Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Ari Juels
@article{DBLP:journals/pomacs/TangKFJ23, author = {Weizhao Tang and Lucianna Kiffer and Giulia Fanti and Ari Juels}, title = {Strategic Latency Reduction in Blockchain Peer-to-Peer Networks}, journal = {Proc. {ACM} Meas. Anal. Comput. Syst.}, volume = {7}, number = {2}, pages = {32:1--32:33}, year = {2023}, url = {https://doi.org/10.1145/3589976}, doi = {10.1145/3589976}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pomacs/TangKFJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KelkarDLJK23, author = {Mahimna Kelkar and Soubhik Deb and Sishan Long and Ari Juels and Sreeram Kannan}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Themis: Fast, Strong Order-Fairness in Byzantine Consensus}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {475--489}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3616658}, doi = {10.1145/3576915.3616658}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KelkarDLJK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BabelJ0KKJ23, author = {Kushal Babel and Mojan Javaheripi and Yan Ji and Mahimna Kelkar and Farinaz Koushanfar and Ari Juels}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Lanturn: Measuring Economic Security of Smart Contracts Through Adaptive Learning}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {1212--1226}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623204}, doi = {10.1145/3576915.3623204}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BabelJ0KKJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KellYAMJ23, author = {Tyler Kell and Haaroon Yousaf and Sarah Allen and Sarah Meiklejohn and Ari Juels}, editor = {Foteini Baldimtsi and Christian Cachin}, title = {Forsage: Anatomy of a Smart-Contract Pyramid Scheme}, booktitle = {Financial Cryptography and Data Security - 27th International Conference, {FC} 2023, Bol, Bra{\v{c}}, Croatia, May 1-5, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13951}, pages = {241--258}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47751-5\_14}, doi = {10.1007/978-3-031-47751-5\_14}, timestamp = {Sat, 09 Dec 2023 09:49:49 +0100}, biburl = {https://dblp.org/rec/conf/fc/KellYAMJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmetrics/TangKFJ23, author = {Weizhao Tang and Lucianna Kiffer and Giulia Fanti and Ari Juels}, editor = {Evgenia Smirni and Konstantin Avrachenkov and Phillipa Gill and Bhuvan Urgaonkar}, title = {Strategic Latency Reduction in Blockchain Peer-to-Peer Networks}, booktitle = {Abstract Proceedings of the 2023 {ACM} {SIGMETRICS} International Conference on Measurement and Modeling of Computer Systems, {SIGMETRICS} 2023, Orlando, FL, USA, June 19-23, 2023}, pages = {93--94}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3578338.3593572}, doi = {10.1145/3578338.3593572}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigmetrics/TangKFJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BabelDKJ23, author = {Kushal Babel and Philip Daian and Mahimna Kelkar and Ari Juels}, title = {Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {2499--2516}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179346}, doi = {10.1109/SP46215.2023.10179346}, timestamp = {Thu, 27 Jul 2023 08:17:10 +0200}, biburl = {https://dblp.org/rec/conf/sp/BabelDKJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-19201, author = {Joshua Z. Tan and Tara Merk and Sarah Hubbard and Eliza R. Oak and Joni Pirovich and Ellie Rennie and Rolf Hoefer and Michael Zargham and Jason Potts and Chris Berg and Reuben Youngblom and Primavera De Filippi and Seth Frey and Jeff Strnad and Morshed Mannan and Kelsie Nabben and Silke Noa Elrifai and Jake Hartnell and Benjamin Mako Hill and Alexia Maddox and Woojin Lim and Tobin South and Ari Juels and Dan Boneh}, title = {Open Problems in DAOs}, journal = {CoRR}, volume = {abs/2310.19201}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.19201}, doi = {10.48550/ARXIV.2310.19201}, eprinttype = {arXiv}, eprint = {2310.19201}, timestamp = {Thu, 02 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-19201.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-03530, author = {James Austgen and Andr{\'{e}}s F{\'{a}}brega and Sarah Allen and Kushal Babel and Mahimna Kelkar and Ari Juels}, title = {{DAO} Decentralization: Voting-Bloc Entropy, Bribery, and Dark DAOs}, journal = {CoRR}, volume = {abs/2311.03530}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.03530}, doi = {10.48550/ARXIV.2311.03530}, eprinttype = {arXiv}, eprint = {2311.03530}, timestamp = {Tue, 14 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-03530.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KelkarBDABJ23, author = {Mahimna Kelkar and Kushal Babel and Philip Daian and James Austgen and Vitalik Buterin and Ari Juels}, title = {Complete Knowledge: Preventing Encumbrance of Cryptographic Secrets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {44}, year = {2023}, url = {https://eprint.iacr.org/2023/044}, timestamp = {Mon, 30 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KelkarBDABJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BabelJJKKJ23, author = {Kushal Babel and Mojan Javaheripi and Yan Ji and Mahimna Kelkar and Farinaz Koushanfar and Ari Juels}, title = {Lanturn: Measuring Economic Security of Smart Contracts Through Adaptive Learning}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1338}, year = {2023}, url = {https://eprint.iacr.org/2023/1338}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BabelJJKKJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-06837, author = {Weizhao Tang and Lucianna Kiffer and Giulia Fanti and Ari Juels}, title = {Strategic Latency Reduction in Blockchain Peer-to-Peer Networks}, journal = {CoRR}, volume = {abs/2205.06837}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.06837}, doi = {10.48550/ARXIV.2205.06837}, eprinttype = {arXiv}, eprint = {2205.06837}, timestamp = {Tue, 17 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-06837.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/HouZJDTFJ21, author = {Charlie Hou and Mingxun Zhou and Yan Ji and Phil Daian and Florian Tram{\`{e}}r and Giulia Fanti and Ari Juels}, title = {SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning}, booktitle = {28th Annual Network and Distributed System Security Symposium, {NDSS} 2021, virtually, February 21-25, 2021}, publisher = {The Internet Society}, year = {2021}, url = {https://www.ndss-symposium.org/ndss-paper/squirrl-automating-attack-analysis-on-blockchain-incentive-mechanisms-with-deep-reinforcement-learning/}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/HouZJDTFJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MaramMZJFKLMJM21, author = {Deepak Maram and Harjasleen Malvai and Fan Zhang and Nerla Jean{-}Louis and Alexander Frolov and Tyler Kell and Tyrone Lobban and Christine Moy and Ari Juels and Andrew Miller}, title = {CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {1348--1366}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00038}, doi = {10.1109/SP40001.2021.00038}, timestamp = {Thu, 21 Sep 2023 15:57:26 +0200}, biburl = {https://dblp.org/rec/conf/sp/MaramMZJFKLMJM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-04380, author = {Tyler Kell and Haaroon Yousaf and Sarah Allen and Sarah Meiklejohn and Ari Juels}, title = {Forsage: Anatomy of a Smart-Contract Pyramid Scheme}, journal = {CoRR}, volume = {abs/2105.04380}, year = {2021}, url = {https://arxiv.org/abs/2105.04380}, eprinttype = {arXiv}, eprint = {2105.04380}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-04380.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-04347, author = {Kushal Babel and Philip Daian and Mahimna Kelkar and Ari Juels}, title = {Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts}, journal = {CoRR}, volume = {abs/2109.04347}, year = {2021}, url = {https://arxiv.org/abs/2109.04347}, eprinttype = {arXiv}, eprint = {2109.04347}, timestamp = {Tue, 21 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-04347.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaramBKJ21, author = {Deepak Maram and Iddo Bentov and Mahimna Kelkar and Ari Juels}, title = {GoAT: File Geolocation via Anchor Timestamping}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {697}, year = {2021}, url = {https://eprint.iacr.org/2021/697}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaramBKJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BabelDKJ21, author = {Kushal Babel and Philip Daian and Mahimna Kelkar and Ari Juels}, title = {Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1147}, year = {2021}, url = {https://eprint.iacr.org/2021/1147}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BabelDKJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KelkarDLJK21, author = {Mahimna Kelkar and Soubhik Deb and Sishan Long and Ari Juels and Sreeram Kannan}, title = {Themis: Fast, Strong Order-Fairness in Byzantine Consensus}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1465}, year = {2021}, url = {https://eprint.iacr.org/2021/1465}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KelkarDLJK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/ZhangHCKHJJMS20, author = {Fan Zhang and Warren He and Raymond Cheng and Jernej Kos and Nicholas Hynes and Noah M. Johnson and Ari Juels and Andrew Miller and Dawn Song}, title = {The Ekiden Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts}, journal = {{IEEE} Secur. Priv.}, volume = {18}, number = {3}, pages = {17--27}, year = {2020}, url = {https://doi.org/10.1109/MSEC.2020.2976984}, doi = {10.1109/MSEC.2020.2976984}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/ZhangHCKHJJMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MirkinJPKEJ20, author = {Michael Mirkin and Yan Ji and Jonathan Pang and Ariah Klages{-}Mundt and Ittay Eyal and Ari Juels}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {BDoS: Blockchain Denial-of-Service}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {601--619}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417247}, doi = {10.1145/3372297.3417247}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MirkinJPKEJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangMMGJ20, author = {Fan Zhang and Deepak Maram and Harjasleen Malvai and Steven Goldfeder and Ari Juels}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {{DECO:} Liberating Web Data Using Decentralized Oracles for {TLS}}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {1919--1938}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417239}, doi = {10.1145/3372297.3417239}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhangMMGJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Kelkar0GJ20, author = {Mahimna Kelkar and Fan Zhang and Steven Goldfeder and Ari Juels}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Order-Fairness for Byzantine Consensus}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12172}, pages = {451--480}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56877-1\_16}, doi = {10.1007/978-3-030-56877-1\_16}, timestamp = {Mon, 28 Aug 2023 21:17:50 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Kelkar0GJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/DaianGKLZBBJ20, author = {Philip Daian and Steven Goldfeder and Tyler Kell and Yunqi Li and Xueyuan Zhao and Iddo Bentov and Lorenz Breidenbach and Ari Juels}, title = {Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {910--927}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00040}, doi = {10.1109/SP40000.2020.00040}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/DaianGKLZBBJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KelkarZGJ20, author = {Mahimna Kelkar and Fan Zhang and Steven Goldfeder and Ari Juels}, title = {Order-Fairness for Byzantine Consensus}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {269}, year = {2020}, url = {https://eprint.iacr.org/2020/269}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KelkarZGJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaramMZJFKLMJM20, author = {Deepak Maram and Harjasleen Malvai and Fan Zhang and Nerla Jean{-}Louis and Alexander Frolov and Tyler Kell and Tyrone Lobban and Christine Moy and Ari Juels and Andrew Miller}, title = {CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {934}, year = {2020}, url = {https://eprint.iacr.org/2020/934}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaramMZJFKLMJM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/SchneiderMJMC19, author = {Moritz Schneider and Sinisa Matetic and Ari Juels and Andrew Miller and Srdjan Capkun}, title = {Secure Brokered Delegation Through DelegaTEE}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {4}, pages = {43--52}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2909712}, doi = {10.1109/MSEC.2019.2909712}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/SchneiderMJMC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/BreidenbachDTJ19, author = {Lorenz Breidenbach and Philip Daian and Florian Tram{\`{e}}r and Ari Juels}, title = {The Hydra Framework for Principled, Automated Bug Bounties}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {4}, pages = {53--61}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2914109}, doi = {10.1109/MSEC.2019.2914109}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/BreidenbachDTJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aft/ZhangDBMJ19, author = {Fan Zhang and Philip Daian and Iddo Bentov and Ian Miers and Ari Juels}, title = {Paralysis Proofs: Secure Dynamic Access Structures for Cryptocurrency Custody and More}, booktitle = {Proceedings of the 1st {ACM} Conference on Advances in Financial Technologies, {AFT} 2019, Zurich, Switzerland, October 21-23, 2019}, pages = {1--15}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3318041.3355459}, doi = {10.1145/3318041.3355459}, timestamp = {Thu, 11 Mar 2021 17:04:51 +0100}, biburl = {https://dblp.org/rec/conf/aft/ZhangDBMJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0001RCMKJ19, author = {Rahul Chatterjee and M. Sadegh Riazi and Tanmoy Chowdhury and Emanuela Marasco and Farinaz Koushanfar and Ari Juels}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {1171--1186}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3363208}, doi = {10.1145/3319535.3363208}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/0001RCMKJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CecchettiFMJ19, author = {Ethan Cecchetti and Ben Fisch and Ian Miers and Ari Juels}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {PIEs: Public Incompressible Encodings for Decentralized Storage}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {1351--1367}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354231}, doi = {10.1145/3319535.3354231}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CecchettiFMJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BentovJ0BDJ19, author = {Iddo Bentov and Yan Ji and Fan Zhang and Lorenz Breidenbach and Philip Daian and Ari Juels}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {1521--1538}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3363221}, doi = {10.1145/3319535.3363221}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BentovJ0BDJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MaramZWLZJS19, author = {Sai Krishna Deepak Maram and Fan Zhang and Lun Wang and Andrew Low and Yupeng Zhang and Ari Juels and Dawn Song}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {{CHURP:} Dynamic-Committee Proactive Secret Sharing}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {2369--2386}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3363203}, doi = {10.1145/3319535.3363203}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MaramZWLZJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/ChengZKHHJJ0S19, author = {Raymond Cheng and Fan Zhang and Jernej Kos and Warren He and Nicholas Hynes and Noah M. Johnson and Ari Juels and Andrew Miller and Dawn Song}, title = {Ekiden: {A} Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {185--200}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EuroSP.2019.00023}, doi = {10.1109/EUROSP.2019.00023}, timestamp = {Tue, 09 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/ChengZKHHJJ0S19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-05234, author = {Philip Daian and Steven Goldfeder and Tyler Kell and Yunqi Li and Xueyuan Zhao and Iddo Bentov and Lorenz Breidenbach and Ari Juels}, title = {Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges}, journal = {CoRR}, volume = {abs/1904.05234}, year = {2019}, url = {http://arxiv.org/abs/1904.05234}, eprinttype = {arXiv}, eprint = {1904.05234}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-05234.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-00938, author = {Fan Zhang and Sai Krishna Deepak Maram and Harjasleen Malvai and Steven Goldfeder and Ari Juels}, title = {{DECO:} Liberating Web Data Using Decentralized Oracles for {TLS}}, journal = {CoRR}, volume = {abs/1909.00938}, year = {2019}, url = {http://arxiv.org/abs/1909.00938}, eprinttype = {arXiv}, eprint = {1909.00938}, timestamp = {Tue, 17 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-00938.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-01798, author = {Charlie Hou and Mingxun Zhou and Yan Ji and Phil Daian and Florian Tram{\`{e}}r and Giulia Fanti and Ari Juels}, title = {SquirRL: Automating Attack Discovery on Blockchain Incentive Mechanisms with Deep Reinforcement Learning}, journal = {CoRR}, volume = {abs/1912.01798}, year = {2019}, url = {http://arxiv.org/abs/1912.01798}, eprinttype = {arXiv}, eprint = {1912.01798}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-01798.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-07497, author = {Michael Mirkin and Yan Ji and Jonathan Pang and Ariah Klages{-}Mundt and Ittay Eyal and Ari Juels}, title = {BDoS: Blockchain Denial of Service}, journal = {CoRR}, volume = {abs/1912.07497}, year = {2019}, url = {http://arxiv.org/abs/1912.07497}, eprinttype = {arXiv}, eprint = {1912.07497}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-07497.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Maram0WLZJS19, author = {Sai Krishna Deepak Maram and Fan Zhang and Lun Wang and Andrew Low and Yupeng Zhang and Ari Juels and Dawn Song}, title = {{CHURP:} Dynamic-Committee Proactive Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {17}, year = {2019}, url = {https://eprint.iacr.org/2019/017}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Maram0WLZJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChatterjeeRCMKJ19, author = {Rahul Chatterjee and M. Sadegh Riazi and Tanmoy Chowdhury and Emanuela Marasco and Farinaz Koushanfar and Ari Juels}, title = {Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1103}, year = {2019}, url = {https://eprint.iacr.org/2019/1103}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChatterjeeRCMKJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BreindenbachDTJ18, author = {Lorenz Breidenbach and Philip Daian and Florian Tram{\`{e}}r and Ari Juels}, editor = {William Enck and Adrienne Porter Felt}, title = {Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {1335--1352}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/breindenbach}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/BreindenbachDTJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MateticSMJC18, author = {Sinisa Matetic and Moritz Schneider and Andrew Miller and Ari Juels and Srdjan Capkun}, editor = {William Enck and Adrienne Porter Felt}, title = {DelegaTEE: Brokered Delegation Using Trusted Execution Environments}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {1387--1403}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/matetic}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/MateticSMJC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-05141, author = {Raymond Cheng and Fan Zhang and Jernej Kos and Warren He and Nicholas Hynes and Noah M. Johnson and Ari Juels and Andrew Miller and Dawn Song}, title = {Ekiden: {A} Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution}, journal = {CoRR}, volume = {abs/1804.05141}, year = {2018}, url = {http://arxiv.org/abs/1804.05141}, eprinttype = {arXiv}, eprint = {1804.05141}, timestamp = {Tue, 09 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-05141.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangDBJ18, author = {Fan Zhang and Philip Daian and Iddo Bentov and Ari Juels}, title = {Paralysis Proofs: Safe Access-Structure Updates for Cryptocurrencies and More}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {96}, year = {2018}, url = {http://eprint.iacr.org/2018/096}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangDBJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MateticSMJC18, author = {Sinisa Matetic and Moritz Schneider and Andrew Miller and Ari Juels and Srdjan Capkun}, title = {DelegaTEE: Brokered Delegation Using Trusted Execution Environments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {160}, year = {2018}, url = {http://eprint.iacr.org/2018/160}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MateticSMJC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CecchettiMJ18, author = {Ethan Cecchetti and Ian Miers and Ari Juels}, title = {PIEs: Public Incompressible Encodings for Decentralized Storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {684}, year = {2018}, url = {https://eprint.iacr.org/2018/684}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CecchettiMJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/AikatACJRRSS17, author = {Jay Aikat and Aditya Akella and Jeffrey S. Chase and Ari Juels and Michael K. Reiter and Thomas Ristenpart and Vyas Sekar and Michael M. Swift}, title = {Rethinking Security in the Era of Cloud Computing}, journal = {{IEEE} Secur. Priv.}, volume = {15}, number = {3}, pages = {60--69}, year = {2017}, url = {https://doi.org/10.1109/MSP.2017.80}, doi = {10.1109/MSP.2017.80}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/AikatACJRRSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CecchettiZJKJS17, author = {Ethan Cecchetti and Fan Zhang and Yan Ji and Ahmed E. Kosba and Ari Juels and Elaine Shi}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Solidus: Confidential Distributed Ledger Transactions via {PVORM}}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {701--717}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134010}, doi = {10.1145/3133956.3134010}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CecchettiZJKJS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/WoodageCDJR17, author = {Joanne Woodage and Rahul Chatterjee and Yevgeniy Dodis and Ari Juels and Thomas Ristenpart}, editor = {Jonathan Katz and Hovav Shacham}, title = {A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {682--710}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_23}, doi = {10.1007/978-3-319-63697-9\_23}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/WoodageCDJR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/TramerZLHJS17, author = {Florian Tram{\`{e}}r and Fan Zhang and Huang Lin and Jean{-}Pierre Hubaux and Ari Juels and Elaine Shi}, title = {Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2017, Paris, France, April 26-28, 2017}, pages = {19--34}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSP.2017.28}, doi = {10.1109/EUROSP.2017.28}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/TramerZLHJS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/TramerAGHHHJL17, author = {Florian Tram{\`{e}}r and Vaggelis Atlidakis and Roxana Geambasu and Daniel J. Hsu and Jean{-}Pierre Hubaux and Mathias Humbert and Ari Juels and Huang Lin}, title = {FairTest: Discovering Unwarranted Associations in Data-Driven Applications}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2017, Paris, France, April 26-28, 2017}, pages = {401--416}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSP.2017.29}, doi = {10.1109/EUROSP.2017.29}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/TramerAGHHHJL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/DaianEJS17, author = {Philip Daian and Ittay Eyal and Ari Juels and Emin G{\"{u}}n Sirer}, editor = {Michael Brenner and Kurt Rohloff and Joseph Bonneau and Andrew Miller and Peter Y. A. Ryan and Vanessa Teague and Andrea Bracciali and Massimiliano Sala and Federico Pintore and Markus Jakobsson}, title = {(Short Paper) PieceWork: Generalized Outsourcing Control for Proofs of Work}, booktitle = {Financial Cryptography and Data Security - {FC} 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10323}, pages = {182--190}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70278-0\_11}, doi = {10.1007/978-3-319-70278-0\_11}, timestamp = {Tue, 16 Aug 2022 23:04:23 +0200}, biburl = {https://dblp.org/rec/conf/fc/DaianEJS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MateticAKDSGJC17, author = {Sinisa Matetic and Mansoor Ahmed and Kari Kostiainen and Aritra Dhar and David M. Sommer and Arthur Gervais and Ari Juels and Srdjan Capkun}, editor = {Engin Kirda and Thomas Ristenpart}, title = {{ROTE:} Rollback Protection for Trusted Execution}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {1289--1306}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/matetic}, timestamp = {Thu, 27 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/MateticAKDSGJC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhangEEJR17, author = {Fan Zhang and Ittay Eyal and Robert Escriva and Ari Juels and Robbert van Renesse}, editor = {Engin Kirda and Thomas Ristenpart}, title = {{REM:} Resource-Efficient Mining for Blockchains}, booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017}, pages = {1427--1444}, publisher = {{USENIX} Association}, year = {2017}, url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/zhang}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/ZhangEEJR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MateticAKDSGJC17, author = {Sinisa Matetic and Mansoor Ahmed and Kari Kostiainen and Aritra Dhar and David M. Sommer and Arthur Gervais and Ari Juels and Srdjan Capkun}, title = {{ROTE:} Rollback Protection for Trusted Execution}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {48}, year = {2017}, url = {http://eprint.iacr.org/2017/048}, timestamp = {Thu, 27 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MateticAKDSGJC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangEEJR17, author = {Fan Zhang and Ittay Eyal and Robert Escriva and Ari Juels and Robbert van Renesse}, title = {{REM:} Resource-Efficient Mining for Blockchains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {179}, year = {2017}, url = {http://eprint.iacr.org/2017/179}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangEEJR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CecchettiZJKJS17, author = {Ethan Cecchetti and Fan Zhang and Yan Ji and Ahmed E. Kosba and Ari Juels and Elaine Shi}, title = {Solidus: Confidential Distributed Ledger Transactions via {PVORM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {317}, year = {2017}, url = {http://eprint.iacr.org/2017/317}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CecchettiZJKJS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WoodageCDJR17, author = {Joanne Woodage and Rahul Chatterjee and Yevgeniy Dodis and Ari Juels and Thomas Ristenpart}, title = {A New Distribution Sensitive Secure Sketch and a Comparison Between Approaches to Typo-Tolerant Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {542}, year = {2017}, url = {http://eprint.iacr.org/2017/542}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WoodageCDJR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BreidenbachDTJ17, author = {Lorenz Breidenbach and Philip Daian and Florian Tram{\`{e}}r and Ari Juels}, title = {Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1090}, year = {2017}, url = {http://eprint.iacr.org/2017/1090}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BreidenbachDTJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BentovJZLZBDJ17, author = {Iddo Bentov and Yan Ji and Fan Zhang and Yunqi Li and Xueyuan Zhao and Lorenz Breidenbach and Philip Daian and Ari Juels}, title = {Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1153}, year = {2017}, url = {http://eprint.iacr.org/2017/1153}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BentovJZLZBDJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/HubauxJ16, author = {Jean{-}Pierre Hubaux and Ari Juels}, title = {Privacy is dead, long live privacy}, journal = {Commun. {ACM}}, volume = {59}, number = {6}, pages = {39--41}, year = {2016}, url = {https://doi.org/10.1145/2834114}, doi = {10.1145/2834114}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/HubauxJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangCCJS16, author = {Fan Zhang and Ethan Cecchetti and Kyle Croman and Ari Juels and Elaine Shi}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Town Crier: An Authenticated Data Feed for Smart Contracts}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {270--282}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978326}, doi = {10.1145/2976749.2978326}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhangCCJS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JuelsKS16, author = {Ari Juels and Ahmed E. Kosba and Elaine Shi}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {The Ring of Gyges: Investigating the Future of Criminal Smart Contracts}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {283--295}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978362}, doi = {10.1145/2976749.2978362}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JuelsKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/CromanDEGJKMSSS16, author = {Kyle Croman and Christian Decker and Ittay Eyal and Adem Efe Gencer and Ari Juels and Ahmed E. Kosba and Andrew Miller and Prateek Saxena and Elaine Shi and Emin G{\"{u}}n Sirer and Dawn Song and Roger Wattenhofer}, editor = {Jeremy Clark and Sarah Meiklejohn and Peter Y. A. Ryan and Dan S. Wallach and Michael Brenner and Kurt Rohloff}, title = {On Scaling Decentralized Blockchains - {(A} Position Paper)}, booktitle = {Financial Cryptography and Data Security - {FC} 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9604}, pages = {106--125}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53357-4\_8}, doi = {10.1007/978-3-662-53357-4\_8}, timestamp = {Wed, 12 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/CromanDEGJKMSSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ruleml/MarinoJ16, author = {Bill Marino and Ari Juels}, editor = {Jos{\'{e}} J{\'{u}}lio Alferes and Leopoldo E. Bertossi and Guido Governatori and Paul Fodor and Dumitru Roman}, title = {Setting Standards for Altering and Undoing Smart Contracts}, booktitle = {Rule Technologies. Research, Tools, and Applications - 10th International Symposium, RuleML 2016, Stony Brook, NY, USA, July 6-9, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9718}, pages = {151--166}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-42019-6\_10}, doi = {10.1007/978-3-319-42019-6\_10}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/ruleml/MarinoJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChatterjeeAAJR16, author = {Rahul Chatterjee and Anish Athayle and Devdatta Akhawe and Ari Juels and Thomas Ristenpart}, title = {pASSWORD tYPOS and How to Correct Them Securely}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {799--818}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.53}, doi = {10.1109/SP.2016.53}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ChatterjeeAAJR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/TramerZJRR16, author = {Florian Tram{\`{e}}r and Fan Zhang and Ari Juels and Michael K. Reiter and Thomas Ristenpart}, editor = {Thorsten Holz and Stefan Savage}, title = {Stealing Machine Learning Models via Prediction APIs}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {601--618}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/tramer}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/TramerZJRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/TramerZJRR16, author = {Florian Tram{\`{e}}r and Fan Zhang and Ari Juels and Michael K. Reiter and Thomas Ristenpart}, title = {Stealing Machine Learning Models via Prediction APIs}, journal = {CoRR}, volume = {abs/1609.02943}, year = {2016}, url = {http://arxiv.org/abs/1609.02943}, eprinttype = {arXiv}, eprint = {1609.02943}, timestamp = {Wed, 13 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/TramerZJRR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangCCJS16, author = {Fan Zhang and Ethan Cecchetti and Kyle Croman and Ari Juels and Elaine Shi}, title = {Town Crier: An Authenticated Data Feed for Smart Contracts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {168}, year = {2016}, url = {http://eprint.iacr.org/2016/168}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhangCCJS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisGGJR16, author = {Yevgeniy Dodis and Chaya Ganesh and Alexander Golovnev and Ari Juels and Thomas Ristenpart}, title = {A Formal Treatment of Backdoored Pseudorandom Generators}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {306}, year = {2016}, url = {http://eprint.iacr.org/2016/306}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisGGJR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JuelsKS16, author = {Ari Juels and Ahmed E. Kosba and Elaine Shi}, title = {The Ring of Gyges: Investigating the Future of Criminal Smart Contracts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {358}, year = {2016}, url = {http://eprint.iacr.org/2016/358}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JuelsKS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TramerZLHJS16, author = {Florian Tram{\`{e}}r and Fan Zhang and Huang Lin and Jean{-}Pierre Hubaux and Ari Juels and Elaine Shi}, title = {Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {635}, year = {2016}, url = {http://eprint.iacr.org/2016/635}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TramerZLHJS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JuelsKTT15, author = {Ari Juels and James Kelley and Roberto Tamassia and Nikos Triandopoulos}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Falcon Codes: Fast, Authenticated {LT} Codes (Or: Making Rapid Tornadoes Unstoppable)}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1032--1047}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813728}, doi = {10.1145/2810103.2813728}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JuelsKTT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DodisGGJR15, author = {Yevgeniy Dodis and Chaya Ganesh and Alexander Golovnev and Ari Juels and Thomas Ristenpart}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {A Formal Treatment of Backdoored Pseudorandom Generators}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {101--126}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_5}, doi = {10.1007/978-3-662-46800-5\_5}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DodisGGJR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/HuangAFHJ15, author = {Zhicong Huang and Erman Ayday and Jacques Fellay and Jean{-}Pierre Hubaux and Ari Juels}, title = {GenoGuard: Protecting Genomic Data against Brute-Force Attacks}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {447--462}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.34}, doi = {10.1109/SP.2015.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/HuangAFHJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChatterjeeBJR15, author = {Rahul Chatterjee and Joseph Bonneau and Ari Juels and Thomas Ristenpart}, title = {Cracking-Resistant Password Vaults Using Natural Language Encoders}, booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015}, pages = {481--498}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SP.2015.36}, doi = {10.1109/SP.2015.