The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ari Juels: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Markus Jakobsson, Ari Juels
    Mix and Match: Secure Function Evaluation via Ciphertexts. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:162-177 [Conf]
  2. Markus Jakobsson, Ari Juels
    Addition of ElGamal Plaintexts. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:346-358 [Conf]
  3. Philippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, Ari Juels
    Optimistic Mixing for Exit-Polls. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:451-465 [Conf]
  4. Niklas Frykholm, Ari Juels
    Error-tolerant password recovery. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:1-9 [Conf]
  5. Philippe Golle, Ari Juels
    Parallel mixing. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:220-226 [Conf]
  6. Johan Håstad, Jakob Jonsson, Ari Juels, Moti Yung
    Funkspiel schemes: an alternative to conventional tamper resistance. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:125-133 [Conf]
  7. Markus Jakobsson, Elizabeth A. M. Shriver, Bruce Hillyer, Ari Juels
    A Practical Secure Physical Random Bit Generator. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:103-111 [Conf]
  8. Ari Juels, Ronald L. Rivest, Michael Szydlo
    The blocker tag: selective blocking of RFID tags for consumer privacy. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:103-111 [Conf]
  9. Ari Juels, Martin Wattenberg
    A Fuzzy Commitment Scheme. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:28-36 [Conf]
  10. Brent Waters, Ari Juels, J. Alex Halderman, Edward W. Felten
    New client puzzle outsourcing techniques for DoS resistance. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:246-256 [Conf]
  11. John G. Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung
    Fourth-factor authentication: somebody you know. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:168-178 [Conf]
  12. Ari Juels
    The Outer Limits of RFID Security. [Citation Graph (0, 0)][DBLP]
    CHES, 2006, pp:231- [Conf]
  13. Markus Jakobsson, Ari Juels
    Proofs of Work and Bread Pudding Protocols. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 1999, pp:258-272 [Conf]
  14. Ari Juels, Michael Luby, Rafail Ostrovsky
    Security of Blind Digital Signatures (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:150-164 [Conf]
  15. Ari Juels, Stephen A. Weis
    Authenticating Pervasive Devices with Human Protocols. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:293-308 [Conf]
  16. Ari Juels
    Targeted Advertising ... And Privacy Too. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2001, pp:408-424 [Conf]
  17. Philippe Golle, Markus Jakobsson, Ari Juels, Paul F. Syverson
    Universal Re-encryption for Mixnets. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:163-178 [Conf]
  18. Markus Jakobsson, Ari Juels, Phong Q. Nguyen
    Proprietary Certificates. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:164-181 [Conf]
  19. Philippe Golle, Ari Juels
    Dining Cryptographers Revisited. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2004, pp:456-473 [Conf]
  20. Markus Jakobsson, Ari Juels
    X-Cash: Executable Digital Cash. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1998, pp:16-27 [Conf]
  21. Ari Juels
    Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1999, pp:29-45 [Conf]
  22. Ari Juels, Ravikanth Pappu
    Squealing Euros: Privacy Protection in RFID-Enabled Banknotes. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2003, pp:103-121 [Conf]
  23. Ari Juels, Michael Szydlo
    A Two-Server, Sealed-Bid Auction Protocol. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:72-86 [Conf]
  24. Ari Juels, John G. Brainard
    Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks. [Citation Graph (0, 0)][DBLP]
    NDSS, 1999, pp:- [Conf]
  25. Ari Juels, Martin Wattenberg
    Stochastic Hillclimbing as a Baseline Mathod for Evaluating Genetic Algorithms. [Citation Graph (0, 0)][DBLP]
    NIPS, 1995, pp:430-436 [Conf]
  26. Ari Juels
    "Yoking-Proofs" for RFID Tags. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2004, pp:138-143 [Conf]
  27. Ari Juels, Paul F. Syverson, Daniel V. Bailey
    High-Power Proxies for Enhancing RFID Privacy and Utility. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2005, pp:210-226 [Conf]
  28. Ari Juels, Jorge Guajardo
    RSA Key Generation with Verifiable Randomness. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:357-374 [Conf]
  29. Markus Jakobsson, Ari Juels
    An optimally robust hybrid mix network. [Citation Graph (0, 0)][DBLP]
    PODC, 2001, pp:284-292 [Conf]
  30. Ari Juels
    Minimalist Cryptography for Low-Cost RFID Tags. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:149-164 [Conf]
  31. Daniel V. Bailey, Ari Juels
    Shoehorning Security into the EPC Tag Standard. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:303-320 [Conf]
  32. Ari Juels, Marcus Peinado
    Hiding Cliques for Cryptographic Security. [Citation Graph (0, 0)][DBLP]
    SODA, 1998, pp:678-684 [Conf]
  33. Ari Juels, Markus Jakobsson, Tom N. Jagatic
    Cache Cookies for Browser Authentication (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:301-305 [Conf]
  34. Markus Jakobsson, Ari Juels, Ronald L. Rivest
    Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2002, pp:339-353 [Conf]
  35. Ari Juels
    RFID: Security and Privacy for Five-Cent Computers. [Citation Graph (0, 0)][DBLP]
    USENIX Security Symposium, 2004, pp:- [Conf]
  36. Ari Juels, John G. Brainard
    Soft blocking: flexible blocker tags on the cheap. [Citation Graph (0, 0)][DBLP]
    WPES, 2004, pp:1-7 [Conf]
  37. Ari Juels, Dario Catalano, Markus Jakobsson
    Coercion-resistant electronic elections. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:61-70 [Conf]
  38. Ari Juels
    RFID: security and privacy for five-cent wireless devices. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2004, pp:31- [Conf]
  39. Ari Juels, Marcus Peinado
    Hiding Cliques for Cryptographic Security. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2000, v:20, n:3, pp:269-280 [Journal]
  40. Ari Juels, Madhu Sudan
    A Fuzzy Vault Scheme. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:38, n:2, pp:237-257 [Journal]
  41. Simson L. Garfinkel, Ari Juels, Ravikanth Pappu
    RFID Privacy: An Overview of Problems and Proposed Solutions. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:3, pp:34-43 [Journal]
  42. Ari Juels, Markus Jakobsson, Elizabeth A. M. Shriver, Bruce Hillyer
    How to turn loaded dice into fair coins. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2000, v:46, n:3, pp:911-921 [Journal]
  43. Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, Moti Yung
    Two-Party Computing with Encrypted Data. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:298-314 [Conf]

