Search Results for author: George Kappos

Found 3 papers, 2 papers with code

An Empirical Analysis of Privacy in the Lightning Network

no code implementations27 Mar 2020 George Kappos, Haaroon Yousaf, Ania Piotrowska, Sanket Kanjalkar, Sergi Delgado-Segura, Andrew Miller, Sarah Meiklejohn

Payment channel networks, and the Lightning Network in particular, seem to offer a solution to the lack of scalability and privacy offered by Bitcoin and other blockchain-based cryptocurrencies.

Cryptography and Security

Tracing Transactions Across Cryptocurrency Ledgers

1 code implementation30 Oct 2018 Haaroon Yousaf, George Kappos, Sarah Meiklejohn

One of the defining features of a cryptocurrency is that its ledger, containing all transactions that have evertaken place, is globally visible.

Cryptography and Security

An Empirical Analysis of Anonymity in Zcash

3 code implementations8 May 2018 George Kappos, Haaroon Yousaf, Mary Maller, Sarah Meiklejohn

Among the now numerous alternative cryptocurrencies derived from Bitcoin, Zcash is often touted as the one with the strongest anonymity guarantees, due to its basis in well-regarded cryptographic research.

Cryptography and Security

Cannot find the paper you are looking for? You can Submit a new open access paper.