| Research perspectives and challenges for bitcoin and cryptocurrencies J Bonneau, A Miller, J Clark, A Narayanan, JA Kroll, EW Felten IEEE Symposium on Security and Privacy, 104-121, 2015 | 343* | 2015 |
| Scantegrity II: End-to-end verifiability for optical scan election systems using invisible ink confirmation codes D Chaum, R Carback, J Clark, A Essex, S Popoveniuc, RL Rivest, ... USENIX Electronic Voting Technology Workshop (EVT), 2008 | 250* | 2008 |
| Scantegrity: End-to-end voter-verifiable optical-scan voting D Chaum, A Essex, R Carback, J Clark, S Popoveniuc, A Sherman, ... IEEE Security & Privacy 6 (3), 40-46, 2008 | 183 | 2008 |
| SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements J Clark, PC van Oorschot IEEE Symposium on Security and Privacy, 2013 | 139 | 2013 |
| Mixcoin: Anonymity for Bitcoin with accountable mixes J Bonneau, A Narayanan, A Miller, J Clark, JA Kroll, EW Felten Financial Cryptography and Data Security, 486-504, 2014 | 128 | 2014 |
| Scantegrity II municipal election at Takoma Park: the first E2E binding governmental election with ballot privacy R Carback, D Chaum, J Clark, J Conway, A Essex, P Hernson, ... USENIX Security Symposium, 2010 | 113 | 2010 |
| CommitCoin: Carbon dating commitments with Bitcoin J Clark, A Essex Financial Cryptography and Data Security, 2012 | 77 | 2012 |
| Usability of anonymous web browsing: an examination of Tor interfaces and deployability J Clark, PC Van Oorschot, C Adams Symposium on Usable Privacy and Security (SOUPS), 41-51, 2007 | 65 | 2007 |
| Understanding and improving app installation security mechanisms through empirical analysis of Android D Barrera, J Clark, D McCarney, PC van Oorschot ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), 2012 | 64 | 2012 |
| Remotegrity: Design and use of an end-to-end verifiable remote voting system F Zagórski, RT Carback, D Chaum, J Clark, A Essex, PL Vora ACNS, 2013 | 51 | 2013 |
| A first look at the usability of bitcoin key management S Eskandari, J Clark, D Barrera, E Stobert NDSS Workshop on Usable Security (USEC), 2015 | 50 | 2015 |
| Selections: Internet voting with over-the-shoulder coercion-resistance J Clark, U Hengartner Financial Cryptography and Data Security, 2011 | 47 | 2011 |
| On Bitcoin as a public randomness source. J Bonneau, J Clark, S Goldfeder IACR Cryptology ePrint Archive 2015, 1015, 2015 | 42 | 2015 |
| On the use of financial data as a random beacon J Clark, U Hengartner USENIX EVT/WOTE, 2010 | 41 | 2010 |
| Punchscan in practice: an E2E election case study A Essex, J Clark, R Carback, S Popoveniuc Workshop on Trustworthy Elections (WOTE), 2007 | 41 | 2007 |
| Tapas: Design, implementation, and usability evaluation of a password manager D McCarney, D Barrera, J Clark, S Chiasson, PC van Oorschot ACSAC, 2012 | 39 | 2012 |
| Panic passwords: authenticating under duress J Clark, U Hengartner USENIX Hot Topics in Security (HotSec), 2008 | 32 | 2008 |
| Scantegrity mock election at Takoma Park AT Sherman, R Carback, D Chaum, J Clark, A Essex, PS Herrnson, ... Electronic Voting 2010 (EVOTE2010), 2010 | 26 | 2010 |
| Eperio: Mitigating technical complexity in cryptographic election verification A Essex, J Clark, U Hengartner, C Adams USENIX EVT/WOTE 13, 2010 | 23 | 2010 |
| On the security of ballot receipts in E2E voting systems J Clark, A Essex, C Adams Workshop on Trustworthy Elections (WOTE), 2007 | 21 | 2007 |