2010 | ||
---|---|---|
64 | Ari Juels: Future tense. Commun. CACM 53(3): 120- (2010) | |
2009 | ||
63 | Kevin D. Bowers, Ari Juels, Alina Oprea: HAIL: a high-availability and integrity layer for cloud storage. ACM Conference on Computer and Communications Security 2009: 187-198 | |
62 | Karl Koscher, Ari Juels, Vjekoslav Brajkovic, Tadayoshi Kohno: EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond. ACM Conference on Computer and Communications Security 2009: 33-42 | |
2008 | ||
61 | Ari Juels, Ravikanth Pappu, Bryan Parno: Unidirectional Key Distribution Across Time and Space with Applications to RFID Security. USENIX Security Symposium 2008: 75-90 | |
60 | Ari Juels: RFID security: in the shoulder and on the loading dock. WISEC 2008: 1 | |
59 | Gene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, Melanie R. Rieback: RFID security and privacy: long-term research or short-term tinkering? WISEC 2008: 160 | |
2007 | ||
58 | Daniel V. Bailey, Dan Boneh, Eu-Jin Goh, Ari Juels: Covert channels in privacy-preserving identification systems. ACM Conference on Computer and Communications Security 2007: 297-306 | |
57 | Ari Juels, Burton S. Kaliski Jr.: Pors: proofs of retrievability for large files. ACM Conference on Computer and Communications Security 2007: 584-597 | |
56 | Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, Moti Yung: Two-Party Computing with Encrypted Data. ASIACRYPT 2007: 298-314 | |
55 | Thomas S. Heydt-Benjamin, Daniel V. Bailey, Kevin Fu, Ari Juels, Tom O'Hare: Vulnerabilities in First-Generation RFID-enabled Credit Cards. Financial Cryptography 2007: 2-14 | |
54 | Benessa Defend, Kevin Fu, Ari Juels: Cryptanalysis of Two Lightweight RFID Authentication Schemes. PerCom Workshops 2007: 211-216 | |
53 | Ari Juels, Stephen A. Weis: Defining Strong Privacy for RFID. PerCom Workshops 2007: 342-347 | |
2006 | ||
52 | Ari Juels, Rebecca N. Wright, Sabrina De Capitani di Vimercati: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30 - November 3, 2006 ACM 2006 | |
51 | Ari Juels, Gene Tsudik, Shouhuai Xu, Moti Yung: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006 ACM 2006 | |
50 | Ari Juels, Marianne Winslett: Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, WPES 2006, Alexandria, VA, USA, October 30, 2006 ACM 2006 | |
49 | Radha Poovendran, Ari Juels: Proceedings of the 2006 ACM Workshop on Wireless Security, Los Angeles, California, USA, September 29, 2006 ACM 2006 | |
48 | Ari Juels, Marianne Winslett, Atsuhiro Goto: Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria, VA, USA, November 3, 2006 ACM 2006 | |
47 | Ari Juels, Ernesto Damiani, Alban Gabillon: Proceedings of the 3rd ACM Workshop On Secure Web Services, SWS 2006, Alexandria, VA, USA, November 3, 2006 ACM 2006 | |
46 | John G. Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung: Fourth-factor authentication: somebody you know. ACM Conference on Computer and Communications Security 2006: 168-178 | |
45 | Ari Juels: The Outer Limits of RFID Security. CHES 2006: 231 | |
44 | Ari Juels, Markus Jakobsson, Tom N. Jagatic: Cache Cookies for Browser Authentication (Extended Abstract). IEEE Symposium on Security and Privacy 2006: 301-305 | |
43 | Daniel V. Bailey, Ari Juels: Shoehorning Security into the EPC Tag Standard. SCN 2006: 303-320 | |
42 | Ari Juels, Madhu Sudan: A Fuzzy Vault Scheme. Des. Codes Cryptography 38(2): 237-257 (2006) | |
41 | Ari Juels: RFID security and privacy: a research survey. IEEE Journal on Selected Areas in Communications 24(2): 381-394 (2006) | |
2005 | ||
40 | Vijay Atluri, Catherine Meadows, Ari Juels: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005 ACM 2005 | |
39 | Ari Juels, Stephen A. Weis: Authenticating Pervasive Devices with Human Protocols. CRYPTO 2005: 293-308 | |
38 | Ari Juels, Paul F. Syverson, Daniel V. Bailey: High-Power Proxies for Enhancing RFID Privacy and Utility. Privacy Enhancing Technologies 2005: 210-226 | |
37 | Ari Juels, Dario Catalano, Markus Jakobsson: Coercion-resistant electronic elections. WPES 2005: 61-70 | |
36 | Ari Juels: Strengthening EPC tags against cloning. Workshop on Wireless Security 2005: 67-76 | |
35 | Simson L. Garfinkel, Ari Juels, Ravikanth Pappu: RFID Privacy: An Overview of Problems and Proposed Solutions. IEEE Security & Privacy 3(3): 34-43 (2005) | |
2004 | ||
