| 2008 |
| 61 | EE | Ari Juels,
Ravikanth Pappu,
Bryan Parno:
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security.
USENIX Security Symposium 2008: 75-90 |
| 60 | EE | Ari Juels:
RFID security: in the shoulder and on the loading dock.
WISEC 2008: 1 |
| 59 | EE | Gene Tsudik,
Mike Burmester,
Ari Juels,
Alfred Kobsa,
David Molnar,
Roberto Di Pietro,
Melanie R. Rieback:
RFID security and privacy: long-term research or short-term tinkering?
WISEC 2008: 160 |
| 2007 |
| 58 | EE | Daniel V. Bailey,
Dan Boneh,
Eu-Jin Goh,
Ari Juels:
Covert channels in privacy-preserving identification systems.
ACM Conference on Computer and Communications Security 2007: 297-306 |
| 57 | EE | Ari Juels,
Burton S. Kaliski Jr.:
Pors: proofs of retrievability for large files.
ACM Conference on Computer and Communications Security 2007: 584-597 |
| 56 | EE | Seung Geol Choi,
Ariel Elbaz,
Ari Juels,
Tal Malkin,
Moti Yung:
Two-Party Computing with Encrypted Data.
ASIACRYPT 2007: 298-314 |
| 55 | EE | Thomas S. Heydt-Benjamin,
Daniel V. Bailey,
Kevin Fu,
Ari Juels,
Tom O'Hare:
Vulnerabilities in First-Generation RFID-enabled Credit Cards.
Financial Cryptography 2007: 2-14 |
| 54 | EE | Benessa Defend,
Kevin Fu,
Ari Juels:
Cryptanalysis of Two Lightweight RFID Authentication Schemes.
PerCom Workshops 2007: 211-216 |
| 53 | EE | Ari Juels,
Stephen A. Weis:
Defining Strong Privacy for RFID.
PerCom Workshops 2007: 342-347 |
| 2006 |
| 52 | | Ari Juels,
Rebecca N. Wright,
Sabrina De Capitani di Vimercati:
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30 - November 3, 2006
ACM 2006 |
| 51 | | Ari Juels,
Gene Tsudik,
Shouhuai Xu,
Moti Yung:
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006
ACM 2006 |
| 50 | | Ari Juels,
Marianne Winslett:
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, WPES 2006, Alexandria, VA, USA, October 30, 2006
ACM 2006 |
| 49 | | Radha Poovendran,
Ari Juels:
Proceedings of the 2006 ACM Workshop on Wireless Security, Los Angeles, California, USA, September 29, 2006
ACM 2006 |
| 48 | | Ari Juels,
Marianne Winslett,
Atsuhiro Goto:
Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria, VA, USA, November 3, 2006
ACM 2006 |
| 47 | | Ari Juels,
Ernesto Damiani,
Alban Gabillon:
Proceedings of the 3rd ACM Workshop On Secure Web Services, SWS 2006, Alexandria, VA, USA, November 3, 2006
ACM 2006 |
| 46 | EE | John G. Brainard,
Ari Juels,
Ronald L. Rivest,
Michael Szydlo,
Moti Yung:
Fourth-factor authentication: somebody you know.
ACM Conference on Computer and Communications Security 2006: 168-178 |
| 45 | EE | Ari Juels:
The Outer Limits of RFID Security.
CHES 2006: 231 |
| 44 | EE | Ari Juels,
Markus Jakobsson,
Tom N. Jagatic:
Cache Cookies for Browser Authentication (Extended Abstract).
IEEE Symposium on Security and Privacy 2006: 301-305 |
| 43 | EE | Daniel V. Bailey,
Ari Juels:
Shoehorning Security into the EPC Tag Standard.
SCN 2006: 303-320 |
| 42 | EE | Ari Juels,
Madhu Sudan:
A Fuzzy Vault Scheme.
Des. Codes Cryptography 38(2): 237-257 (2006) |
| 41 | EE | Ari Juels:
RFID security and privacy: a research survey.
IEEE Journal on Selected Areas in Communications 24(2): 381-394 (2006) |
| 2005 |
| 40 | | Vijay Atluri,
Catherine Meadows,
Ari Juels:
Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005
ACM 2005 |
| 39 | EE | Ari Juels,
Stephen A. Weis:
Authenticating Pervasive Devices with Human Protocols.
CRYPTO 2005: 293-308 |
| 38 | EE | Ari Juels,
Paul F. Syverson,
Daniel V. Bailey:
High-Power Proxies for Enhancing RFID Privacy and Utility.
Privacy Enhancing Technologies 2005: 210-226 |
| 37 | EE | Ari Juels,
Dario Catalano,
Markus Jakobsson:
Coercion-resistant electronic elections.
WPES 2005: 61-70 |
| 36 | EE | Ari Juels:
Strengthening EPC tags against cloning.
Workshop on Wireless Security 2005: 67-76 |
| 35 | EE | Simson L. Garfinkel,
Ari Juels,
Ravikanth Pappu:
RFID Privacy: An Overview of Problems and Proposed Solutions.
IEEE Security & Privacy 3(3): 34-43 (2005) |
| 2004 |
| 34 | | Ari Juels:
Financial Cryptography, 8th International Conference, FC 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers
Springer 2004 |
| 33 | EE | Philippe Golle,
Ari Juels:
Parallel mixing.
ACM Conference on Computer and Communications Security 2004: 220-226 |
| 32 | EE | Brent Waters,
Ari Juels,
J. Alex Halderman,
Edward W. Felten:
New client puzzle outsourcing techniques for DoS resistance.