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ChatterjeeBJR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/EverspaughCSJR15, author = {Adam Everspaugh and Rahul Chatterjee and Samuel Scott and Ari Juels and Thomas Ristenpart}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {The Pythia {PRF} Service}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {547--562}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/everspaugh}, timestamp = {Mon, 01 Feb 2021 08:42:57 +0100}, biburl = {https://dblp.org/rec/conf/uss/EverspaughCSJR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/TramerAGHHHJL15, author = {Florian Tram{\`{e}}r and Vaggelis Atlidakis and Roxana Geambasu and Daniel J. Hsu and Jean{-}Pierre Hubaux and Mathias Humbert and Ari Juels and Huang Lin}, title = {Discovering Unwarranted Associations in Data-Driven Applications with the FairTest Testing Toolkit}, journal = {CoRR}, volume = {abs/1510.02377}, year = {2015}, url = {http://arxiv.org/abs/1510.02377}, eprinttype = {arXiv}, eprint = {1510.02377}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/TramerAGHHHJL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EverspaughCSJR15, author = {Adam Everspaugh and Rahul Chatterjee and Samuel Scott and Ari Juels and Thomas Ristenpart}, title = {The Pythia {PRF} Service}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {644}, year = {2015}, url = {http://eprint.iacr.org/2015/644}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EverspaughCSJR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChatterjeeBJR15, author = {Rahul Chatterjee and Joseph Bonneau and Ari Juels and Thomas Ristenpart}, title = {Cracking-Resistant Password Vaults using Natural Language Encoders}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {788}, year = {2015}, url = {http://eprint.iacr.org/2015/788}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChatterjeeBJR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/JuelsW14, author = {Ari Juels and Bonnie Wong}, title = {The interplay of neuroscience and cryptography: technical perspective}, journal = {Commun. {ACM}}, volume = {57}, number = {5}, pages = {109}, year = {2014}, url = {https://doi.org/10.1145/2594446}, doi = {10.1145/2594446}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/JuelsW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/JuelsR14, author = {Ari Juels and Thomas Ristenpart}, title = {Honey Encryption: Encryption beyond the Brute-Force Barrier}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {4}, pages = {59--62}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.67}, doi = {10.1109/MSP.2014.67}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/JuelsR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangJRR14, author = {Yinqian Zhang and Ari Juels and Michael K. Reiter and Thomas Ristenpart}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Cross-Tenant Side-Channel Attacks in PaaS Clouds}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {990--1003}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660356}, doi = {10.1145/2660267.2660356}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangJRR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YenHORJ14, author = {Ting{-}Fang Yen and Victor Heorhiadi and Alina Oprea and Michael K. Reiter and Ari Juels}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {An Epidemiological Study of Malware Encounters in a Large Enterprise}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1117--1130}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660330}, doi = {10.1145/2660267.2660330}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YenHORJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JuelsR14, author = {Ari Juels and Thomas Ristenpart}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Honey Encryption: Security Beyond the Brute-Force Bound}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {293--310}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_17}, doi = {10.1007/978-3-642-55220-5\_17}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JuelsR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/BowersHJT14, author = {Kevin D. Bowers and Catherine Hart and Ari Juels and Nikos Triandopoulos}, editor = {Angelos Stavrou and Herbert Bos and Georgios Portokalidis}, title = {PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging}, booktitle = {Research in Attacks, Intrusions and Defenses - 17th International Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8688}, pages = {46--67}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11379-1\_3}, doi = {10.1007/978-3-319-11379-1\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/BowersHJT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/Juels14, author = {Ari Juels}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {A bodyguard of lies: the use of honey objects in information security}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {1--4}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613088}, doi = {10.1145/2613087.2613088}, timestamp = {Wed, 02 Jun 2021 09:13:31 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/Juels14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MillerJSPK14, author = {Andrew Miller and Ari Juels and Elaine Shi and Bryan Parno and Jonathan Katz}, title = {Permacoin: Repurposing Bitcoin Work for Data Preservation}, booktitle = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley, CA, USA, May 18-21, 2014}, pages = {475--490}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SP.2014.37}, doi = {10.1109/SP.2014.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/MillerJSPK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JuelsR14, author = {Ari Juels and Thomas Ristenpart}, title = {Honey Encryption: Security Beyond the Brute-Force Bound}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {155}, year = {2014}, url = {http://eprint.iacr.org/2014/155}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JuelsR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JuelsKTT14, author = {Ari Juels and James Kelley and Roberto Tamassia and Nikos Triandopoulos}, title = {Falcon Codes: Fast, Authenticated {LT} Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {903}, year = {2014}, url = {http://eprint.iacr.org/2014/903}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JuelsKTT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/JuelsO13, author = {Ari Juels and Alina Oprea}, title = {New approaches to security and availability for cloud data}, journal = {Commun. {ACM}}, volume = {56}, number = {2}, pages = {64--73}, year = {2013}, url = {https://doi.org/10.1145/2408776.2408793}, doi = {10.1145/2408776.2408793}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/JuelsO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DijkJOR13, author = {Marten van Dijk and Ari Juels and Alina Oprea and Ronald L. Rivest}, title = {FlipIt: The Game of "Stealthy Takeover"}, journal = {J. Cryptol.}, volume = {26}, number = {4}, pages = {655--713}, year = {2013}, url = {https://doi.org/10.1007/s00145-012-9134-5}, doi = {10.1007/S00145-012-9134-5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/DijkJOR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YenOOLRJK13, author = {Ting{-}Fang Yen and Alina Oprea and Kaan Onarlioglu and Todd Leetham and William K. Robertson and Ari Juels and Engin Kirda}, editor = {Charles N. Payne Jr.}, title = {Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {199--208}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523670}, doi = {10.1145/2523649.2523670}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/YenOOLRJK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JuelsR13, author = {Ari Juels and Ronald L. Rivest}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Honeywords: making password-cracking detectable}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {145--160}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516671}, doi = {10.1145/2508859.2516671}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JuelsR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RostamiJK13, author = {Masoud Rostami and Ari Juels and Farinaz Koushanfar}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Heart-to-heart {(H2H):} authentication for implanted medical devices}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1099--1112}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516658}, doi = {10.1145/2508859.2516658}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/RostamiJK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JuelsP13, author = {Ari Juels and Bryan Parno}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Fifth {ACM} cloud computing security workshop {(CCSW} 2013)}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {1487--1488}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2509033}, doi = {10.1145/2508859.2509033}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JuelsP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dac/RostamiBKJ13, author = {Masoud Rostami and Wayne P. Burleson and Farinaz Koushanfar and Ari Juels}, title = {Balancing security and utility in medical devices?}, booktitle = {The 50th Annual Design Automation Conference 2013, {DAC} '13, Austin, TX, USA, May 29 - June 07, 2013}, pages = {13:1--13:6}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2463209.2488750}, doi = {10.1145/2463209.2488750}, timestamp = {Fri, 04 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dac/RostamiBKJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/BowersJRS13, author = {Kevin D. Bowers and Ari Juels and Ronald L. Rivest and Emily Shen}, title = {Drifting Keys: Impersonation detection for constrained devices}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2013, Turin, Italy, April 14-19, 2013}, pages = {1025--1033}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INFCOM.2013.6566892}, doi = {10.1109/INFCOM.2013.6566892}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/BowersJRS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/ZanettiCJ13, author = {Davide Zanetti and Srdjan Capkun and Ari Juels}, title = {Tailing {RFID} Tags for Clone Detection}, booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS} 2013, San Diego, California, USA, February 24-27, 2013}, publisher = {The Internet Society}, year = {2013}, url = {https://www.ndss-symposium.org/ndss2013/tailing-rfid-tags-clone-detection}, timestamp = {Mon, 01 Feb 2021 08:42:13 +0100}, biburl = {https://dblp.org/rec/conf/ndss/ZanettiCJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2013ccsw, editor = {Ari Juels and Bryan Parno}, title = {CCSW'13, Proceedings of the 2013 {ACM} Cloud Computing Security Workshop, Co-located with {CCS} 2013, Berlin, Germany, November 4, 2013}, publisher = {{ACM}}, year = {2013}, url = {http://dl.acm.org/citation.cfm?id=2517488}, isbn = {978-1-4503-2490-8}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2013ccsw.