2013 - Member of the National Academy of Engineering For contributions to security of computer systems, and for impact on public policy.
2011 - Fellow of the American Academy of Arts and Sciences
2007 - ACM Fellow For contributions to security and the public policy of information technology.
1997 - Fellow of Alfred P. Sloan Foundation
Edward W. Felten mainly focuses on Computer security, World Wide Web, Cryptography, Internet privacy and Operating system. His Computer security research is multidisciplinary, relying on both Scheme and Motherboard. His work on The Internet as part of general World Wide Web study is frequently connected to Business process reengineering and Timing attack, therefore bridging the gap between diverse disciplines of science and establishing a new relationship between them.
His research investigates the connection between Cryptography and topics such as Key that intersect with issues in Electronic money and Random access memory. His Internet privacy study combines topics in areas such as Cryptocurrency, Password management, Anonymity and Digital currency. His work is dedicated to discovering how Encryption, Dram are connected with Embedded system and other disciplines.
Edward W. Felten mostly deals with Computer security, Internet privacy, Operating system, World Wide Web and Software. His Computer security study typically links adjacent topics like Audit. His biological study spans a wide range of topics, including Transparency and Access control.
The Network interface, Real time Java, Java and Latency research he does as part of his general Operating system study is frequently linked to other disciplines of science, such as Shrimp, therefore creating a link between diverse domains of science. His Web page, Web navigation, The Internet and Web application security study in the realm of World Wide Web interacts with subjects such as Value sensitive design. His work in Anonymity addresses issues such as Cryptocurrency, which are connected to fields such as Protocol.
His scientific interests lie mostly in Computer security, Internet privacy, Cryptocurrency, Anonymity and Artificial intelligence. While the research belongs to areas of Computer security, Edward W. Felten spends his time largely on the problem of Upload, intersecting his research to questions surrounding Consistency. His Internet privacy research incorporates elements of Biometrics, Password, Mobile device and Audit.
In his study, Scheme, Payment and Exploit is strongly linked to Protocol, which falls under the umbrella field of Cryptocurrency. His research in Anonymity intersects with topics in Emerging technologies, The Internet, Need to know and Digital currency. In the subject of general Key, his work in Key management is often linked to Mediation, thereby combining diverse domains of study.
His main research concerns Internet privacy, Computer security, Cryptocurrency, Anonymity and De-identification. Edward W. Felten has included themes like Web server, End user, Encryption, Communications system and Transparency in his Internet privacy study. In his study, Edward W. Felten carries out multidisciplinary Computer security and BitTorrent tracker research.
His Cryptocurrency study combines topics from a wide range of disciplines, such as Scheme, Payment and Protocol. His Anonymity research is multidisciplinary, incorporating elements of Key management, Key, Cryptography and Electronic money. His work carried out in the field of De-identification brings together such families of science as No Silver Bullet and Law and economics.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction
Arvind Narayanan;Joseph Bonneau;Edward Felten;Andrew Miller.
(2016)
Lest we remember: cold-boot attacks on encryption keys
J. Alex Halderman;Seth D. Schoen;Nadia Heninger;William Clarkson.
Communications of The ACM (2009)
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies
Joseph Bonneau;Joseph Bonneau;Joseph Bonneau;Andrew Miller;Jeremy Clark;Arvind Narayanan.
ieee symposium on security and privacy (2015)
The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries
Joshua A. Kroll;Ian C. Davey;Edward W. Felten.
(2013)
Lest we remember: cold boot attacks on encryption keys
J. Alex Halderman;Seth D. Schoen;Nadia Heninger;William Clarkson.
usenix security symposium (2008)
A study of integrated prefetching and caching strategies
Pei Cao;Edward W. Felten;Anna R. Karlin;Kai Li.
measurement and modeling of computer systems (1995)
Large-step Markov chains for the Traveling Salesman Problem
Olivier C. Martin;Steve W. Otto;Edward W. Felten.
Complex Systems (1991)
Password management strategies for online accounts
Shirley Gaw;Edward W. Felten.
symposium on usable privacy and security (2006)
Java security: from HotJava to Netscape and beyond
D. Dean;E.W. Felten;D.S. Wallach.
ieee symposium on security and privacy (1996)
Mixcoin: Anonymity for Bitcoin with accountable mixes.
Joseph Bonneau;Arvind Narayanan;Andrew Miller;Jeremy Clark.
IACR Cryptology ePrint Archive (2014)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Princeton University
University of Michigan–Ann Arbor
Princeton University
New York University
Rice University
University of Illinois at Urbana-Champaign
Synopsys (United States)
University of Washington
Princeton University
The University of Texas at Austin
University of Piraeus
Iowa State University
C. V. Raman Global University
Vassar College
École Normale Supérieure Paris-Saclay
University of Kentucky
Chinese Academy of Sciences
University of Delaware
Leibniz Association
University of Tokyo
Universidade Federal de Viçosa
Heinrich-Pette-Institute
Imperial College London
Federal University of Bahia
University of California, Irvine
University of Nantes