  44. Pors: proofs of retrievability for large files. [Citation Graph (, )][DBLP]


  45. Covert channels in privacy-preserving identification systems. [Citation Graph (, )][DBLP]


  46. HAIL: a high-availability and integrity layer for cloud storage. [Citation Graph (, )][DBLP]


  47. EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond. [Citation Graph (, )][DBLP]


  48. A Clean-Slate Look at Disk Scrubbing. [Citation Graph (, )][DBLP]


  49. Vulnerabilities in First-Generation RFID-enabled Credit Cards. [Citation Graph (, )][DBLP]


  50. Defining Strong Privacy for RFID. [Citation Graph (, )][DBLP]


  51. Cryptanalysis of Two Lightweight RFID Authentication Schemes. [Citation Graph (, )][DBLP]


  52. Unidirectional Key Distribution Across Time and Space with Applications to RFID Security. [Citation Graph (, )][DBLP]


  53. Strengthening EPC tags against cloning. [Citation Graph (, )][DBLP]


  54. RFID security: in the shoulder and on the loading dock. [Citation Graph (, )][DBLP]


  55. RFID security and privacy: long-term research or short-term tinkering? [Citation Graph (, )][DBLP]


  56. Coercion-Resistant Electronic Elections. [Citation Graph (, )][DBLP]


  57. Future tense. [Citation Graph (, )][DBLP]


Search in 0.076secs, Finished in 0.079secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002