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BowersHJT13, author = {Kevin D. Bowers and Catherine Hart and Ari Juels and Nikos Triandopoulos}, title = {Securing the Data in Big Data Security Analytics}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {625}, year = {2013}, url = {http://eprint.iacr.org/2013/625}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BowersHJT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/StefanovDJO12, author = {Emil Stefanov and Marten van Dijk and Ari Juels and Alina Oprea}, editor = {Robert H'obbes' Zakon}, title = {Iris: a scalable cloud file system with efficient integrity checks}, booktitle = {28th Annual Computer Security Applications Conference, {ACSAC} 2012, Orlando, FL, USA, 3-7 December 2012}, pages = {229--238}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2420950.2420985}, doi = {10.1145/2420950.2420985}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/StefanovDJO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DijkJORST12, author = {Marten van Dijk and Ari Juels and Alina Oprea and Ronald L. Rivest and Emil Stefanov and Nikos Triandopoulos}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Hourglass schemes: how to prove that cloud files are encrypted}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {265--280}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382227}, doi = {10.1145/2382196.2382227}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/DijkJORST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangJRR12, author = {Yinqian Zhang and Ari Juels and Michael K. Reiter and Thomas Ristenpart}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Cross-VM side channels and their use to extract private keys}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {305--316}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382230}, doi = {10.1145/2382196.2382230}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangJRR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cloud/FarleyJVRBS12, author = {Benjamin Farley and Ari Juels and Venkatanathan Varadarajan and Thomas Ristenpart and Kevin D. Bowers and Michael M. Swift}, editor = {Michael J. Carey and Steven Hand}, title = {More for your money: exploiting performance heterogeneity in public clouds}, booktitle = {{ACM} Symposium on Cloud Computing, {SOCC} '12, San Jose, CA, USA, October 14-17, 2012}, pages = {20}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2391229.2391249}, doi = {10.1145/2391229.2391249}, timestamp = {Tue, 20 Dec 2022 17:33:10 +0100}, biburl = {https://dblp.org/rec/conf/cloud/FarleyJVRBS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gamesec/BowersDGJORT12, author = {Kevin D. Bowers and Marten van Dijk and Robert Griffin and Ari Juels and Alina Oprea and Ronald L. Rivest and Nikos Triandopoulos}, editor = {Jens Grossklags and Jean C. Walrand}, title = {Defending against the Unknown Enemy: Applying FlipIt to System Security}, booktitle = {Decision and Game Theory for Security - Third International Conference, GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7638}, pages = {248--263}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34266-0\_15}, doi = {10.1007/978-3-642-34266-0\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gamesec/BowersDGJORT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/leet/JuelsY12, author = {Ari Juels and Ting{-}Fang Yen}, editor = {Engin Kirda}, title = {Sherlock Holmes and the Case of the Advanced Persistent Threat}, booktitle = {5th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats, {LEET} '12, San Jose, CA, USA, April 24, 2012}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/leet12/workshop-program/presentation/juels}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/leet/JuelsY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/rfidsec/2011, editor = {Ari Juels and Christof Paar}, title = {{RFID.} Security and Privacy - 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7055}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-25286-0}, doi = {10.1007/978-3-642-25286-0}, isbn = {978-3-642-25285-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DijkJOR12, author = {Marten van Dijk and Ari Juels and Alina Oprea and Ronald L. Rivest}, title = {FlipIt: The Game of "Stealthy Takeover"}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {103}, year = {2012}, url = {http://eprint.iacr.org/2012/103}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DijkJOR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BowersDGJORT12, author = {Kevin D. Bowers and Marten van Dijk and Robert Griffin and Ari Juels and Alina Oprea and Ronald L. Rivest and Nikos Triandopoulos}, title = {Defending Against the Unknown Enemy: Applying FlipIt to System Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {579}, year = {2012}, url = {http://eprint.iacr.org/2012/579}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BowersDGJORT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BowersDJOR11, author = {Kevin D. Bowers and Marten van Dijk and Ari Juels and Alina Oprea and Ronald L. Rivest}, editor = {Yan Chen and George Danezis and Vitaly Shmatikov}, title = {How to tell if your cloud files are vulnerable to drive crashes}, booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011}, pages = {501--514}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046707.2046766}, doi = {10.1145/2046707.2046766}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BowersDJOR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/DenningBDJ11, author = {Tamara Denning and Kevin D. Bowers and Marten van Dijk and Ari Juels}, editor = {Desney S. Tan and Saleema Amershi and Bo Begole and Wendy A. Kellogg and Manas Tungare}, title = {Exploring implicit memory for painless password recovery}, booktitle = {Proceedings of the International Conference on Human Factors in Computing Systems, {CHI} 2011, Vancouver, BC, Canada, May 7-12, 2011}, pages = {2615--2618}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1978942.1979323}, doi = {10.1145/1978942.1979323}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/DenningBDJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhangJOR11, author = {Yinqian Zhang and Ari Juels and Alina Oprea and Michael K. Reiter}, title = {HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis}, booktitle = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May 2011, Berkeley, California, {USA}}, pages = {313--328}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SP.2011.31}, doi = {10.1109/SP.2011.31}, timestamp = {Thu, 21 Sep 2023 16:14:16 +0200}, biburl = {https://dblp.org/rec/conf/sp/ZhangJOR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StefanovDOJ11, author = {Emil Stefanov and Marten van Dijk and Alina Oprea and Ari Juels}, title = {Iris: {A} Scalable Cloud File System with Efficient Integrity Checks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {585}, year = {2011}, url = {http://eprint.iacr.org/2011/585}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StefanovDOJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Juels10, author = {Ari Juels}, title = {Future tense}, journal = {Commun. {ACM}}, volume = {53}, number = {3}, pages = {120}, year = {2010}, url = {https://doi.org/10.1145/1666420.1666448}, doi = {10.1145/1666420.1666448}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Juels10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fast/OpreaJ10, author = {Alina Oprea and Ari Juels}, editor = {Randal C. Burns and Kimberly Keeton}, title = {A Clean-Slate Look at Disk Scrubbing}, booktitle = {8th {USENIX} Conference on File and Storage Technologies, San Jose, CA, USA, February 23-26, 2010}, pages = {57--70}, publisher = {{USENIX}}, year = {2010}, url = {http://www.usenix.org/events/fast10/tech/full\_papers/oprea.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fast/OpreaJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmsec/Juels10, author = {Ari Juels}, editor = {Patrizio Campisi and Jana Dittmann and Scott Craver}, title = {Biometrics in electronic travel documents}, booktitle = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy, September 9-10, 2010}, pages = {1--2}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1854229.1854231}, doi = {10.1145/1854229.1854231}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmsec/Juels10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/Juels10, author = {Ari Juels}, editor = {Siddika Berna {\"{O}}rs Yal{\c{c}}in}, title = {The Physical Basis of {RFID} Security}, booktitle = {Radio Frequency Identification: Security and Privacy Issues - 6th International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6370}, pages = {1}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16822-2\_1}, doi = {10.1007/978-3-642-16822-2\_1}, timestamp = {Fri, 03 Sep 2021 17:40:55 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/Juels10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DijkJ10, author = {Marten van Dijk and Ari Juels}, editor = {Wietse Z. Venema}, title = {On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing}, booktitle = {5th {USENIX} Workshop on Hot Topics in Security, HotSec'10, Washington, D.C., USA, August 10, 2010}, publisher = {{USENIX} Association}, year = {2010}, url = {https://www.usenix.org/conference/hotsec10/impossibility-cryptography-alone-privacy-preserving-cloud-computing}, timestamp = {Mon, 01 Feb 2021 08:43:16 +0100}, biburl = {https://dblp.org/rec/conf/uss/DijkJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wote/JuelsCJ10, author = {Ari Juels and Dario Catalano and Markus Jakobsson}, editor = {David Chaum and Markus Jakobsson and Ronald L. Rivest and Peter Y. A. Ryan and Josh Benaloh and Miroslaw Kutylowski and Ben Adida}, title = {Coercion-Resistant Electronic Elections}, booktitle = {Towards Trustworthy Elections, New Directions in Electronic Voting}, series = {Lecture Notes in Computer Science}, volume = {6000}, pages = {37--63}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12980-3\_2}, doi = {10.1007/978-3-642-12980-3\_2}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/wote/JuelsCJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BowersDJOR10, author = {Kevin D. Bowers and Marten van Dijk and Ari Juels and Alina Oprea and Ronald L. Rivest}, title = {How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {214}, year = {2010}, url = {http://eprint.iacr.org/2010/214}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BowersDJOR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DijkJ10, author = {Marten van Dijk and Ari Juels}, title = {On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {305}, year = {2010}, url = {http://eprint.iacr.org/2010/305}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DijkJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/JuelsW09, author = {Ari Juels and Stephen A. Weis}, title = {Defining strong privacy for {RFID}}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {1}, pages = {7:1--7:23}, year = {2009}, url = {https://doi.org/10.1145/1609956.1609963}, doi = {10.1145/1609956.1609963}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/JuelsW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KoscherJBK09, author = {Karl Koscher and Ari Juels and Vjekoslav Brajkovic and Tadayoshi Kohno}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {{EPC} {RFID} tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {33--42}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653668}, doi = {10.1145/1653662.1653668}, timestamp = {Tue, 10 Nov 2020 19:58:07 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KoscherJBK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BowersJO09a, author = {Kevin D. Bowers and Ari Juels and Alina Oprea}, editor = {Radu Sion and Dawn Song}, title = {Proofs of retrievability: theory and implementation}, booktitle = {Proceedings of the first {ACM} Cloud Computing Security Workshop, {CCSW} 2009, Chicago, IL, USA, November 13, 2009}, pages = {43--54}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655008.1655015}, doi = {10.1145/1655008.1655015}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BowersJO09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BowersJO09, author = {Kevin D. Bowers and Ari Juels and Alina Oprea}, editor = {Ehab Al{-}Shaer and Somesh Jha and Angelos D. Keromytis}, title = {{HAIL:} a high-availability and integrity layer for cloud storage}, booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009}, pages = {187--198}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653662.1653686}, doi = {10.1145/1653662.1653686}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BowersJO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/Juels09, author = {Ari Juels}, title = {Power games in {RFID} security}, booktitle = {Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, {ICITST} 2009, London, UK, November 9-12, 2009}, pages = {1}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/ICITST.2009.5402509}, doi = {10.1109/ICITST.2009.5402509}, timestamp = {Mon, 09 Aug 2021 17:01:45 +0200}, biburl = {https://dblp.org/rec/conf/icitst/Juels09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/JakobssonJ09, author = {Markus Jakobsson and Ari Juels}, editor = {Anil Somayaji and Richard Ford}, title = {Server-side detection of malware infection}, booktitle = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford, United Kingdom, September 8-11, 2009}, pages = {11--22}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1719030.1719033}, doi = {10.1145/1719030.1719033}, timestamp = {Tue, 06 Nov 2018 16:58:38 +0100}, biburl = {https://dblp.org/rec/conf/nspw/JakobssonJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SalajeghehCRFJ09, author = {Mastooreh Salajegheh and Shane S. Clark and Benjamin Ransford and Kevin Fu and Ari Juels}, editor = {Fabian Monrose}, title = {{CCCP:} Secure Remote Storage for Computational RFIDs}, booktitle = {18th {USENIX} Security Symposium, Montreal, Canada, August 10-14, 2009, Proceedings}, pages = {215--230}, publisher = {{USENIX} Association}, year = {2009}, url = {http://www.usenix.org/events/sec09/tech/full\_papers/salajegheh.