|
Search the dblp DataBase
Ari Juels:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Markus Jakobsson, Ari Juels
Mix and Match: Secure Function Evaluation via Ciphertexts. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2000, pp:162-177 [Conf]
- Markus Jakobsson, Ari Juels
Addition of ElGamal Plaintexts. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2000, pp:346-358 [Conf]
- Philippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, Ari Juels
Optimistic Mixing for Exit-Polls. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2002, pp:451-465 [Conf]
- Niklas Frykholm, Ari Juels
Error-tolerant password recovery. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2001, pp:1-9 [Conf]
- Philippe Golle, Ari Juels
Parallel mixing. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:220-226 [Conf]
- Johan Håstad, Jakob Jonsson, Ari Juels, Moti Yung
Funkspiel schemes: an alternative to conventional tamper resistance. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2000, pp:125-133 [Conf]
- Markus Jakobsson, Elizabeth A. M. Shriver, Bruce Hillyer, Ari Juels
A Practical Secure Physical Random Bit Generator. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1998, pp:103-111 [Conf]
- Ari Juels, Ronald L. Rivest, Michael Szydlo
The blocker tag: selective blocking of RFID tags for consumer privacy. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2003, pp:103-111 [Conf]
- Ari Juels, Martin Wattenberg
A Fuzzy Commitment Scheme. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 1999, pp:28-36 [Conf]
- Brent Waters, Ari Juels, J. Alex Halderman, Edward W. Felten
New client puzzle outsourcing techniques for DoS resistance. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:246-256 [Conf]
- John G. Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung
Fourth-factor authentication: somebody you know. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2006, pp:168-178 [Conf]
- Ari Juels
The Outer Limits of RFID Security. [Citation Graph (0, 0)][DBLP] CHES, 2006, pp:231- [Conf]
- Markus Jakobsson, Ari Juels
Proofs of Work and Bread Pudding Protocols. [Citation Graph (0, 0)][DBLP] Communications and Multimedia Security, 1999, pp:258-272 [Conf]
- Ari Juels, Michael Luby, Rafail Ostrovsky
Security of Blind Digital Signatures (Extended Abstract). [Citation Graph (0, 0)][DBLP] CRYPTO, 1997, pp:150-164 [Conf]
- Ari Juels, Stephen A. Weis
Authenticating Pervasive Devices with Human Protocols. [Citation Graph (0, 0)][DBLP] CRYPTO, 2005, pp:293-308 [Conf]
- Ari Juels
Targeted Advertising ... And Privacy Too. [Citation Graph (0, 0)][DBLP] CT-RSA, 2001, pp:408-424 [Conf]
- Philippe Golle, Markus Jakobsson, Ari Juels, Paul F. Syverson
Universal Re-encryption for Mixnets. [Citation Graph (0, 0)][DBLP] CT-RSA, 2004, pp:163-178 [Conf]
- Markus Jakobsson, Ari Juels, Phong Q. Nguyen
Proprietary Certificates. [Citation Graph (0, 0)][DBLP] CT-RSA, 2002, pp:164-181 [Conf]
- Philippe Golle, Ari Juels
Dining Cryptographers Revisited. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 2004, pp:456-473 [Conf]
- Markus Jakobsson, Ari Juels
X-Cash: Executable Digital Cash. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 1998, pp:16-27 [Conf]
- Ari Juels
Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 1999, pp:29-45 [Conf]
- Ari Juels, Ravikanth Pappu
Squealing Euros: Privacy Protection in RFID-Enabled Banknotes. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2003, pp:103-121 [Conf]
- Ari Juels, Michael Szydlo
A Two-Server, Sealed-Bid Auction Protocol. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2002, pp:72-86 [Conf]
- Ari Juels, John G. Brainard
Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks. [Citation Graph (0, 0)][DBLP] NDSS, 1999, pp:- [Conf]
- Ari Juels, Martin Wattenberg
Stochastic Hillclimbing as a Baseline Mathod for Evaluating Genetic Algorithms. [Citation Graph (0, 0)][DBLP] NIPS, 1995, pp:430-436 [Conf]
- Ari Juels
