dblp.uni-trier.dewww.uni-trier.de

Ari Juels

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
61EEAri Juels, Ravikanth Pappu, Bryan Parno: Unidirectional Key Distribution Across Time and Space with Applications to RFID Security. USENIX Security Symposium 2008: 75-90
60EEAri Juels: RFID security: in the shoulder and on the loading dock. WISEC 2008: 1
59EEGene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, Melanie R. Rieback: RFID security and privacy: long-term research or short-term tinkering? WISEC 2008: 160
2007
58EEDaniel V. Bailey, Dan Boneh, Eu-Jin Goh, Ari Juels: Covert channels in privacy-preserving identification systems. ACM Conference on Computer and Communications Security 2007: 297-306
57EEAri Juels, Burton S. Kaliski Jr.: Pors: proofs of retrievability for large files. ACM Conference on Computer and Communications Security 2007: 584-597
56EESeung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, Moti Yung: Two-Party Computing with Encrypted Data. ASIACRYPT 2007: 298-314
55EEThomas S. Heydt-Benjamin, Daniel V. Bailey, Kevin Fu, Ari Juels, Tom O'Hare: Vulnerabilities in First-Generation RFID-enabled Credit Cards. Financial Cryptography 2007: 2-14
54EEBenessa Defend, Kevin Fu, Ari Juels: Cryptanalysis of Two Lightweight RFID Authentication Schemes. PerCom Workshops 2007: 211-216
53EEAri Juels, Stephen A. Weis: Defining Strong Privacy for RFID. PerCom Workshops 2007: 342-347
2006
52 Ari Juels, Rebecca N. Wright, Sabrina De Capitani di Vimercati: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30 - November 3, 2006 ACM 2006
51 Ari Juels, Gene Tsudik, Shouhuai Xu, Moti Yung: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006 ACM 2006
50 Ari Juels, Marianne Winslett: Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, WPES 2006, Alexandria, VA, USA, October 30, 2006 ACM 2006
49 Radha Poovendran, Ari Juels: Proceedings of the 2006 ACM Workshop on Wireless Security, Los Angeles, California, USA, September 29, 2006 ACM 2006
48 Ari Juels, Marianne Winslett, Atsuhiro Goto: Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria, VA, USA, November 3, 2006 ACM 2006
47 Ari Juels, Ernesto Damiani, Alban Gabillon: Proceedings of the 3rd ACM Workshop On Secure Web Services, SWS 2006, Alexandria, VA, USA, November 3, 2006 ACM 2006
46EEJohn G. Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung: Fourth-factor authentication: somebody you know. ACM Conference on Computer and Communications Security 2006: 168-178
45EEAri Juels: The Outer Limits of RFID Security. CHES 2006: 231
44EEAri Juels, Markus Jakobsson, Tom N. Jagatic: Cache Cookies for Browser Authentication (Extended Abstract). IEEE Symposium on Security and Privacy 2006: 301-305
43EEDaniel V. Bailey, Ari Juels: Shoehorning Security into the EPC Tag Standard. SCN 2006: 303-320
42EEAri Juels, Madhu Sudan: A Fuzzy Vault Scheme. Des. Codes Cryptography 38(2): 237-257 (2006)
41EEAri Juels: RFID security and privacy: a research survey. IEEE Journal on Selected Areas in Communications 24(2): 381-394 (2006)
2005
40 Vijay Atluri, Catherine Meadows, Ari Juels: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005 ACM 2005
