 763 (2014) - 2013
- [j3]Ghassan Karame, Boris Danev, Cyrill Bannwart, Srdjan Capkun:
On the Security of End-to-End Measurements Based on Packet-Pair Dispersions. IEEE Trans. Inf. Forensics Secur. 8(1): 149-162 (2013) - [c16]Elli Androulaki, Ghassan Karame, Marc Roeschlin, Tobias Scherer, Srdjan Capkun:
Evaluating User Privacy in Bitcoin. Financial Cryptography 2013: 34-51 - [i5]Claudio Soriente, Ghassan Karame, Hubert Ritzdorf, Srdjan Marinovic, Srdjan Capkun:
Commune: Shared Ownership in an Agnostic Cloud. CoRR abs/1311.6236 (2013) - [i4]Arthur Gervais, Ghassan Karame, Srdjan Capkun, Vedran Capkun:
Is Bitcoin a Decentralized Currency? IACR Cryptol. ePrint Arch. 2013: 829 (2013) - 2012
- [c13]Ghassan Karame, Elli Androulaki, Srdjan Capkun:
Double-spending fast payments in bitcoin. CCS 2012: 906-917 - [i2]Ghassan Karame, Elli Androulaki, Srdjan Capkun:
Two Bitcoins at the Price of One? Double-Spending Attacks on Fast Payments in Bitcoin. IACR Cryptol. ePrint Arch. 2012: 248 (2012) - [i1]Elli Androulaki, Ghassan Karame, Marc Roeschlin, Tobias Scherer, Srdjan Capkun:
Evaluating User Privacy in Bitcoin. IACR Cryptol. ePrint Arch. 2012: 596 (2012) - 2011
- [c12]Boris Danev, Ramya Jayaram Masti, Ghassan Karame, Srdjan Capkun:
Enabling secure VM-vTPM migration in private clouds. ACSAC 2011: 187-196 - [c11]Ghassan Karame, Srdjan Capkun, Ueli Maurer:
Privacy-preserving outsourcing of brute-force key searches. CCSW 2011: 101-112 - [c10]Ghassan Karame, Aurélien Francillon, Srdjan Capkun:
Pay as you browse: microcomputations as micropayments in web-based services. WWW 2011: 307-316 - 2010
- [j2]Srdjan Capkun, Mario Cagalj, Ghassan Karame, Nils Ole Tippenhauer:
Integrity Regions: Authentication through Presence in Wireless Networks. IEEE Trans. Mob. Comput. 9(11): 1608-1621 (2010) - [c9]Ghassan Karame, Srdjan Capkun:
Low-Cost Client Puzzles Based on Modular Exponentiation. ESORICS 2010: 679-697 - 2009
- [c8]Ghassan Karame, Mario Strasser, Srdjan Capkun:
Secure Remote Execution of Sequential Computations. ICICS 2009: 181-197 - [c7]Ghassan Karame, Mario Cagalj, Srdjan Capkun:
Small Coalitions: Lightweight Collaboration for Efficient P2P Downloads. NCA 2009: 278-283 - [c6]Ghassan Karame, David Gubler, Srdjan Capkun:
On the Security of Bottleneck Bandwidth Estimation Techniques. SecureComm 2009: 121-141
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-03 20:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint