Ari Juels
Ari Juels
Professor, Computer Science, Cornell Tech (Jacobs); Co-Director, IC3
Adresse e-mail validée de cornell.edu - Page d'accueil
Titre
Citée par
Citée par
Année
RFID security and privacy: A research survey
A Juels
IEEE journal on selected areas in communications 24 (2), 381-394, 2006
23982006
PORs: Proofs of retrievability for large files
A Juels, BS Kaliski Jr
Proceedings of the 14th ACM conference on Computer and communications …, 2007
22272007
A fuzzy vault scheme
A Juels, M Sudan
Designs, Codes and Cryptography 38 (2), 237-257, 2006
18612006
A fuzzy commitment scheme
A Juels, M Wattenberg
Proceedings of the 6th ACM conference on Computer and communications …, 1999
17991999
The blocker tag: selective blocking of RFID tags for consumer privacy
A Juels, RL Rivest, M Szydlo
Proceedings of the 10th ACM conference on Computer and communications …, 2003
12822003
HAIL: A high-availability and integrity layer for cloud storage
KD Bowers, A Juels, A Oprea
Proceedings of the 16th ACM conference on Computer and communications …, 2009
12252009
Authenticating pervasive devices with human protocols
A Juels, SA Weis
Annual international cryptology conference, 293-308, 2005
8652005
On scaling decentralized blockchains
K Croman, C Decker, I Eyal, AE Gencer, A Juels, A Kosba, A Miller, ...
International conference on financial cryptography and data security, 106-125, 2016
8452016
Client puzzles: A cryptographic countermeasure against connection depletion attacks
A Juels
Proc. Networks and Distributed System Security Symposium (NDSS), 1999, 1999
8431999
Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks
A Juels, J Brainard
Proceedings of the Network and Distributed System Security Symposium 1999 …, 1999
8431999
Cross-VM side channels and their use to extract private keys
Y Zhang, A Juels, MK Reiter, T Ristenpart
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
7962012
Proofs of retrievability: Theory and implementation
KD Bowers, A Juels, A Oprea
Proceedings of the 2009 ACM workshop on Cloud computing security, 43-54, 2009
6922009
RFID privacy: An overview of problems and proposed solutions
SL Garfinkel, A Juels, R Pappu
IEEE Security & Privacy 3 (3), 34-43, 2005
6872005
Minimalist cryptography for low-cost RFID tags
A Juels
International conference on security in communication networks, 149-164, 2004
6652004
Coercion-resistant electronic elections
A Juels, D Catalano, M Jakobsson
Towards Trustworthy Elections, 37-63, 2010
6592010
Coercion-resistant electronic elections
A Juels, D Catalano, M Jakobsson
Towards Trustworthy Elections, 37-63, 2010
6592010
Stealing machine learning models via prediction apis
F Tramèr, F Zhang, A Juels, MK Reiter, T Ristenpart
25th {USENIX} Security Symposium ({USENIX} Security 16), 601-618, 2016
6282016
Squealing Euros: Privacy Protection in RFID-Enabled Banknotes
A Juels, R Pappu
Financial Cryptography, Lecture Notes in Computer Science 2742, 103-121, 2004
5862004
Universal re-encryption for mixnets
P Golle, M Jakobsson, A Juels, P Syverson
Cryptographers’ Track at the RSA Conference, 163-178, 2004
5332004
Defining strong privacy for RFID
A Juels, SA Weis
ACM Transactions on Information and System Security (TISSEC) 13 (1), 1-23, 2009
5212009
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20