Ari Juels
Ari Juels
Professor, Computer Science, Cornell Tech (Jacobs); Co-Director, IC3
Bestätigte E-Mail-Adresse bei cornell.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
RFID security and privacy: A research survey
A Juels
IEEE journal on selected areas in communications 24 (2), 381-394, 2006
24122006
PORs: Proofs of retrievability for large files
A Juels, BS Kaliski Jr
Proceedings of the 14th ACM conference on Computer and communications …, 2007
22682007
A fuzzy vault scheme
A Juels, M Sudan
Designs, Codes and Cryptography 38 (2), 237-257, 2006
18722006
A fuzzy commitment scheme
A Juels, M Wattenberg
Proceedings of the 6th ACM conference on Computer and communications …, 1999
18201999
The blocker tag: selective blocking of RFID tags for consumer privacy
A Juels, RL Rivest, M Szydlo
Proceedings of the 10th ACM conference on Computer and communications …, 2003
12862003
HAIL: A high-availability and integrity layer for cloud storage
KD Bowers, A Juels, A Oprea
Proceedings of the 16th ACM conference on Computer and communications …, 2009
12362009
Authenticating pervasive devices with human protocols
A Juels, SA Weis
Annual international cryptology conference, 293-308, 2005
8692005
On scaling decentralized blockchains
K Croman, C Decker, I Eyal, AE Gencer, A Juels, A Kosba, A Miller, ...
International conference on financial cryptography and data security, 106-125, 2016
8622016
Client puzzles: A cryptographic countermeasure against connection depletion attacks
A Juels
Proc. Networks and Distributed System Security Symposium (NDSS), 1999, 1999
8491999
Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks
A Juels, J Brainard
Proceedings of the Network and Distributed System Security Symposium 1999 …, 1999
8491999
Cross-VM side channels and their use to extract private keys
Y Zhang, A Juels, MK Reiter, T Ristenpart
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
7992012
Proofs of retrievability: Theory and implementation
KD Bowers, A Juels, A Oprea
Proceedings of the 2009 ACM workshop on Cloud computing security, 43-54, 2009
7032009
RFID privacy: An overview of problems and proposed solutions
SL Garfinkel, A Juels, R Pappu
IEEE Security & Privacy 3 (3), 34-43, 2005
6922005
Minimalist cryptography for low-cost RFID tags
A Juels
International conference on security in communication networks, 149-164, 2004
6692004
Stealing machine learning models via prediction apis
F Tramèr, F Zhang, A Juels, MK Reiter, T Ristenpart
25th {USENIX} Security Symposium ({USENIX} Security 16), 601-618, 2016
6682016
Coercion-resistant electronic elections
A Juels, D Catalano, M Jakobsson
Towards Trustworthy Elections, 37-63, 2010
6682010
Coercion-resistant electronic elections
A Juels, D Catalano, M Jakobsson
Towards Trustworthy Elections, 37-63, 2010
6682010
Squealing Euros: Privacy Protection in RFID-Enabled Banknotes
A Juels, R Pappu
Financial Cryptography, Lecture Notes in Computer Science 2742, 103-121, 2004
5882004
Universal re-encryption for mixnets
P Golle, M Jakobsson, A Juels, P Syverson
Cryptographers’ Track at the RSA Conference, 163-178, 2004
5352004
Defining strong privacy for RFID
A Juels, SA Weis
ACM Transactions on Information and System Security (TISSEC) 13 (1), 1-23, 2009
5232009
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20