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/SalajeghehCRFJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JuelsPP08, author = {Ari Juels and Ravikanth Pappu and Bryan Parno}, editor = {Paul C. van Oorschot}, title = {Unidirectional Key Distribution Across Time and Space with Applications to {RFID} Security}, booktitle = {Proceedings of the 17th {USENIX} Security Symposium, July 28-August 1, 2008, San Jose, CA, {USA}}, pages = {75--90}, publisher = {{USENIX} Association}, year = {2008}, url = {http://www.usenix.org/events/sec08/tech/full\_papers/juels/juels.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/JuelsPP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/Juels08, author = {Ari Juels}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {{RFID} security: in the shoulder and on the loading dock}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {1}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352534}, doi = {10.1145/1352533.1352534}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/Juels08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisec/TsudikBJKMPR08, author = {Gene Tsudik and Mike Burmester and Ari Juels and Alfred Kobsa and David Molnar and Roberto Di Pietro and Melanie R. Rieback}, editor = {Virgil D. Gligor and Jean{-}Pierre Hubaux and Radha Poovendran}, title = {{RFID} security and privacy: long-term research or short-term tinkering?}, booktitle = {Proceedings of the First {ACM} Conference on Wireless Network Security, {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008}, pages = {160}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1352533.1352560}, doi = {10.1145/1352533.1352560}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wisec/TsudikBJKMPR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JuelsPP08, author = {Ari Juels and Ravikanth Pappu and Bryan Parno}, title = {Unidirectional Key Distribution Across Time and Space with Applications to {RFID} Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {44}, year = {2008}, url = {http://eprint.iacr.org/2008/044}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JuelsPP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BowersJO08, author = {Kevin D. Bowers and Ari Juels and Alina Oprea}, title = {Proofs of Retrievability: Theory and Implementation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {175}, year = {2008}, url = {http://eprint.iacr.org/2008/175}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BowersJO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BowersJO08a, author = {Kevin D. Bowers and Ari Juels and Alina Oprea}, title = {{HAIL:} {A} High-Availability and Integrity Layer for Cloud Storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {489}, year = {2008}, url = {http://eprint.iacr.org/2008/489}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BowersJO08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jamia/HalamkaJ07, author = {John D. Halamka and Ari Juels}, title = {In Response to: Letter to the Editor Regarding: "A Security Analysis of the Verichip Implantable {RFID} Device"}, journal = {J. Am. Medical Informatics Assoc.}, volume = {14}, number = {2}, pages = {251}, year = {2007}, url = {https://doi.org/10.1197/jamia.M2339}, doi = {10.1197/JAMIA.M2339}, timestamp = {Wed, 10 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jamia/HalamkaJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChoiEJMY07, author = {Seung Geol Choi and Ariel Elbaz and Ari Juels and Tal Malkin and Moti Yung}, editor = {Kaoru Kurosawa}, title = {Two-Party Computing with Encrypted Data}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4833}, pages = {298--314}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76900-2\_18}, doi = {10.1007/978-3-540-76900-2\_18}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChoiEJMY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BaileyBGJ07, author = {Daniel V. Bailey and Dan Boneh and Eu{-}Jin Goh and Ari Juels}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Covert channels in privacy-preserving identification systems}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {297--306}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315283}, doi = {10.1145/1315245.1315283}, timestamp = {Tue, 10 Nov 2020 20:00:14 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BaileyBGJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JuelsK07, author = {Ari Juels and Burton S. Kaliski Jr.}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Pors: proofs of retrievability for large files}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {584--597}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315317}, doi = {10.1145/1315245.1315317}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JuelsK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Heydt-BenjaminBFJO07, author = {Thomas S. Heydt{-}Benjamin and Daniel V. Bailey and Kevin Fu and Ari Juels and Tom O'Hare}, editor = {Sven Dietrich and Rachna Dhamija}, title = {Vulnerabilities in First-Generation RFID-enabled Credit Cards}, booktitle = {Financial Cryptography and Data Security, 11th International Conference, {FC} 2007, and 1st International Workshop on Usable Security, {USEC} 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4886}, pages = {2--14}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77366-5\_2}, doi = {10.1007/978-3-540-77366-5\_2}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/Heydt-BenjaminBFJO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/DefendFJ07, author = {Benessa Defend and Kevin Fu and Ari Juels}, title = {Cryptanalysis of Two Lightweight {RFID} Authentication Schemes}, booktitle = {Fifth Annual {IEEE} International Conference on Pervasive Computing and Communications - Workshops (PerCom Workshops 2007), 19-23 March 2007, White Plains, New York, {USA}}, pages = {211--216}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/PERCOMW.2007.34}, doi = {10.1109/PERCOMW.2007.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/DefendFJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/JuelsW07, author = {Ari Juels and Stephen A. Weis}, title = {Defining Strong Privacy for {RFID}}, booktitle = {Fifth Annual {IEEE} International Conference on Pervasive Computing and Communications - Workshops (PerCom Workshops 2007), 19-23 March 2007, White Plains, New York, {USA}}, pages = {342--347}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/PERCOMW.2007.37}, doi = {10.1109/PERCOMW.2007.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/JuelsW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JuelsSJ07, author = {Ari Juels and Sid Stamm and Markus Jakobsson}, editor = {Niels Provos}, title = {Combating Click Fraud via Premium Clicks}, booktitle = {Proceedings of the 16th {USENIX} Security Symposium, Boston, MA, USA, August 6-10, 2007}, publisher = {{USENIX} Association}, year = {2007}, url = {https://www.usenix.org/conference/16th-usenix-security-symposium/combating-click-fraud-premium-clicks}, timestamp = {Mon, 01 Feb 2021 08:43:02 +0100}, biburl = {https://dblp.org/rec/conf/uss/JuelsSJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JuelsS06, author = {Ari Juels and Madhu Sudan}, title = {A Fuzzy Vault Scheme}, journal = {Des. Codes Cryptogr.}, volume = {38}, number = {2}, pages = {237--257}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-6343-z}, doi = {10.1007/S10623-005-6343-Z}, timestamp = {Tue, 14 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JuelsS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jamia/HalamkaJSW06, author = {John D. Halamka and Ari Juels and Adam Stubblefield and Jonathan Westhues}, title = {Technology Evaluation: The Security Implications of VeriChip Cloning}, journal = {J. Am. Medical Informatics Assoc.}, volume = {13}, number = {6}, pages = {601--607}, year = {2006}, url = {https://doi.org/10.1197/jamia.M2143}, doi = {10.1197/JAMIA.M2143}, timestamp = {Wed, 10 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jamia/HalamkaJSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/Juels06, author = {Ari Juels}, title = {{RFID} security and privacy: a research survey}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {24}, number = {2}, pages = {381--394}, year = {2006}, url = {https://doi.org/10.1109/JSAC.2005.861395}, doi = {10.1109/JSAC.2005.861395}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/Juels06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BrainardJRSY06, author = {John G. Brainard and Ari Juels and Ronald L. Rivest and Michael Szydlo and Moti Yung}, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {Fourth-factor authentication: somebody you know}, booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, pages = {168--178}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405.1180427}, doi = {10.1145/1180405.1180427}, timestamp = {Wed, 24 Feb 2021 17:28:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BrainardJRSY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/Juels06, author = {Ari Juels}, editor = {Louis Goubin and Mitsuru Matsui}, title = {The Outer Limits of {RFID} Security}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4249}, pages = {231}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11894063\_18}, doi = {10.1007/11894063\_18}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/Juels06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BaileyJ06, author = {Daniel V. Bailey and Ari Juels}, editor = {Roberto De Prisco and Moti Yung}, title = {Shoehorning Security into the {EPC} Tag Standard}, booktitle = {Security and Cryptography for Networks, 5th International Conference, {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4116}, pages = {303--320}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11832072\_21}, doi = {10.1007/11832072\_21}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/BaileyJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/JuelsJJ06, author = {Ari Juels and Markus Jakobsson and Tom N. Jagatic}, title = {Cache Cookies for Browser Authentication (Extended Abstract)}, booktitle = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24 May 2006, Berkeley, California, {USA}}, pages = {301--305}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/SP.2006.8}, doi = {10.1109/SP.2006.8}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/JuelsJJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2006stc, editor = {Ari Juels and Gene Tsudik and Shouhuai Xu and Moti Yung}, title = {Proceedings of the 1st {ACM} Workshop on Scalable Trusted Computing, {STC} 2006, Alexandria, VA, USA, November 3, 2006}, publisher = {{ACM}}, year = {2006}, isbn = {1-59593-548-7}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2006stc.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2006usa, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405}, doi = {10.1145/1180405}, timestamp = {Wed, 24 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2006usa.