"Yoking-Proofs" for RFID Tags. [Citation Graph (0, 0)][DBLP] PerCom Workshops, 2004, pp:138-143 [Conf]
- Ari Juels, Paul F. Syverson, Daniel V. Bailey
High-Power Proxies for Enhancing RFID Privacy and Utility. [Citation Graph (0, 0)][DBLP] Privacy Enhancing Technologies, 2005, pp:210-226 [Conf]
- Ari Juels, Jorge Guajardo
RSA Key Generation with Verifiable Randomness. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2002, pp:357-374 [Conf]
- Markus Jakobsson, Ari Juels
An optimally robust hybrid mix network. [Citation Graph (0, 0)][DBLP] PODC, 2001, pp:284-292 [Conf]
- Ari Juels
Minimalist Cryptography for Low-Cost RFID Tags. [Citation Graph (0, 0)][DBLP] SCN, 2004, pp:149-164 [Conf]
- Daniel V. Bailey, Ari Juels
Shoehorning Security into the EPC Tag Standard. [Citation Graph (0, 0)][DBLP] SCN, 2006, pp:303-320 [Conf]
- Ari Juels, Marcus Peinado
Hiding Cliques for Cryptographic Security. [Citation Graph (0, 0)][DBLP] SODA, 1998, pp:678-684 [Conf]
- Ari Juels, Markus Jakobsson, Tom N. Jagatic
Cache Cookies for Browser Authentication (Extended Abstract). [Citation Graph (0, 0)][DBLP] S&P, 2006, pp:301-305 [Conf]
- Markus Jakobsson, Ari Juels, Ronald L. Rivest
Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking. [Citation Graph (0, 0)][DBLP] USENIX Security Symposium, 2002, pp:339-353 [Conf]
- Ari Juels
RFID: Security and Privacy for Five-Cent Computers. [Citation Graph (0, 0)][DBLP] USENIX Security Symposium, 2004, pp:- [Conf]
- Ari Juels, John G. Brainard
Soft blocking: flexible blocker tags on the cheap. [Citation Graph (0, 0)][DBLP] WPES, 2004, pp:1-7 [Conf]
- Ari Juels, Dario Catalano, Markus Jakobsson
Coercion-resistant electronic elections. [Citation Graph (0, 0)][DBLP] WPES, 2005, pp:61-70 [Conf]
- Ari Juels
RFID: security and privacy for five-cent wireless devices. [Citation Graph (0, 0)][DBLP] Workshop on Wireless Security, 2004, pp:31- [Conf]
- Ari Juels, Marcus Peinado
Hiding Cliques for Cryptographic Security. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2000, v:20, n:3, pp:269-280 [Journal]
- Ari Juels, Madhu Sudan
A Fuzzy Vault Scheme. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2006, v:38, n:2, pp:237-257 [Journal]
- Simson L. Garfinkel, Ari Juels, Ravikanth Pappu
RFID Privacy: An Overview of Problems and Proposed Solutions. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2005, v:3, n:3, pp:34-43 [Journal]
- Ari Juels, Markus Jakobsson, Elizabeth A. M. Shriver, Bruce Hillyer
How to turn loaded dice into fair coins. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2000, v:46, n:3, pp:911-921 [Journal]
- Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, Moti Yung
Two-Party Computing with Encrypted Data. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2007, pp:298-314 [Conf]
Pors: proofs of retrievability for large files. [Citation Graph (, )][DBLP]
Covert channels in privacy-preserving identification systems. [Citation Graph (, )][DBLP]
HAIL: a high-availability and integrity layer for cloud storage. [Citation Graph (, )][DBLP]
EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond. [Citation Graph (, )][DBLP]
A Clean-Slate Look at Disk Scrubbing. [Citation Graph (, )][DBLP]
Vulnerabilities in First-Generation RFID-enabled Credit Cards. [Citation Graph (, )][DBLP]
Defining Strong Privacy for RFID. [Citation Graph (, )][DBLP]
Cryptanalysis of Two Lightweight RFID Authentication Schemes. [Citation Graph (, )][DBLP]
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security. [Citation Graph (, )][DBLP]
Strengthening EPC tags against cloning. [Citation Graph (, )][DBLP]
RFID security: in the shoulder and on the loading dock. [Citation Graph (, )][DBLP]
RFID security and privacy: long-term research or short-term tinkering? [Citation Graph (, )][DBLP]
Coercion-Resistant Electronic Elections. [Citation Graph (, )][DBLP]
Future tense. [Citation Graph (, )][DBLP]
Search in 0.026secs, Finished in 0.029secs
|