![]() | 2010 | |
---|---|---|
64 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels: Future tense. Commun. CACM 53(3): 120- (2010) |
2009 | ||
63 | ![]() ![]() ![]() ![]() ![]() ![]() | Kevin D. Bowers, Ari Juels, Alina Oprea: HAIL: a high-availability and integrity layer for cloud storage. ACM Conference on Computer and Communications Security 2009: 187-198 |
62 | ![]() ![]() ![]() ![]() ![]() ![]() | Karl Koscher, Ari Juels, Vjekoslav Brajkovic, Tadayoshi Kohno: EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond. ACM Conference on Computer and Communications Security 2009: 33-42 |
2008 | ||
61 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels, Ravikanth Pappu, Bryan Parno: Unidirectional Key Distribution Across Time and Space with Applications to RFID Security. USENIX Security Symposium 2008: 75-90 |
60 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels: RFID security: in the shoulder and on the loading dock. WISEC 2008: 1 |
59 | ![]() ![]() ![]() ![]() ![]() ![]() | Gene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, Melanie R. Rieback: RFID security and privacy: long-term research or short-term tinkering? WISEC 2008: 160 |
2007 | ||
58 | ![]() ![]() ![]() ![]() ![]() ![]() | Daniel V. Bailey, Dan Boneh, Eu-Jin Goh, Ari Juels: Covert channels in privacy-preserving identification systems. ACM Conference on Computer and Communications Security 2007: 297-306 |
57 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels, Burton S. Kaliski Jr.: Pors: proofs of retrievability for large files. ACM Conference on Computer and Communications Security 2007: 584-597 |
56 | ![]() ![]() ![]() ![]() ![]() ![]() | Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, Moti Yung: Two-Party Computing with Encrypted Data. ASIACRYPT 2007: 298-314 |
55 | ![]() ![]() ![]() ![]() ![]() ![]() | Thomas S. Heydt-Benjamin, Daniel V. Bailey, Kevin Fu, Ari Juels, Tom O'Hare: Vulnerabilities in First-Generation RFID-enabled Credit Cards. Financial Cryptography 2007: 2-14 |
54 | ![]() ![]() ![]() ![]() ![]() ![]() | Benessa Defend, Kevin Fu, Ari Juels: Cryptanalysis of Two Lightweight RFID Authentication Schemes. PerCom Workshops 2007: 211-216 |
53 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels, Stephen A. Weis: Defining Strong Privacy for RFID. PerCom Workshops 2007: 342-347 |
2006 | ||
52 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels, Rebecca N. Wright, Sabrina De Capitani di Vimercati: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30 - November 3, 2006 ACM 2006 |
51 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels, Gene Tsudik, Shouhuai Xu, Moti Yung: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006 ACM 2006 |
50 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels, Marianne Winslett: Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, WPES 2006, Alexandria, VA, USA, October 30, 2006 ACM 2006 |
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Radha Poovendran, Ari Juels: Proceedings of the 2006 ACM Workshop on Wireless Security, Los Angeles, California, USA, September 29, 2006 ACM 2006 |
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels, Marianne Winslett, Atsuhiro Goto: Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria, VA, USA, November 3, 2006 ACM 2006 |
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels, Ernesto Damiani, Alban Gabillon: Proceedings of the 3rd ACM Workshop On Secure Web Services, SWS 2006, Alexandria, VA, USA, November 3, 2006 ACM 2006 |
46 | ![]() ![]() ![]() ![]() ![]() ![]() | John G. Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung: Fourth-factor authentication: somebody you know. ACM Conference on Computer and Communications Security 2006: 168-178 |
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels: The Outer Limits of RFID Security. CHES 2006: 231 |
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels, Markus Jakobsson, Tom N. Jagatic: Cache Cookies for Browser Authentication (Extended Abstract). IEEE Symposium on Security and Privacy 2006: 301-305 |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Daniel V. Bailey, Ari Juels: Shoehorning Security into the EPC Tag Standard. SCN 2006: 303-320 |
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels, Madhu Sudan: A Fuzzy Vault Scheme. Des. Codes Cryptography 38(2): 237-257 (2006) |
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels: RFID security and privacy: a research survey. IEEE Journal on Selected Areas in Communications 24(2): 381-394 (2006) |
2005 | ||
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Vijay Atluri, Catherine Meadows, Ari Juels: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005 ACM 2005 |
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels, Stephen A. Weis: Authenticating Pervasive Devices with Human Protocols. CRYPTO 2005: 293-308 |
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels, Paul F. Syverson, Daniel V. Bailey: High-Power Proxies for Enhancing RFID Privacy and Utility. Privacy Enhancing Technologies 2005: 210-226 |
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels, Dario Catalano, Markus Jakobsson: Coercion-resistant electronic elections. WPES 2005: 61-70 |
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels: Strengthening EPC tags against cloning. Workshop on Wireless Security 2005: 67-76 |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Simson L. Garfinkel, Ari Juels, Ravikanth Pappu: RFID Privacy: An Overview of Problems and Proposed Solutions. IEEE Security & Privacy 3(3): 34-43 (2005) |
2004 | ||
