Ben Kaiser
Ben Kaiser
PhD student, Department of Computer Science, Princeton University
Verified email at - Homepage
Cited by
Cited by
The Looming Threat of China: An Analysis of Chinese Influence on Bitcoin
B Kaiser, M Jurado, A Ledger, 2018
Blockchain Technology: What Is It Good for? Industry's dreams and fears for this new technology
S Ruoti, B Kaiser, A Yerukhimovich, J Clark, R Cunningham
Queue 17 (5), 60-88, 2019
Computing on masked data to improve the security of big data
V Gadepally, B Hancock, B Kaiser, J Kepner, P Michaleas, M Varia, ...
2015 IEEE International Symposium on Technologies for Homeland Security (HST …, 2015
An Empirical Study of Wireless Carrier Authentication for {SIM} Swaps
K Lee, B Kaiser, J Mayer, A Narayanan
Sixteenth Symposium on Usable Privacy and Security ({SOUPS} 2020), 61-79, 2020
Identifying disinformation websites using infrastructure features
A Hounsel, J Holland, B Kaiser, K Borgolte, N Feamster, J Mayer
10th {USENIX} Workshop on Free and Open Communications on the Internet …, 2020
Adapting Security Warnings to Counter Online Disinformation
B Kaiser, J Wei, E Lucherini, K Lee, JN Matias, J Mayer
30th {USENIX} Security Symposium ({USENIX} Security 21), 2021
Environmental authentication in malware
J Blackthorne, B Kaiser, B Fuller, B Yener
International Conference on Cryptology and Information Security in Latin …, 2017
A formal framework for environmentally sensitive malware
J Blackthorne, B Kaiser, B Yener
International Symposium on Research in Attacks, Intrusions, and Defenses …, 2016
A context-sensitive security type system for Java
B Kaiser
Rensselaer Polytechnic Institute, 2015
The system can't perform the operation now. Try again later.
Articles 1–9