The SCEAS System
Navigation Menu

Search the dblp DataBase


Steven Myers: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jonathan Katz, Steven Myers, Rafail Ostrovsky
    Cryptographic Counters and Applications to Electronic Voting. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2001, pp:78-92 [Conf]
  2. Steven Myers
    Efficient Amplification of the Security of Weak Pseudo-random Function Generators. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2001, pp:358-372 [Conf]
  3. Steven Myers
    Black-Box Composition Does Not Imply Adaptive Security. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:189-206 [Conf]
  4. Richard Clayton, Drew Dean, Markus Jakobsson, Steven Myers, Stuart G. Stubblebine, Michael Szydlo
    A Chat at the Old Phishin' Hole. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:88- [Conf]
  5. Steven Myers
    Helping the Phish Detect the Lure. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2005, pp:90- [Conf]
  6. Shlomo Hoory, Avner Magen, Steven Myers, Charles Rackoff
    Simple Permutations Mix Well. [Citation Graph (0, 0)][DBLP]
    ICALP, 2004, pp:770-781 [Conf]
  7. Yael Gertner, Tal Malkin, Steven Myers
    Towards a Separation of Semantic and CCA Security for Public Key Encryption. [Citation Graph (0, 0)][DBLP]
    TCC, 2007, pp:434-455 [Conf]
  8. Steven Myers
    Efficient Amplification of the Security of Weak Pseudo-Random Function Generators. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2003, v:16, n:1, pp:1-24 [Journal]
  9. Shlomo Hoory, Avner Magen, Steven Myers, Charles Rackoff
    Simple permutations mix well. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2005, v:348, n:2-3, pp:251-261 [Journal]
  10. Hao Hu, Steven Myers, Vittoria Colizza, Alessandro Vespignani
    WiFi Epidemiology: Can Your Neighbors' Router Make Yours Sick? [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]

  11. Delayed password disclosure. [Citation Graph (, )][DBLP]

  12. Bit Encryption Is Complete. [Citation Graph (, )][DBLP]

  13. On Seed-Incompressible Functions. [Citation Graph (, )][DBLP]

  14. Experimental Investigation of IEEE 802.15.4 Transmission Power Control and Interference Minimization. [Citation Graph (, )][DBLP]

  15. Structure-based kernels for the prediction of catalytic residues and their involvement in human inherited disease. [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.006secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002