ACM Conference on Computer and Communications Security 2004: 246-256 |
| 31 | EE | Philippe Golle,
Markus Jakobsson,
Ari Juels,
Paul F. Syverson:
Universal Re-encryption for Mixnets.
CT-RSA 2004: 163-178 |
| 30 | EE | Philippe Golle,
Ari Juels:
Dining Cryptographers Revisited.
EUROCRYPT 2004: 456-473 |
| 29 | EE | Ari Juels:
"Yoking-Proofs" for RFID Tags.
PerCom Workshops 2004: 138-143 |
| 28 | EE | Ari Juels:
Minimalist Cryptography for Low-Cost RFID Tags.
SCN 2004: 149-164 |
| 27 | EE | Ari Juels:
RFID: Security and Privacy for Five-Cent Computers.
USENIX Security Symposium 2004 |
| 26 | EE | Ari Juels,
John G. Brainard:
Soft blocking: flexible blocker tags on the cheap.
WPES 2004: 1-7 |
| 25 | EE | Ari Juels:
RFID: security and privacy for five-cent wireless devices.
Workshop on Wireless Security 2004: 31 |
| 2003 |
| 24 | EE | Ari Juels,
Ronald L. Rivest,
Michael Szydlo:
The blocker tag: selective blocking of RFID tags for consumer privacy.
ACM Conference on Computer and Communications Security 2003: 103-111 |
| 23 | EE | Ari Juels,
Ravikanth Pappu:
Squealing Euros: Privacy Protection in RFID-Enabled Banknotes.
Financial Cryptography 2003: 103-121 |
| 2002 |
| 22 | EE | Philippe Golle,
Sheng Zhong,
Dan Boneh,
Markus Jakobsson,
Ari Juels:
Optimistic Mixing for Exit-Polls.
ASIACRYPT 2002: 451-465 |
| 21 | EE | Markus Jakobsson,
Ari Juels,
Phong Q. Nguyen:
Proprietary Certificates.
CT-RSA 2002: 164-181 |
| 20 | EE | Ari Juels,
Michael Szydlo:
A Two-Server, Sealed-Bid Auction Protocol.
Financial Cryptography 2002: 72-86 |
| 19 | EE | Ari Juels,
Jorge Guajardo:
RSA Key Generation with Verifiable Randomness.
Public Key Cryptography 2002: 357-374 |
| 18 | EE | Markus Jakobsson,
Ari Juels,
Ronald L. Rivest:
Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking.
USENIX Security Symposium 2002: 339-353 |
| 2001 |
| 17 | EE | Niklas Frykholm,
Ari Juels:
Error-tolerant password recovery.
ACM Conference on Computer and Communications Security 2001: 1-9 |
| 16 | EE | Ari Juels:
Targeted Advertising ... And Privacy Too.
CT-RSA 2001: 408-424 |
| 15 | EE | Markus Jakobsson,
Ari Juels:
An optimally robust hybrid mix network.
PODC 2001: 284-292 |
| 2000 |
| 14 | EE | Johan Håstad,
Jakob Jonsson,
Ari Juels,
Moti Yung:
Funkspiel schemes: an alternative to conventional tamper resistance.
ACM Conference on Computer and Communications Security 2000: 125-133 |
| 13 | EE | Markus Jakobsson,
Ari Juels:
Mix and Match: Secure Function Evaluation via Ciphertexts.
ASIACRYPT 2000: 162-177 |
| 12 | EE | Markus Jakobsson,
Ari Juels:
Addition of ElGamal Plaintexts.
ASIACRYPT 2000: 346-358 |
| 11 | | Ari Juels,
Marcus Peinado:
Hiding Cliques for Cryptographic Security.
Des. Codes Cryptography 20(3): 269-280 (2000) |
| 10 | | Ari Juels,
Markus Jakobsson,
Elizabeth A. M. Shriver,
Bruce Hillyer:
How to turn loaded dice into fair coins.
IEEE Transactions on Information Theory 46(3): 911-921 (2000) |
| 1999 |
| 9 | EE | Ari Juels,
Martin Wattenberg:
A Fuzzy Commitment Scheme.
ACM Conference on Computer and Communications Security 1999: 28-36 |
| 8 | | Markus Jakobsson,
Ari Juels:
Proofs of Work and Bread Pudding Protocols.
Communications and Multimedia Security 1999: 258-272 |
| 7 | EE | Ari Juels:
Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing.
Financial Cryptography 1999: 29-45 |
| 6 | EE | Ari Juels,
John G. Brainard:
Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks.
NDSS 1999 |
| 1998 |
| 5 | EE | Markus Jakobsson,
Elizabeth A. M. Shriver,
Bruce Hillyer,
Ari Juels:
A Practical Secure Physical Random Bit Generator.
ACM Conference on Computer and Communications Security 1998: 103-111 |
| 4 | EE | Markus Jakobsson,
Ari Juels:
X-Cash: Executable Digital Cash.
Financial Cryptography 1998: 16-27 |
| 3 | | Ari Juels,
Marcus Peinado:
Hiding Cliques for Cryptographic Security.
SODA 1998: 678-684 |
| 1997 |
| 2 | EE | Ari Juels,
Michael Luby,
Rafail Ostrovsky:
Security of Blind Digital Signatures (Extended Abstract).
CRYPTO 1997: 150-164 |
| 1995 |
| 1 | EE | Ari Juels,
Martin Wattenberg:
Stochastic Hillclimbing as a Baseline Mathod for Evaluating Genetic Algorithms.
NIPS 1995: 430-436 |