34 | Ari Juels: Financial Cryptography, 8th International Conference, FC 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers Springer 2004 | |
33 | Philippe Golle, Ari Juels: Parallel mixing. ACM Conference on Computer and Communications Security 2004: 220-226 | |
32 | Brent Waters, Ari Juels, J. Alex Halderman, Edward W. Felten: New client puzzle outsourcing techniques for DoS resistance. ACM Conference on Computer and Communications Security 2004: 246-256 | |
31 | Philippe Golle, Markus Jakobsson, Ari Juels, Paul F. Syverson: Universal Re-encryption for Mixnets. CT-RSA 2004: 163-178 | |
30 | Philippe Golle, Ari Juels: Dining Cryptographers Revisited. EUROCRYPT 2004: 456-473 | |
29 | Ari Juels: "Yoking-Proofs" for RFID Tags. PerCom Workshops 2004: 138-143 | |
28 | Ari Juels: Minimalist Cryptography for Low-Cost RFID Tags. SCN 2004: 149-164 | |
27 | Ari Juels: RFID: Security and Privacy for Five-Cent Computers. USENIX Security Symposium 2004 | |
26 | Ari Juels, John G. Brainard: Soft blocking: flexible blocker tags on the cheap. WPES 2004: 1-7 | |
25 | Ari Juels: RFID: security and privacy for five-cent wireless devices. Workshop on Wireless Security 2004: 31 | |
2003 | ||
24 | Ari Juels, Ronald L. Rivest, Michael Szydlo: The blocker tag: selective blocking of RFID tags for consumer privacy. ACM Conference on Computer and Communications Security 2003: 103-111 | |
23 | Ari Juels, Ravikanth Pappu: Squealing Euros: Privacy Protection in RFID-Enabled Banknotes. Financial Cryptography 2003: 103-121 | |
2002 | ||
22 | Philippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, Ari Juels: Optimistic Mixing for Exit-Polls. ASIACRYPT 2002: 451-465 | |
21 | Markus Jakobsson, Ari Juels, Phong Q. Nguyen: Proprietary Certificates. CT-RSA 2002: 164-181 | |
20 | Ari Juels, Michael Szydlo: A Two-Server, Sealed-Bid Auction Protocol. Financial Cryptography 2002: 72-86 | |
19 | Ari Juels, Jorge Guajardo: RSA Key Generation with Verifiable Randomness. Public Key Cryptography 2002: 357-374 | |
18 | Markus Jakobsson, Ari Juels, Ronald L. Rivest: Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking. USENIX Security Symposium 2002: 339-353 | |
2001 | ||
17 | Niklas Frykholm, Ari Juels: Error-tolerant password recovery. ACM Conference on Computer and Communications Security 2001: 1-9 | |
16 | Ari Juels: Targeted Advertising ... And Privacy Too. CT-RSA 2001: 408-424 | |
15 | Markus Jakobsson, Ari Juels: An optimally robust hybrid mix network. PODC 2001: 284-292 | |
2000 | ||
14 | Johan Håstad, Jakob Jonsson, Ari Juels, Moti Yung: Funkspiel schemes: an alternative to conventional tamper resistance. ACM Conference on Computer and Communications Security 2000: 125-133 | |
13 | Markus Jakobsson, Ari Juels: Mix and Match: Secure Function Evaluation via Ciphertexts. ASIACRYPT 2000: 162-177 | |
12 | Markus Jakobsson, Ari Juels: Addition of ElGamal Plaintexts. ASIACRYPT 2000: 346-358 | |
11 | Ari Juels, Marcus Peinado: Hiding Cliques for Cryptographic Security. Des. Codes Cryptography 20(3): 269-280 (2000) | |
10 | Ari Juels, Markus Jakobsson, Elizabeth A. M. Shriver, Bruce Hillyer: How to turn loaded dice into fair coins. IEEE Transactions on Information Theory 46(3): 911-921 (2000) | |
1999 | ||
9 | Ari Juels, Martin Wattenberg: A Fuzzy Commitment Scheme. ACM Conference on Computer and Communications Security 1999: 28-36 | |
8 | Markus Jakobsson, Ari Juels: Proofs of Work and Bread Pudding Protocols. Communications and Multimedia Security 1999: 258-272 | |
7 | Ari Juels: Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing. Financial Cryptography 1999: 29-45 | |
6 | Ari Juels, John G. Brainard: Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks. NDSS 1999 | |
1998 | ||
5 | Markus Jakobsson, Elizabeth A. M. Shriver, Bruce Hillyer, Ari Juels: A Practical Secure Physical Random Bit Generator. ACM Conference on Computer and Communications Security 1998: 103-111 | |
4 | Markus Jakobsson, Ari Juels: X-Cash: Executable Digital Cash. Financial Cryptography 1998: 16-27 | |
3 | Ari Juels, Marcus Peinado: Hiding Cliques for Cryptographic Security. SODA 1998: 678-684 | |
1997 | ||
2 | Ari Juels, Michael Luby, Rafail Ostrovsky: Security of Blind Digital Signatures (Extended Abstract). CRYPTO 1997: 150-164 | |
1995 | ||
1 | Ari Juels, Martin Wattenberg: Stochastic Hillclimbing as a Baseline Mathod for Evaluating Genetic Algorithms. NIPS 1995: 430-436 |