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels: Financial Cryptography, 8th International Conference, FC 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers Springer 2004 |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Philippe Golle, Ari Juels: Parallel mixing. ACM Conference on Computer and Communications Security 2004: 220-226 |
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Brent Waters, Ari Juels, J. Alex Halderman, Edward W. Felten: New client puzzle outsourcing techniques for DoS resistance. ACM Conference on Computer and Communications Security 2004: 246-256 |
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Philippe Golle, Markus Jakobsson, Ari Juels, Paul F. Syverson: Universal Re-encryption for Mixnets. CT-RSA 2004: 163-178 |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Philippe Golle, Ari Juels: Dining Cryptographers Revisited. EUROCRYPT 2004: 456-473 |
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels: "Yoking-Proofs" for RFID Tags. PerCom Workshops 2004: 138-143 |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels: Minimalist Cryptography for Low-Cost RFID Tags. SCN 2004: 149-164 |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels: RFID: Security and Privacy for Five-Cent Computers. USENIX Security Symposium 2004 |
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels, John G. Brainard: Soft blocking: flexible blocker tags on the cheap. WPES 2004: 1-7 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels: RFID: security and privacy for five-cent wireless devices. Workshop on Wireless Security 2004: 31 |
2003 | ||
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels, Ronald L. Rivest, Michael Szydlo: The blocker tag: selective blocking of RFID tags for consumer privacy. ACM Conference on Computer and Communications Security 2003: 103-111 |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels, Ravikanth Pappu: Squealing Euros: Privacy Protection in RFID-Enabled Banknotes. Financial Cryptography 2003: 103-121 |
2002 | ||
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Philippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, Ari Juels: Optimistic Mixing for Exit-Polls. ASIACRYPT 2002: 451-465 |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Markus Jakobsson, Ari Juels, Phong Q. Nguyen: Proprietary Certificates. CT-RSA 2002: 164-181 |
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels, Michael Szydlo: A Two-Server, Sealed-Bid Auction Protocol. Financial Cryptography 2002: 72-86 |
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels, Jorge Guajardo: RSA Key Generation with Verifiable Randomness. Public Key Cryptography 2002: 357-374 |
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Markus Jakobsson, Ari Juels, Ronald L. Rivest: Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking. USENIX Security Symposium 2002: 339-353 |
2001 | ||
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Niklas Frykholm, Ari Juels: Error-tolerant password recovery. ACM Conference on Computer and Communications Security 2001: 1-9 |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels: Targeted Advertising ... And Privacy Too. CT-RSA 2001: 408-424 |
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Markus Jakobsson, Ari Juels: An optimally robust hybrid mix network. PODC 2001: 284-292 |
2000 | ||
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Johan Håstad, Jakob Jonsson, Ari Juels, Moti Yung: Funkspiel schemes: an alternative to conventional tamper resistance. ACM Conference on Computer and Communications Security 2000: 125-133 |
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Markus Jakobsson, Ari Juels: Mix and Match: Secure Function Evaluation via Ciphertexts. ASIACRYPT 2000: 162-177 |
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Markus Jakobsson, Ari Juels: Addition of ElGamal Plaintexts. ASIACRYPT 2000: 346-358 |
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels, Marcus Peinado: Hiding Cliques for Cryptographic Security. Des. Codes Cryptography 20(3): 269-280 (2000) |
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels, Markus Jakobsson, Elizabeth A. M. Shriver, Bruce Hillyer: How to turn loaded dice into fair coins. IEEE Transactions on Information Theory 46(3): 911-921 (2000) |
1999 | ||
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels, Martin Wattenberg: A Fuzzy Commitment Scheme. ACM Conference on Computer and Communications Security 1999: 28-36 |
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Markus Jakobsson, Ari Juels: Proofs of Work and Bread Pudding Protocols. Communications and Multimedia Security 1999: 258-272 |
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels: Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing. Financial Cryptography 1999: 29-45 |
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels, John G. Brainard: Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks. NDSS 1999 |
1998 | ||
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Markus Jakobsson, Elizabeth A. M. Shriver, Bruce Hillyer, Ari Juels: A Practical Secure Physical Random Bit Generator. ACM Conference on Computer and Communications Security 1998: 103-111 |
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Markus Jakobsson, Ari Juels: X-Cash: Executable Digital Cash. Financial Cryptography 1998: 16-27 |
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels, Marcus Peinado: Hiding Cliques for Cryptographic Security. SODA 1998: 678-684 |
1997 | ||
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels, Michael Luby, Rafail Ostrovsky: Security of Blind Digital Signatures (Extended Abstract). CRYPTO 1997: 150-164 |
1995 | ||
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels, Martin Wattenberg: Stochastic Hillclimbing as a Baseline Mathod for Evaluating Genetic Algorithms. NIPS 1995: 430-436 |