Follow
Ari Juels
Ari Juels
Professor, Computer Science, Cornell Tech (Jacobs); Co-Director, IC3
Verified email at cornell.edu - Homepage
Title
Cited by
Cited by
Year
RFID security and privacy: A research survey
A Juels
IEEE journal on selected areas in communications 24 (2), 381-394, 2006
26782006
PORs: Proofs of retrievability for large files
A Juels, BS Kaliski Jr
Proceedings of the 14th ACM conference on Computer and communications …, 2007
26772007
A fuzzy commitment scheme
A Juels, M Wattenberg
Proceedings of the 6th ACM conference on Computer and communications …, 1999
21061999
A fuzzy vault scheme
A Juels, M Sudan
Designs, Codes and Cryptography 38, 237-257, 2006
20892006
Stealing Machine Learning Models via Prediction APIs.
F Tramèr, F Zhang, A Juels, MK Reiter, T Ristenpart
USENIX security symposium 16, 601-618, 2016
14632016
The blocker tag: selective blocking of RFID tags for consumer privacy
A Juels, RL Rivest, M Szydlo
Proceedings of the 10th ACM conference on Computer and communications …, 2003
13672003
HAIL: A high-availability and integrity layer for cloud storage
KD Bowers, A Juels, A Oprea
Proceedings of the 16th ACM conference on Computer and communications …, 2009
13602009
On Scaling Decentralized Blockchains: (A Position Paper)
K Croman, C Decker, I Eyal, AE Gencer, A Juels, A Kosba, A Miller, ...
Financial Cryptography and Data Security: FC 2016 International Workshops …, 2016
13592016
Cross-VM side channels and their use to extract private keys
Y Zhang, A Juels, MK Reiter, T Ristenpart
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
9772012
Authenticating pervasive devices with human protocols
A Juels, SA Weis
Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005
9602005
Client puzzles: A cryptographic countermeasure against connection depletion attacks
A Juels
Proc. Networks and Distributed System Security Symposium (NDSS), 1999, 1999
916*1999
Coercion-resistant electronic elections
A Juels, D Catalano, M Jakobsson
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 61-70, 2005
7912005
Proofs of retrievability: Theory and implementation
KD Bowers, A Juels, A Oprea
Proceedings of the 2009 ACM workshop on Cloud computing security, 43-54, 2009
7902009
RFID privacy: An overview of problems and proposed solutions
SL Garfinkel, A Juels, R Pappu
IEEE Security & Privacy 3 (3), 34-43, 2005
7572005
Minimalist cryptography for low-cost RFID tags
A Juels
Security in Communication Networks: 4th International Conference, SCN 2004 …, 2005
7042005
Proofs of work and bread pudding protocols
M Jakobsson, A Juels
Communications and Multimedia Security, 258-272, 1999
6671999
Town crier: An authenticated data feed for smart contracts
F Zhang, E Cecchetti, K Croman, A Juels, E Shi
Proceedings of the 2016 aCM sIGSAC conference on computer and communications …, 2016
6292016
Squealing Euros: Privacy Protection in RFID-Enabled Banknotes
A Juels, R Pappu
Financial Cryptography, Lecture Notes in Computer Science 2742, 103-121, 2004
6092004
Universal re-encryption for mixnets
P Golle, M Jakobsson, A Juels, P Syverson
Topics in Cryptology–CT-RSA 2004: The Cryptographers’ Track at the RSA …, 2004
6042004
Defining strong privacy for RFID
A Juels, SA Weis
ACM Transactions on Information and System Security (TISSEC) 13 (1), 1-23, 2009
6012009
The system can't perform the operation now. Try again later.
Articles 1–20