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dim/2006, editor = {Ari Juels and Marianne Winslett and Atsuhiro Goto}, title = {Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria, VA, USA, November 3, 2006}, publisher = {{ACM}}, year = {2006}, isbn = {1-59593-547-9}, timestamp = {Tue, 15 May 2007 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dim/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sws/2006, editor = {Ari Juels and Ernesto Damiani and Alban Gabillon}, title = {Proceedings of the 3rd {ACM} Workshop On Secure Web Services, {SWS} 2006, Alexandria, VA, USA, November 3, 2006}, publisher = {{ACM}}, year = {2006}, isbn = {1-59593-546-0}, timestamp = {Tue, 22 Apr 2008 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sws/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wpes/2006, editor = {Ari Juels and Marianne Winslett}, title = {Proceedings of the 2006 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2006, Alexandria, VA, USA, October 30, 2006}, publisher = {{ACM}}, year = {2006}, isbn = {1-59593-556-8}, timestamp = {Mon, 07 Apr 2008 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wpes/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ws/2006, editor = {Radha Poovendran and Ari Juels}, title = {Proceedings of the 2006 {ACM} Workshop on Wireless Security, Los Angeles, California, USA, September 29, 2006}, publisher = {{ACM}}, year = {2006}, isbn = {1-59593-557-6}, timestamp = {Thu, 07 Feb 2008 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ws/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JuelsW06, author = {Ari Juels and Stephen A. Weis}, title = {Defining Strong Privacy for {RFID}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {137}, year = {2006}, url = {http://eprint.iacr.org/2006/137}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JuelsW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GarfinkelJP05, author = {Simson L. Garfinkel and Ari Juels and Ravikanth Pappu}, title = {{RFID} Privacy: An Overview of Problems and Proposed Solutions}, journal = {{IEEE} Secur. Priv.}, volume = {3}, number = {3}, pages = {34--43}, year = {2005}, url = {https://doi.org/10.1109/MSP.2005.78}, doi = {10.1109/MSP.2005.78}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GarfinkelJP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JuelsW05, author = {Ari Juels and Stephen A. Weis}, editor = {Victor Shoup}, title = {Authenticating Pervasive Devices with Human Protocols}, booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3621}, pages = {293--308}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11535218\_18}, doi = {10.1007/11535218\_18}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/JuelsW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/JuelsSB05, author = {Ari Juels and Paul F. Syverson and Daniel V. Bailey}, editor = {George Danezis and David M. Martin Jr.}, title = {High-Power Proxies for Enhancing {RFID} Privacy and Utility}, booktitle = {Privacy Enhancing Technologies, 5th International Workshop, {PET} 2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3856}, pages = {210--226}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11767831\_14}, doi = {10.1007/11767831\_14}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/JuelsSB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/JuelsMW05, author = {Ari Juels and David Molnar and David A. Wagner}, title = {Security and Privacy Issues in E-passports}, booktitle = {First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, Athens, Greece, 5-9 September, 2005}, pages = {74--88}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/SECURECOMM.2005.59}, doi = {10.1109/SECURECOMM.2005.59}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/JuelsMW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Bono0SJRS05, author = {Steve Bono and Matthew Green and Adam Stubblefield and Ari Juels and Aviel D. Rubin and Michael Szydlo}, editor = {Patrick D. McDaniel}, title = {Security Analysis of a Cryptographically-Enabled {RFID} Device}, booktitle = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005}, publisher = {{USENIX} Association}, year = {2005}, url = {https://www.usenix.org/conference/14th-usenix-security-symposium/security-analysis-cryptographically-enabled-rfid-device}, timestamp = {Mon, 01 Feb 2021 08:42:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/Bono0SJRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/JuelsCJ05, author = {Ari Juels and Dario Catalano and Markus Jakobsson}, editor = {Vijay Atluri and Sabrina De Capitani di Vimercati and Roger Dingledine}, title = {Coercion-resistant electronic elections}, booktitle = {Proceedings of the 2005 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2005, Alexandria, VA, USA, November 7, 2005}, pages = {61--70}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102199.1102213}, doi = {10.1145/1102199.1102213}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/JuelsCJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ws/Juels05, author = {Ari Juels}, editor = {Markus Jakobsson and Radha Poovendran}, title = {Strengthening {EPC} tags against cloning}, booktitle = {Proceedings of the 2005 {ACM} Workshop on Wireless Security, Cologne, Germany, September 2, 2005}, pages = {67--76}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1080793.1080805}, doi = {10.1145/1080793.1080805}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ws/Juels05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2005, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, publisher = {{ACM}}, year = {2005}, isbn = {1-59593-226-7}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JuelsMW05, author = {Ari Juels and David Molnar and David A. Wagner}, title = {Security and Privacy Issues in E-passports}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {95}, year = {2005}, url = {http://eprint.iacr.org/2005/095}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JuelsMW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GolleJ04, author = {Philippe Golle and Ari Juels}, editor = {Vijayalakshmi Atluri and Birgit Pfitzmann and Patrick D. McDaniel}, title = {Parallel mixing}, booktitle = {Proceedings of the 11th {ACM} Conference on Computer and Communications Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004}, pages = {220--226}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1030083.1030113}, doi = {10.1145/1030083.1030113}, timestamp = {Fri, 13 Nov 2020 16:10:44 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GolleJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WatersJHF04, author = {Brent Waters and Ari Juels and J. Alex Halderman and Edward W. Felten}, editor = {Vijayalakshmi Atluri and Birgit Pfitzmann and Patrick D. McDaniel}, title = {New client puzzle outsourcing techniques for DoS resistance}, booktitle = {Proceedings of the 11th {ACM} Conference on Computer and Communications Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004}, pages = {246--256}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1030083.1030117}, doi = {10.1145/1030083.1030117}, timestamp = {Fri, 13 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WatersJHF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/GolleJJS04, author = {Philippe Golle and Markus Jakobsson and Ari Juels and Paul F. Syverson}, editor = {Tatsuaki Okamoto}, title = {Universal Re-encryption for Mixnets}, booktitle = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2964}, pages = {163--178}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24660-2\_14}, doi = {10.1007/978-3-540-24660-2\_14}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/GolleJJS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GolleJ04, author = {Philippe Golle and Ari Juels}, editor = {Christian Cachin and Jan Camenisch}, title = {Dining Cryptographers Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3027}, pages = {456--473}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24676-3\_27}, doi = {10.1007/978-3-540-24676-3\_27}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GolleJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/Juels04, author = {Ari Juels}, title = {"Yoking-Proofs" for {RFID} Tags}, booktitle = {2nd {IEEE} Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 14-17 March 2004, Orlando, FL, {USA}}, pages = {138--143}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/PERCOMW.2004.1276920}, doi = {10.1109/PERCOMW.2004.1276920}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/Juels04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Juels04, author = {Ari Juels}, editor = {Carlo Blundo and Stelvio Cimato}, title = {Minimalist Cryptography for Low-Cost {RFID} Tags}, booktitle = {Security in Communication Networks, 4th International Conference, {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3352}, pages = {149--164}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30598-9\_11}, doi = {10.1007/978-3-540-30598-9\_11}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/Juels04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Juels04, author = {Ari Juels}, editor = {Matt Blaze}, title = {{RFID:} Security and Privacy for Five-Cent Computers}, booktitle = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13, 2004, San Diego, CA, {USA}}, publisher = {{USENIX}}, year = {2004}, url = {http://www.usenix.org/publications/library/proceedings/sec04/tech/slides/juels.htm}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/Juels04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/JuelsB04, author = {Ari Juels and John G. Brainard}, editor = {Vijay Atluri and Paul F. Syverson and Sabrina De Capitani di Vimercati}, title = {Soft blocking: flexible blocker tags on the cheap}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2004, Washington, DC, USA, October 28, 2004}, pages = {1--7}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029179.1029181}, doi = {10.1145/1029179.1029181}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/JuelsB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ws/Juels04, author = {Ari Juels}, editor = {Markus Jakobsson and Adrian Perrig}, title = {{RFID:} security and privacy for five-cent wireless devices}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Wireless Security, Philadelphia, PA, USA, October 1, 2004}, pages = {31}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1023646.1023652}, doi = {10.1145/1023646.1023652}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ws/Juels04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fc/2004, editor = {Ari Juels}, title = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b98935}, doi = {10.1007/B98935}, isbn = {3-540-22420-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JuelsRS03, author = {Ari Juels and Ronald L. Rivest and Michael Szydlo}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {The blocker tag: selective blocking of {RFID} tags for consumer privacy}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {103--111}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948126}, doi = {10.1145/948109.948126}, timestamp = {Tue, 10 Nov 2020 20:00:42 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JuelsRS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/JuelsP03, author = {Ari Juels and Ravikanth Pappu}, editor = {Rebecca N. Wright}, title = {Squealing Euros: Privacy Protection in RFID-Enabled Banknotes}, booktitle = {Financial Cryptography, 7th International Conference, {FC} 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2742}, pages = {103--121}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45126-6\_8}, doi = {10.1007/978-3-540-45126-6\_8}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/JuelsP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/BrainardJKS03, author = {John G. Brainard and Ari Juels and Burt Kaliski and Michael Szydlo}, title = {A New Two-Server Approach for Authentication with Short Secrets}, booktitle = {Proceedings of the 12th {USENIX} Security Symposium, Washington, D.C., USA, August 4-8, 2003}, publisher = {{USENIX} Association}, year = {2003}, url = {https://www.usenix.org/conference/12th-usenix-security-symposium/new-two-server-approach-authentication-short-secrets}, timestamp = {Mon, 01 Feb 2021 08:43:16 +0100}, biburl = {https://dblp.org/rec/conf/uss/BrainardJKS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GolleZBJJ02, author = {Philippe Golle and Sheng Zhong and Dan Boneh and Markus Jakobsson and Ari Juels}, editor = {Yuliang Zheng}, title = {Optimistic Mixing for Exit-Polls}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2501}, pages = {451--465}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36178-2\_28}, doi = {10.1007/3-540-36178-2\_28}, timestamp = {Wed, 02 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/GolleZBJJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/JakobssonJN02, author = {Markus Jakobsson and Ari Juels and Phong Q. Nguyen}, editor = {Bart Preneel}, title = {Proprietary Certificates}, booktitle = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2271}, pages = {164--181}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45760-7\_12}, doi = {10.1007/3-540-45760-7\_12}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/JakobssonJN02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/JuelsS02, author = {Ari Juels and Michael Szydlo}, editor = {Matt Blaze}, title = {A Two-Server, Sealed-Bid Auction Protocol}, booktitle = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton, Bermuda, March 11-14, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2357}, pages = {72--86}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36504-4\_6}, doi = {10.1007/3-540-36504-4\_6}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/JuelsS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/JuelsG02, author = {Ari Juels and Jorge Guajardo}, editor = {David Naccache and Pascal Paillier}, title = {{RSA} Key Generation with Verifiable Randomness}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {357--374}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_26}, doi = {10.1007/3-540-45664-3\_26}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/JuelsG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/JakobssonJR02, author = {Markus Jakobsson and Ari Juels and Ronald L. Rivest}, editor = {Dan Boneh}, title = {Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking}, booktitle = {Proceedings of the 11th {USENIX} Security Symposium, San Francisco, CA, USA, August 5-9, 2002}, pages = {339--353}, publisher = {{USENIX}}, year = {2002}, url = {http://www.usenix.org/publications/library/proceedings/sec02/jakobsson.html}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/JakobssonJR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JakobssonJR02, author = {Markus Jakobsson and Ari Juels and Ronald L. Rivest}, title = {Making Mix Nets Robust For Electronic Voting By Randomized Partial Checking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {25}, year = {2002}, url = {http://eprint.iacr.org/2002/025}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JakobssonJR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JuelsS02, author = {Ari Juels and Madhu Sudan}, title = {A Fuzzy Vault Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {93}, year = {2002}, url = {http://eprint.iacr.org/2002/093}, timestamp = {Tue, 14 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JuelsS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JuelsCJ02, author = {Ari Juels and Dario Catalano and Markus Jakobsson}, title = {Coercion-Resistant Electronic Elections}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {165}, year = {2002}, url = {http://eprint.iacr.org/2002/165}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JuelsCJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FrykholmJ01, author = {Niklas Frykholm and Ari Juels}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {Error-tolerant password recovery}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {1--9}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.501985}, doi = {10.1145/501983.501985}, timestamp = {Tue, 10 Nov 2020 20:00:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FrykholmJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Juels01, author = {Ari Juels}, editor = {David Naccache}, title = {Targeted Advertising ... And Privacy Too}, booktitle = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2020}, pages = {408--424}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45353-9\_30}, doi = {10.1007/3-540-45353-9\_30}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Juels01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/JakobssonJ01, author = {Markus Jakobsson and Ari Juels}, editor = {Ajay D. Kshemkalyani and Nir Shavit}, title = {An optimally robust hybrid mix network}, booktitle = {Proceedings of the Twentieth Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2001, Newport, Rhode Island, USA, August 26-29, 2001}, pages = {284--292}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/383962.384046}, doi = {10.1145/383962.384046}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/JakobssonJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JuelsP00, author = {Ari Juels and Marcus Peinado}, title = {Hiding Cliques for Cryptographic Security}, journal = {Des. Codes Cryptogr.}, volume = {20}, number = {3}, pages = {269--280}, year = {2000}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JuelsP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/JuelsJSH00, author = {Ari Juels and Markus Jakobsson and Elizabeth A. M. Shriver and Bruce Hillyer}, title = {How to turn loaded dice into fair coins}, journal = {{IEEE} Trans. Inf. Theory}, volume = {46}, number = {3}, pages = {911--921}, year = {2000}, url = {https://doi.org/10.1109/18.841170}, doi = {10.1109/18.841170}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/JuelsJSH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/JakobssonJ00, author = {Markus Jakobsson and Ari Juels}, editor = {Tatsuaki Okamoto}, title = {Mix and Match: Secure Function Evaluation via Ciphertexts}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1976}, pages = {162--177}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44448-3\_13}, doi = {10.1007/3-540-44448-3\_13}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/JakobssonJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/JakobssonJ00a, author = {Markus Jakobsson and Ari Juels}, editor = {Tatsuaki Okamoto}, title = {Addition of ElGamal Plaintexts}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1976}, pages = {346--358}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44448-3\_26}, doi = {10.1007/3-540-44448-3\_26}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/JakobssonJ00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HastadJJY00, author = {Johan H{\aa}stad and Jakob Jonsson and Ari Juels and Moti Yung}, editor = {Dimitris Gritzalis and Sushil Jajodia and Pierangela Samarati}, title = {Funkspiel schemes: an alternative to conventional tamper resistance}, booktitle = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000}, pages = {125--133}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/352600.352619}, doi = {10.1145/352600.352619}, timestamp = {Tue, 10 Nov 2020 20:00:15 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HastadJJY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JuelsW99, author = {Ari Juels and Martin Wattenberg}, editor = {Juzar Motiwalla and Gene Tsudik}, title = {A Fuzzy Commitment Scheme}, booktitle = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and Communications Security, Singapore, November 1-4, 1999}, pages = {28--36}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/319709.319714}, doi = {10.1145/319709.319714}, timestamp = {Tue, 10 Nov 2020 20:00:25 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JuelsW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cms/JakobssonJ99, author = {Markus Jakobsson and Ari Juels}, editor = {Bart Preneel}, title = {Proofs of Work and Bread Pudding Protocols}, booktitle = {Secure Information Networks: Communications and Multimedia Security, {IFIP} {TC6/TC11} Joint Working Conference on Communications and Multimedia Security {(CMS} '99), September 20-21, 1999, Leuven, Belgium}, series = {{IFIP} Conference Proceedings}, volume = {152}, pages = {258--272}, publisher = {Kluwer}, year = {1999}, timestamp = {Mon, 14 Oct 2002 12:00:15 +0200}, biburl = {https://dblp.org/rec/conf/cms/JakobssonJ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Juels99, author = {Ari Juels}, editor = {Matthew K. Franklin}, title = {Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing}, booktitle = {Financial Cryptography, Third International Conference, FC'99, Anguilla, British West Indies, February 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1648}, pages = {29--45}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48390-X\_3}, doi = {10.1007/3-540-48390-X\_3}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/Juels99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/JuelsB99, author = {Ari Juels and John G. Brainard}, title = {Client Puzzles: {A} Cryptographic Countermeasure Against Connection Depletion Attacks}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 1999, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {1999}, url = {https://www.ndss-symposium.org/ndss1999/cryptographic-defense-against-connection-depletion-attacks/}, timestamp = {Mon, 01 Feb 2021 08:42:19 +0100}, biburl = {https://dblp.org/rec/conf/ndss/JuelsB99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JakobssonSHJ98, author = {Markus Jakobsson and Elizabeth A. M. Shriver and Bruce Hillyer and Ari Juels}, editor = {Li Gong and Michael K. Reiter}, title = {A Practical Secure Physical Random Bit Generator}, booktitle = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998}, pages = {103--111}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/288090.288114}, doi = {10.1145/288090.288114}, timestamp = {Tue, 10 Nov 2020 20:00:11 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JakobssonSHJ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/JakobssonJ98, author = {Markus Jakobsson and Ari Juels}, editor = {Rafael Hirschfeld}, title = {X-Cash: Executable Digital Cash}, booktitle = {Financial Cryptography, Second International Conference, FC'98, Anguilla, British West Indies, February 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1465}, pages = {16--27}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055470}, doi = {10.1007/BFB0055470}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/JakobssonJ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/JuelsP98, author = {Ari Juels and Marcus Peinado}, editor = {Howard J. Karloff}, title = {Hiding Cliques for Cryptographic Security}, booktitle = {Proceedings of the Ninth Annual {ACM-SIAM} Symposium on Discrete Algorithms, 25-27 January 1998, San Francisco, California, {USA}}, pages = {678--684}, publisher = {{ACM/SIAM}}, year = {1998}, url = {http://dl.acm.org/citation.cfm?id=314613.315047}, timestamp = {Thu, 05 Jul 2018 07:29:49 +0200}, biburl = {https://dblp.org/rec/conf/soda/JuelsP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/JuelsLO97, author = {Ari Juels and Michael Luby and Rafail Ostrovsky}, editor = {Burton S. Kaliski Jr.}, title = {Security of Blind Digital Signatures (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1294}, pages = {150--164}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052233}, doi = {10.1007/BFB0052233}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/JuelsLO97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/JuelsW95, author = {Ari Juels and Martin Wattenberg}, editor = {David S. Touretzky and Michael Mozer and Michael E. Hasselmo}, title = {Stochastic Hillclimbing as a Baseline Mathod for Evaluating Genetic Algorithms}, booktitle = {Advances in Neural Information Processing Systems 8, NIPS, Denver, CO, USA, November 27-30, 1995}, pages = {430--436}, publisher = {{MIT} Press}, year = {1995}, url = {http://papers.nips.cc/paper/1172-stochastic-hillclimbing-as-a-baseline-method-for-evaluating-genetic-algorithms}, timestamp = {Mon, 16 May 2022 15:41:51 +0200}, biburl = {https://dblp.org/rec/conf/nips/JuelsW95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.