2007 |
8 | EE | Daniel V. Bailey,
Dan Boneh,
Eu-Jin Goh,
Ari Juels:
Covert channels in privacy-preserving identification systems.
ACM Conference on Computer and Communications Security 2007: 297-306 |
7 | EE | Thomas S. Heydt-Benjamin,
Daniel V. Bailey,
Kevin Fu,
Ari Juels,
Tom O'Hare:
Vulnerabilities in First-Generation RFID-enabled Credit Cards.
Financial Cryptography 2007: 2-14 |
2006 |
6 | EE | Daniel V. Bailey,
Ari Juels:
Shoehorning Security into the EPC Tag Standard.
SCN 2006: 303-320 |
2005 |
5 | EE | Ari Juels,
Paul F. Syverson,
Daniel V. Bailey:
High-Power Proxies for Enhancing RFID Privacy and Utility.
Privacy Enhancing Technologies 2005: 210-226 |
2001 |
4 | EE | Daniel V. Bailey,
Daniel Coffin,
Adam J. Elbirt,
Joseph H. Silverman,
Adam D. Woodbury:
NTRU in Constrained Devices.
CHES 2001: 262-272 |
3 | EE | Daniel V. Bailey,
Christof Paar:
Efficient Arithmetic in Finite Field Extensions with Application in Elliptic Curve Cryptography.
J. Cryptology 14(3): 153-176 (2001) |
2000 |
2 | | Adam D. Woodbury,
Daniel V. Bailey,
Christof Paar:
Elliptic Curve Cryptography on Smart Cards without Coprocessors.
CARDIS 2000: 71-92 |
1998 |
1 | EE | Daniel V. Bailey,
Christof Paar:
Optimal Extension Fields for Fast Arithmetic in Public-Key Algorithms.
CRYPTO 1998: 472-485 |