39EEAri Juels, Stephen A. Weis: Authenticating Pervasive Devices with Human Protocols. CRYPTO 2005: 293-308
38EEAri Juels, Paul F. Syverson, Daniel V. Bailey: High-Power Proxies for Enhancing RFID Privacy and Utility. Privacy Enhancing Technologies 2005: 210-226
37EEAri Juels, Dario Catalano, Markus Jakobsson: Coercion-resistant electronic elections. WPES 2005: 61-70
36EEAri Juels: Strengthening EPC tags against cloning. Workshop on Wireless Security 2005: 67-76
35EESimson L. Garfinkel, Ari Juels, Ravikanth Pappu: RFID Privacy: An Overview of Problems and Proposed Solutions. IEEE Security & Privacy 3(3): 34-43 (2005)
2004
34 Ari Juels: Financial Cryptography, 8th International Conference, FC 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers Springer 2004
33EEPhilippe Golle, Ari Juels: Parallel mixing. ACM Conference on Computer and Communications Security 2004: 220-226
32EEBrent Waters, Ari Juels, J. Alex Halderman, Edward W. Felten: New client puzzle outsourcing techniques for DoS resistance. ACM Conference on Computer and Communications Security 2004: 246-256
31EEPhilippe Golle, Markus Jakobsson, Ari Juels, Paul F. Syverson: Universal Re-encryption for Mixnets. CT-RSA 2004: 163-178
30EEPhilippe Golle, Ari Juels: Dining Cryptographers Revisited. EUROCRYPT 2004: 456-473
29EEAri Juels: "Yoking-Proofs" for RFID Tags. PerCom Workshops 2004: 138-143
28EEAri Juels: Minimalist Cryptography for Low-Cost RFID Tags. SCN 2004: 149-164
27EEAri Juels: RFID: Security and Privacy for Five-Cent Computers. USENIX Security Symposium 2004
26EEAri Juels, John G. Brainard: Soft blocking: flexible blocker tags on the cheap. WPES 2004: 1-7
25EEAri Juels: RFID: security and privacy for five-cent wireless devices. Workshop on Wireless Security 2004: 31
2003
24EEAri Juels, Ronald L. Rivest, Michael Szydlo: The blocker tag: selective blocking of RFID tags for consumer privacy. ACM Conference on Computer and Communications Security 2003: 103-111
23EEAri Juels, Ravikanth Pappu: Squealing Euros: Privacy Protection in RFID-Enabled Banknotes. Financial Cryptography 2003: 103-121
2002
22EEPhilippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, Ari Juels: Optimistic Mixing for Exit-Polls. ASIACRYPT 2002: 451-465
21EEMarkus Jakobsson, Ari Juels, Phong Q. Nguyen: Proprietary Certificates. CT-RSA 2002: 164-181
20EEAri Juels, Michael Szydlo: A Two-Server, Sealed-Bid Auction Protocol. Financial Cryptography 2002: 72-86
19EEAri Juels, Jorge Guajardo: RSA Key Generation with Verifiable Randomness. Public Key Cryptography 2002: 357-374
18EEMarkus Jakobsson, Ari Juels, Ronald L. Rivest: Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking. USENIX Security Symposium 2002: 339-353
2001
17EENiklas Frykholm, Ari Juels: Error-tolerant password recovery. ACM Conference on Computer and Communications Security 2001: 1-9
16EEAri Juels: Targeted Advertising ... And Privacy Too. CT-RSA 2001: 408-424
15EEMarkus Jakobsson, Ari Juels: An optimally robust hybrid mix network. PODC 2001: 284-292
2000
14EEJohan Håstad, Jakob Jonsson, Ari Juels, Moti Yung: Funkspiel schemes: an alternative to conventional tamper resistance. ACM Conference on Computer and Communications Security 2000: 125-133
