


Остановите войну!
for scientists:
Ari Juels
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [i48]Weizhao Tang, Lucianna Kiffer, Giulia Fanti, Ari Juels:
Strategic Latency Reduction in Blockchain Peer-to-Peer Networks. CoRR abs/2205.06837 (2022) - 2021
- [c117]Charlie Hou, Mingxun Zhou, Yan Ji, Phil Daian, Florian Tramèr, Giulia Fanti, Ari Juels:
SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning. NDSS 2021 - [c116]Deepak Maram
, Harjasleen Malvai, Fan Zhang
, Nerla Jean-Louis, Alexander Frolov, Tyler Kell, Tyrone Lobban, Christine Moy, Ari Juels, Andrew Miller:
CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability. IEEE Symposium on Security and Privacy 2021: 1348-1366 - [i47]Tyler Kell, Haaroon Yousaf, Sarah Allen, Sarah Meiklejohn, Ari Juels:
Forsage: Anatomy of a Smart-Contract Pyramid Scheme. CoRR abs/2105.04380 (2021) - [i46]Kushal Babel, Philip Daian, Mahimna Kelkar, Ari Juels:
Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts. CoRR abs/2109.04347 (2021) - [i45]Deepak Maram, Iddo Bentov, Mahimna Kelkar, Ari Juels:
GoAT: File Geolocation via Anchor Timestamping. IACR Cryptol. ePrint Arch. 2021: 697 (2021) - [i44]Kushal Babel, Philip Daian, Mahimna Kelkar, Ari Juels:
Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts. IACR Cryptol. ePrint Arch. 2021: 1147 (2021) - [i43]Mahimna Kelkar, Soubhik Deb, Sishan Long, Ari Juels, Sreeram Kannan:
Themis: Fast, Strong Order-Fairness in Byzantine Consensus. IACR Cryptol. ePrint Arch. 2021: 1465 (2021) - 2020
- [j18]Fan Zhang
, Warren He, Raymond Cheng, Jernej Kos, Nicholas Hynes, Noah M. Johnson, Ari Juels, Andrew Miller, Dawn Song:
The Ekiden Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts. IEEE Secur. Priv. 18(3): 17-27 (2020) - [c115]Michael Mirkin, Yan Ji, Jonathan Pang, Ariah Klages-Mundt, Ittay Eyal, Ari Juels:
BDoS: Blockchain Denial-of-Service. CCS 2020: 601-619 - [c114]Fan Zhang, Deepak Maram
, Harjasleen Malvai, Steven Goldfeder, Ari Juels:
DECO: Liberating Web Data Using Decentralized Oracles for TLS. CCS 2020: 1919-1938 - [c113]Mahimna Kelkar, Fan Zhang, Steven Goldfeder, Ari Juels:
Order-Fairness for Byzantine Consensus. CRYPTO (3) 2020: 451-480 - [c112]Philip Daian, Steven Goldfeder, Tyler Kell, Yunqi Li, Xueyuan Zhao, Iddo Bentov, Lorenz Breidenbach, Ari Juels:
Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability. IEEE Symposium on Security and Privacy 2020: 910-927 - [i42]Mahimna Kelkar, Fan Zhang, Steven Goldfeder, Ari Juels:
Order-Fairness for Byzantine Consensus. IACR Cryptol. ePrint Arch. 2020: 269 (2020) - [i41]Deepak Maram, Harjasleen Malvai, Fan Zhang, Nerla Jean-Louis, Alexander Frolov, Tyler Kell, Tyrone Lobban, Christine Moy, Ari Juels, Andrew Miller:
CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability. IACR Cryptol. ePrint Arch. 2020: 934 (2020)
2010 – 2019
- 2019
- [j17]Moritz Schneider
, Sinisa Matetic, Ari Juels, Andrew Miller, Srdjan Capkun:
Secure Brokered Delegation Through DelegaTEE. IEEE Secur. Priv. 17(4): 43-52 (2019) - [j16]Lorenz Breidenbach, Philip Daian
, Florian Tramèr, Ari Juels:
The Hydra Framework for Principled, Automated Bug Bounties. IEEE Secur. Priv. 17(4): 53-61 (2019) - [c111]Fan Zhang, Philip Daian, Iddo Bentov, Ian Miers, Ari Juels:
Paralysis Proofs: Secure Dynamic Access Structures for Cryptocurrency Custody and More. AFT 2019: 1-15 - [c110]Rahul Chatterjee, M. Sadegh Riazi, Tanmoy Chowdhury, Emanuela Marasco, Farinaz Koushanfar
, Ari Juels:
Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms. CCS 2019: 1171-1186 - [c109]Ethan Cecchetti
, Ben Fisch, Ian Miers, Ari Juels:
PIEs: Public Incompressible Encodings for Decentralized Storage. CCS 2019: 1351-1367 - [c108]Iddo Bentov, Yan Ji, Fan Zhang, Lorenz Breidenbach, Philip Daian, Ari Juels:
Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware. CCS 2019: 1521-1538 - [c107]Sai Krishna Deepak Maram
, Fan Zhang, Lun Wang, Andrew Low, Yupeng Zhang, Ari Juels, Dawn Song:
CHURP: Dynamic-Committee Proactive Secret Sharing. CCS 2019: 2369-2386 - [c106]Raymond Cheng, Fan Zhang
, Jernej Kos, Warren He, Nicholas Hynes, Noah M. Johnson, Ari Juels, Andrew Miller, Dawn Song:
Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts. EuroS&P 2019: 185-200 - [i40]Philip Daian, Steven Goldfeder, Tyler Kell, Yunqi Li, Xueyuan Zhao, Iddo Bentov, Lorenz Breidenbach, Ari Juels:
Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges. CoRR abs/1904.05234 (2019) - [i39]Fan Zhang, Sai Krishna Deepak Maram, Harjasleen Malvai, Steven Goldfeder, Ari Juels:
DECO: Liberating Web Data Using Decentralized Oracles for TLS. CoRR abs/1909.00938 (2019) - [i38]Charlie Hou, Mingxun Zhou, Yan Ji, Phil Daian, Florian Tramèr, Giulia Fanti, Ari Juels:
SquirRL: Automating Attack Discovery on Blockchain Incentive Mechanisms with Deep Reinforcement Learning. CoRR abs/1912.01798 (2019) - [i37]Michael Mirkin, Yan Ji, Jonathan Pang, Ariah Klages-Mundt, Ittay Eyal, Ari Juels:
BDoS: Blockchain Denial of Service. CoRR abs/1912.07497 (2019) - [i36]Sai Krishna Deepak Maram, Fan Zhang, Lun Wang, Andrew Low, Yupeng Zhang, Ari Juels, Dawn Song:
CHURP: Dynamic-Committee Proactive Secret Sharing. IACR Cryptol. ePrint Arch. 2019: 17 (2019) - [i35]Rahul Chatterjee, M. Sadegh Riazi, Tanmoy Chowdhury, Emanuela Marasco, Farinaz Koushanfar
, Ari Juels:
Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms. IACR Cryptol. ePrint Arch. 2019: 1103 (2019) - 2018
- [c105]Lorenz Breidenbach, Philip Daian, Florian Tramèr, Ari Juels:
Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts. USENIX Security Symposium 2018: 1335-1352 - [c104]Sinisa Matetic, Moritz Schneider, Andrew Miller, Ari Juels, Srdjan Capkun:
DelegaTEE: Brokered Delegation Using Trusted Execution Environments. USENIX Security Symposium 2018: 1387-1403 - [i34]Raymond Cheng, Fan Zhang, Jernej Kos, Warren He, Nicholas Hynes, Noah M. Johnson, Ari Juels, Andrew Miller, Dawn Song:
Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution. CoRR abs/1804.05141 (2018) - [i33]Fan Zhang, Philip Daian, Iddo Bentov, Ari Juels:
Paralysis Proofs: Safe Access-Structure Updates for Cryptocurrencies and More. IACR Cryptol. ePrint Arch. 2018: 96 (2018) - [i32]Sinisa Matetic, Moritz Schneider, Andrew Miller, Ari Juels, Srdjan Capkun:
DelegaTEE: Brokered Delegation Using Trusted Execution Environments. IACR Cryptol. ePrint Arch. 2018: 160 (2018) - [i31]Ethan Cecchetti, Ian Miers, Ari Juels:
PIEs: Public Incompressible Encodings for Decentralized Storage. IACR Cryptol. ePrint Arch. 2018: 684 (2018) - 2017
- [j15]Jay Aikat, Aditya Akella, Jeffrey S. Chase, Ari Juels, Michael K. Reiter, Thomas Ristenpart, Vyas Sekar, Michael M. Swift:
Rethinking Security in the Era of Cloud Computing. IEEE Secur. Priv. 15(3): 60-69 (2017) - [c103]Ethan Cecchetti
, Fan Zhang
, Yan Ji, Ahmed E. Kosba, Ari Juels, Elaine Shi:
Solidus: Confidential Distributed Ledger Transactions via PVORM. CCS 2017: 701-717 - [c102]Joanne Woodage, Rahul Chatterjee, Yevgeniy Dodis, Ari Juels, Thomas Ristenpart:
A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing. CRYPTO (3) 2017: 682-710 - [c101]Florian Tramèr, Fan Zhang
, Huang Lin, Jean-Pierre Hubaux, Ari Juels, Elaine Shi:
Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge. EuroS&P 2017: 19-34 - [c100]Florian Tramèr, Vaggelis Atlidakis, Roxana Geambasu, Daniel J. Hsu, Jean-Pierre Hubaux, Mathias Humbert, Ari Juels, Huang Lin:
FairTest: Discovering Unwarranted Associations in Data-Driven Applications. EuroS&P 2017: 401-416 - [c99]Philip Daian, Ittay Eyal, Ari Juels, Emin Gün Sirer:
(Short Paper) PieceWork: Generalized Outsourcing Control for Proofs of Work. Financial Cryptography Workshops 2017: 182-190 - [c98]Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David M. Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun:
ROTE: Rollback Protection for Trusted Execution. USENIX Security Symposium 2017: 1289-1306 - [c97]Fan Zhang, Ittay Eyal, Robert Escriva, Ari Juels, Robbert van Renesse:
REM: Resource-Efficient Mining for Blockchains. USENIX Security Symposium 2017: 1427-1444 - [i30]Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David M. Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun:
ROTE: Rollback Protection for Trusted Execution. IACR Cryptol. ePrint Arch. 2017: 48 (2017) - [i29]Fan Zhang, Ittay Eyal, Robert Escriva, Ari Juels, Robbert van Renesse:
REM: Resource-Efficient Mining for Blockchains. IACR Cryptol. ePrint Arch. 2017: 179 (2017) - [i28]Ethan Cecchetti, Fan Zhang, Yan Ji, Ahmed E. Kosba, Ari Juels, Elaine Shi:
Solidus: Confidential Distributed Ledger Transactions via PVORM. IACR Cryptol. ePrint Arch. 2017: 317 (2017) - [i27]Joanne Woodage, Rahul Chatterjee, Yevgeniy Dodis, Ari Juels, Thomas Ristenpart:
A New Distribution Sensitive Secure Sketch and a Comparison Between Approaches to Typo-Tolerant Authentication. IACR Cryptol. ePrint Arch. 2017: 542 (2017) - [i26]Lorenz Breidenbach, Philip Daian, Florian Tramèr, Ari Juels:
Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts. IACR Cryptol. ePrint Arch. 2017: 1090 (2017) - [i25]Iddo Bentov, Yan Ji, Fan Zhang, Yunqi Li, Xueyuan Zhao, Lorenz Breidenbach, Philip Daian, Ari Juels:
Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware. IACR Cryptol. ePrint Arch. 2017: 1153 (2017) - 2016
- [j14]Jean-Pierre Hubaux, Ari Juels:
Privacy is dead, long live privacy. Commun. ACM 59(6): 39-41 (2016) - [c96]Fan Zhang
, Ethan Cecchetti
, Kyle Croman, Ari Juels, Elaine Shi:
Town Crier: An Authenticated Data Feed for Smart Contracts. CCS 2016: 270-282 - [c95]Ari Juels, Ahmed E. Kosba, Elaine Shi:
The Ring of Gyges: Investigating the Future of Criminal Smart Contracts. CCS 2016: 283-295 - [c94]Kyle Croman, Christian Decker
, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed E. Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin Gün Sirer, Dawn Song, Roger Wattenhofer:
On Scaling Decentralized Blockchains - (A Position Paper). Financial Cryptography Workshops 2016: 106-125 - [c93]Bill Marino, Ari Juels:
Setting Standards for Altering and Undoing Smart Contracts. RuleML 2016: 151-166 - [c92]Rahul Chatterjee, Anish Athayle, Devdatta Akhawe, Ari Juels, Thomas Ristenpart:
pASSWORD tYPOS and How to Correct Them Securely. IEEE Symposium on Security and Privacy 2016: 799-818 - [c91]Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Stealing Machine Learning Models via Prediction APIs. USENIX Security Symposium 2016: 601-618 - [i24]Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Stealing Machine Learning Models via Prediction APIs. CoRR abs/1609.02943 (2016) - [i23]Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, Elaine Shi:
Town Crier: An Authenticated Data Feed for Smart Contracts. IACR Cryptol. ePrint Arch. 2016: 168 (2016) - [i22]Yevgeniy Dodis, Chaya Ganesh, Alexander Golovnev, Ari Juels, Thomas Ristenpart:
A Formal Treatment of Backdoored Pseudorandom Generators. IACR Cryptol. ePrint Arch. 2016: 306 (2016) - [i21]Ari Juels, Ahmed E. Kosba, Elaine Shi:
The Ring of Gyges: Investigating the Future of Criminal Smart Contracts. IACR Cryptol. ePrint Arch. 2016: 358 (2016) - [i20]Florian Tramèr, Fan Zhang, Huang Lin, Jean-Pierre Hubaux, Ari Juels, Elaine Shi:
Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge. IACR Cryptol. ePrint Arch. 2016: 635 (2016) - 2015
- [c90]Ari Juels, James Kelley, Roberto Tamassia, Nikos Triandopoulos:
Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable). CCS 2015: 1032-1047 - [c89]Yevgeniy Dodis, Chaya Ganesh, Alexander Golovnev, Ari Juels, Thomas Ristenpart:
A Formal Treatment of Backdoored Pseudorandom Generators. EUROCRYPT (1) 2015: 101-126 - [c88]Zhicong Huang, Erman Ayday, Jacques Fellay
, Jean-Pierre Hubaux, Ari Juels:
GenoGuard: Protecting Genomic Data against Brute-Force Attacks. IEEE Symposium on Security and Privacy 2015: 447-462 - [c87]Rahul Chatterjee, Joseph Bonneau, Ari Juels, Thomas Ristenpart:
Cracking-Resistant Password Vaults Using Natural Language Encoders. IEEE Symposium on Security and Privacy 2015: 481-498 - [c86]Adam Everspaugh, Rahul Chatterjee, Samuel Scott, Ari Juels, Thomas Ristenpart:
The Pythia PRF Service. USENIX Security Symposium 2015: 547-562 - [i19]Florian Tramèr, Vaggelis Atlidakis, Roxana Geambasu, Daniel J. Hsu, Jean-Pierre Hubaux, Mathias Humbert, Ari Juels, Huang Lin:
Discovering Unwarranted Associations in Data-Driven Applications with the FairTest Testing Toolkit. CoRR abs/1510.02377 (2015) - [i18]Adam Everspaugh, Rahul Chatterjee, Samuel Scott, Ari Juels, Thomas Ristenpart:
The Pythia PRF Service. IACR Cryptol. ePrint Arch. 2015: 644 (2015) - [i17]Rahul Chatterjee, Joseph Bonneau, Ari Juels, Thomas Ristenpart:
Cracking-Resistant Password Vaults using Natural Language Encoders. IACR Cryptol. ePrint Arch. 2015: 788 (2015) - 2014
- [j13]Ari Juels, Bonnie Wong:
The interplay of neuroscience and cryptography: technical perspective. Commun. ACM 57(5): 109 (2014) - [j12]Ari Juels, Thomas Ristenpart:
Honey Encryption: Encryption beyond the Brute-Force Barrier. IEEE Secur. Priv. 12(4): 59-62 (2014) - [c85]Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Cross-Tenant Side-Channel Attacks in PaaS Clouds. CCS 2014: 990-1003 - [c84]Ting-Fang Yen, Victor Heorhiadi, Alina Oprea, Michael K. Reiter, Ari Juels:
An Epidemiological Study of Malware Encounters in a Large Enterprise. CCS 2014: 1117-1130 - [c83]Ari Juels, Thomas Ristenpart:
Honey Encryption: Security Beyond the Brute-Force Bound. EUROCRYPT 2014: 293-310 - [c82]Kevin D. Bowers, Catherine Hart, Ari Juels, Nikos Triandopoulos:
PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging. RAID 2014: 46-67 - [c81]Ari Juels:
A bodyguard of lies: the use of honey objects in information security. SACMAT 2014: 1-4 - [c80]Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, Jonathan Katz:
Permacoin: Repurposing Bitcoin Work for Data Preservation. IEEE Symposium on Security and Privacy 2014: 475-490 - [i16]Ari Juels, Thomas Ristenpart:
Honey Encryption: Security Beyond the Brute-Force Bound. IACR Cryptol. ePrint Arch. 2014: 155 (2014) - [i15]Ari Juels, James Kelley, Roberto Tamassia, Nikos Triandopoulos:
Falcon Codes: Fast, Authenticated LT Codes. IACR Cryptol. ePrint Arch. 2014: 903 (2014) - 2013
- [j11]Ari Juels, Alina Oprea:
New approaches to security and availability for cloud data. Commun. ACM 56(2): 64-73 (2013) - [j10]Marten van Dijk
, Ari Juels, Alina Oprea, Ronald L. Rivest:
FlipIt: The Game of "Stealthy Takeover". J. Cryptol. 26(4): 655-713 (2013) - [c79]Ting-Fang Yen, Alina Oprea, Kaan Onarlioglu, Todd Leetham, William K. Robertson, Ari Juels, Engin Kirda:
Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks. ACSAC 2013: 199-208 - [c78]Ari Juels, Ronald L. Rivest:
Honeywords: making password-cracking detectable. CCS 2013: 145-160 - [c77]Masoud Rostami, Ari Juels, Farinaz Koushanfar
:
Heart-to-heart (H2H): authentication for implanted medical devices. CCS 2013: 1099-1112 - [c76]Ari Juels, Bryan Parno:
Fifth ACM cloud computing security workshop (CCSW 2013). CCS 2013: 1487-1488 - [c75]Masoud Rostami, Wayne P. Burleson, Farinaz Koushanfar
, Ari Juels:
Balancing security and utility in medical devices? DAC 2013: 13:1-13:6 - [c74]Kevin D. Bowers, Ari Juels, Ronald L. Rivest, Emily Shen:
Drifting Keys: Impersonation detection for constrained devices. INFOCOM 2013: 1025-1033 - [c73]Davide Zanetti, Srdjan Capkun, Ari Juels:
Tailing RFID Tags for Clone Detection. NDSS 2013 - [e10]Ari Juels, Bryan Parno:
CCSW'13, Proceedings of the 2013 ACM Cloud Computing Security Workshop, Co-located with CCS 2013, Berlin, Germany, November 4, 2013. ACM 2013, ISBN 978-1-4503-2490-8 [contents] - [i14]Kevin D. Bowers, Catherine Hart, Ari Juels, Nikos Triandopoulos:
Securing the Data in Big Data Security Analytics. IACR Cryptol. ePrint Arch. 2013: 625 (2013) - 2012
- [c72]Emil Stefanov, Marten van Dijk
, Ari Juels, Alina Oprea:
Iris: a scalable cloud file system with efficient integrity checks. ACSAC 2012: 229-238 - [c71]Marten van Dijk
, Ari Juels, Alina Oprea, Ronald L. Rivest, Emil Stefanov, Nikos Triandopoulos:
Hourglass schemes: how to prove that cloud files are encrypted. CCS 2012: 265-280 - [c70]Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Cross-VM side channels and their use to extract private keys. CCS 2012: 305-316 - [c69]Benjamin Farley, Ari Juels, Venkatanathan Varadarajan, Thomas Ristenpart, Kevin D. Bowers, Michael M. Swift:
More for your money: exploiting performance heterogeneity in public clouds. SoCC 2012: 20 - [c68]Kevin D. Bowers, Marten van Dijk
, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest, Nikos Triandopoulos:
Defending against the Unknown Enemy: Applying FlipIt to System Security. GameSec 2012: 248-263 - [c67]Ari Juels, Ting-Fang Yen:
Sherlock Holmes and the Case of the Advanced Persistent Threat. LEET 2012 - [e9]Ari Juels, Christof Paar:
RFID. Security and Privacy - 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7055, Springer 2012, ISBN 978-3-642-25285-3 [contents] - [i13]Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest:
FlipIt: The Game of "Stealthy Takeover". IACR Cryptol. ePrint Arch. 2012: 103 (2012) - [i12]Kevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest, Nikos Triandopoulos:
Defending Against the Unknown Enemy: Applying FlipIt to System Security. IACR Cryptol. ePrint Arch. 2012: 579 (2012) - 2011
- [c66]Kevin D. Bowers, Marten van Dijk
, Ari Juels, Alina Oprea, Ronald L. Rivest:
How to tell if your cloud files are vulnerable to drive crashes. CCS 2011: 501-514 - [c65]Tamara Denning, Kevin D. Bowers, Marten van Dijk
, Ari Juels:
Exploring implicit memory for painless password recovery. CHI 2011: 2615-2618 - [c64]Yinqian Zhang, Ari Juels, Alina Oprea, Michael K. Reiter:
HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis. IEEE Symposium on Security and Privacy 2011: 313-328 - [i11]Emil Stefanov, Marten van Dijk, Alina Oprea, Ari Juels:
Iris: A Scalable Cloud File System with Efficient Integrity Checks. IACR Cryptol. ePrint Arch. 2011: 585 (2011) - 2010
- [j9]Ari Juels:
Future tense. Commun. ACM 53(3): 120- (2010) - [c63]Alina Oprea, Ari Juels:
A Clean-Slate Look at Disk Scrubbing. FAST 2010: 57-70 - [c62]Ari Juels:
Biometrics in electronic travel documents. MM&Sec 2010: 1-2 - [c61]Ari Juels:
The Physical Basis of RFID Security. RFIDSec 2010: 1 - [c60]Marten van Dijk, Ari Juels:
On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing. HotSec 2010 - [c59]Ari Juels, Dario Catalano, Markus Jakobsson:
Coercion-Resistant Electronic Elections. Towards Trustworthy Elections 2010: 37-63 - [i10]Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest:
How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes. IACR Cryptol. ePrint Arch. 2010: 214 (2010) - [i9]Marten van Dijk, Ari Juels:
On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing. IACR Cryptol. ePrint Arch. 2010: 305 (2010)
2000 – 2009
- 2009
- [j8]Ari Juels, Stephen A. Weis:
Defining strong privacy for RFID. ACM Trans. Inf. Syst. Secur. 13(1): 7:1-7:23 (2009) - [c58]Karl Koscher, Ari Juels, Vjekoslav Brajkovic, Tadayoshi Kohno:
EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond. CCS 2009: 33-42 - [c57]Kevin D. Bowers, Ari Juels, Alina Oprea:
Proofs of retrievability: theory and implementation. CCSW 2009: 43-54 - [c56]Kevin D. Bowers, Ari Juels, Alina Oprea:
HAIL: a high-availability and integrity layer for cloud storage. CCS 2009: 187-198 - [c55]Ari Juels:
Power games in RFID security. ICITST 2009: 1 - [c54]Markus Jakobsson, Ari Juels:
Server-side detection of malware infection. NSPW 2009: 11-22 - [c53]Mastooreh Salajegheh, Shane S. Clark, Benjamin Ransford, Kevin Fu, Ari Juels:
CCCP: Secure Remote Storage for Computational RFIDs. USENIX Security Symposium 2009: 215-230 - 2008
- [c52]Ari Juels, Ravikanth Pappu, Bryan Parno:
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security. USENIX Security Symposium 2008: 75-90 - [c51]Ari Juels:
RFID security: in the shoulder and on the loading dock. WISEC 2008: 1 - [c50]