13EEMarkus Jakobsson, Ari Juels: Mix and Match: Secure Function Evaluation via Ciphertexts. ASIACRYPT 2000: 162-177
12EEMarkus Jakobsson, Ari Juels: Addition of ElGamal Plaintexts. ASIACRYPT 2000: 346-358
11 Ari Juels, Marcus Peinado: Hiding Cliques for Cryptographic Security. Des. Codes Cryptography 20(3): 269-280 (2000)
10 Ari Juels, Markus Jakobsson, Elizabeth A. M. Shriver, Bruce Hillyer: How to turn loaded dice into fair coins. IEEE Transactions on Information Theory 46(3): 911-921 (2000)
1999
9EEAri Juels, Martin Wattenberg: A Fuzzy Commitment Scheme. ACM Conference on Computer and Communications Security 1999: 28-36
8 Markus Jakobsson, Ari Juels: Proofs of Work and Bread Pudding Protocols. Communications and Multimedia Security 1999: 258-272
7EEAri Juels: Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing. Financial Cryptography 1999: 29-45
6EEAri Juels, John G. Brainard: Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks. NDSS 1999
1998
5EEMarkus Jakobsson, Elizabeth A. M. Shriver, Bruce Hillyer, Ari Juels: A Practical Secure Physical Random Bit Generator. ACM Conference on Computer and Communications Security 1998: 103-111
4EEMarkus Jakobsson, Ari Juels: X-Cash: Executable Digital Cash. Financial Cryptography 1998: 16-27
3 Ari Juels, Marcus Peinado: Hiding Cliques for Cryptographic Security. SODA 1998: 678-684
1997
2EEAri Juels, Michael Luby, Rafail Ostrovsky: Security of Blind Digital Signatures (Extended Abstract). CRYPTO 1997: 150-164
1995
1EEAri Juels, Martin Wattenberg: Stochastic Hillclimbing as a Baseline Mathod for Evaluating Genetic Algorithms. NIPS 1995: 430-436

Coauthor Index

1Vijayalakshmi Atluri (Vijay Atluri) [40]
2Daniel V. Bailey [38] [43] [55] [58]
3Dan Boneh [22] [58]
4John G. Brainard [6] [26] [46]
5Mike Burmester [59]
6Dario Catalano [37]
7Seung Geol Choi [56]
8Ernesto Damiani [47]
9Benessa Defend [54]
10Ariel Elbaz [56]
11Edward W. Felten [32]
12Niklas Frykholm [17]
13Kevin Fu [54] [55]
14Alban Gabillon [47]
15Simson L. Garfinkel [35]
16Eu-Jin Goh [58]
17Philippe Golle [22] [30] [31] [33]
18Atsuhiro Goto [48]
19Jorge Guajardo [19]
20J. Alex Halderman (John A. Halderman) [32]
21Johan Håstad [14]
22Thomas S. Heydt-Benjamin [55]
23Bruce Hillyer [5] [10]
24Tom N. Jagatic [44]
25Markus Jakobsson [4] [5] [8] [10] [12] [13] [15] [18] [21] [22] [31] [37] [44]
26Jakob Jonsson [14]
27Burton S. Kaliski Jr. [57]
28Alfred Kobsa [59]
29Michael Luby [2]
30Tal Malkin [56]
31Catherine Meadows [40]
32David Molnar [59]
33Phong Q. Nguyen [21]
34Tom O'Hare [55]
35Rafail Ostrovsky [2]
36Ravikanth Pappu [23] [35] [61]
37Bryan Parno [61]
38Marcus Peinado [3] [11]
39Roberto Di Pietro [59]
40Radha Poovendran [49]
41Melanie R. Rieback [59]
42Ronald L. Rivest [18] [24] [46]
43Elizabeth A. M. Shriver [5] [10]
44Madhu Sudan [42]
45Paul F. Syverson [31] [38]
46Michael Szydlo [20] [24] [46]
47Gene Tsudik [51] [59]
48Sabrina De Capitani di Vimercati [52]
49Brent Waters (Brent R. Waters) [32]
50Martin Wattenberg [1] [9]
51Stephen A. Weis [39] [53]
52Marianne Winslett [48] [50]
53Rebecca N. Wright [52]
54Shouhuai Xu [51]
55Moti Yung (Mordechai M. Yung) [14] [46] [51] [56]
56Sheng Zhong [22]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)