BibTeX records: Ari Juels

download as .bib file

@article{DBLP:journals/pomacs/TangKFJ23,
  author       = {Weizhao Tang and
                  Lucianna Kiffer and
                  Giulia Fanti and
                  Ari Juels},
  title        = {Strategic Latency Reduction in Blockchain Peer-to-Peer Networks},
  journal      = {Proc. {ACM} Meas. Anal. Comput. Syst.},
  volume       = {7},
  number       = {2},
  pages        = {32:1--32:33},
  year         = {2023},
  url          = {https://doi.org/10.1145/3589976},
  doi          = {10.1145/3589976},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pomacs/TangKFJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KelkarDLJK23,
  author       = {Mahimna Kelkar and
                  Soubhik Deb and
                  Sishan Long and
                  Ari Juels and
                  Sreeram Kannan},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Themis: Fast, Strong Order-Fairness in Byzantine Consensus},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {475--489},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3616658},
  doi          = {10.1145/3576915.3616658},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KelkarDLJK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BabelJ0KKJ23,
  author       = {Kushal Babel and
                  Mojan Javaheripi and
                  Yan Ji and
                  Mahimna Kelkar and
                  Farinaz Koushanfar and
                  Ari Juels},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Lanturn: Measuring Economic Security of Smart Contracts Through Adaptive
                  Learning},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {1212--1226},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623204},
  doi          = {10.1145/3576915.3623204},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BabelJ0KKJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KellYAMJ23,
  author       = {Tyler Kell and
                  Haaroon Yousaf and
                  Sarah Allen and
                  Sarah Meiklejohn and
                  Ari Juels},
  editor       = {Foteini Baldimtsi and
                  Christian Cachin},
  title        = {Forsage: Anatomy of a Smart-Contract Pyramid Scheme},
  booktitle    = {Financial Cryptography and Data Security - 27th International Conference,
                  {FC} 2023, Bol, Bra{\v{c}}, Croatia, May 1-5, 2023, Revised Selected
                  Papers, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13951},
  pages        = {241--258},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47751-5\_14},
  doi          = {10.1007/978-3-031-47751-5\_14},
  timestamp    = {Sat, 09 Dec 2023 09:49:49 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/KellYAMJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmetrics/TangKFJ23,
  author       = {Weizhao Tang and
                  Lucianna Kiffer and
                  Giulia Fanti and
                  Ari Juels},
  editor       = {Evgenia Smirni and
                  Konstantin Avrachenkov and
                  Phillipa Gill and
                  Bhuvan Urgaonkar},
  title        = {Strategic Latency Reduction in Blockchain Peer-to-Peer Networks},
  booktitle    = {Abstract Proceedings of the 2023 {ACM} {SIGMETRICS} International
                  Conference on Measurement and Modeling of Computer Systems, {SIGMETRICS}
                  2023, Orlando, FL, USA, June 19-23, 2023},
  pages        = {93--94},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3578338.3593572},
  doi          = {10.1145/3578338.3593572},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmetrics/TangKFJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BabelDKJ23,
  author       = {Kushal Babel and
                  Philip Daian and
                  Mahimna Kelkar and
                  Ari Juels},
  title        = {Clockwork Finance: Automated Analysis of Economic Security in Smart
                  Contracts},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {2499--2516},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179346},
  doi          = {10.1109/SP46215.2023.10179346},
  timestamp    = {Thu, 27 Jul 2023 08:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BabelDKJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-19201,
  author       = {Joshua Z. Tan and
                  Tara Merk and
                  Sarah Hubbard and
                  Eliza R. Oak and
                  Joni Pirovich and
                  Ellie Rennie and
                  Rolf Hoefer and
                  Michael Zargham and
                  Jason Potts and
                  Chris Berg and
                  Reuben Youngblom and
                  Primavera De Filippi and
                  Seth Frey and
                  Jeff Strnad and
                  Morshed Mannan and
                  Kelsie Nabben and
                  Silke Noa Elrifai and
                  Jake Hartnell and
                  Benjamin Mako Hill and
                  Alexia Maddox and
                  Woojin Lim and
                  Tobin South and
                  Ari Juels and
                  Dan Boneh},
  title        = {Open Problems in DAOs},
  journal      = {CoRR},
  volume       = {abs/2310.19201},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.19201},
  doi          = {10.48550/ARXIV.2310.19201},
  eprinttype    = {arXiv},
  eprint       = {2310.19201},
  timestamp    = {Thu, 02 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-19201.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-03530,
  author       = {James Austgen and
                  Andr{\'{e}}s F{\'{a}}brega and
                  Sarah Allen and
                  Kushal Babel and
                  Mahimna Kelkar and
                  Ari Juels},
  title        = {{DAO} Decentralization: Voting-Bloc Entropy, Bribery, and Dark DAOs},
  journal      = {CoRR},
  volume       = {abs/2311.03530},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.03530},
  doi          = {10.48550/ARXIV.2311.03530},
  eprinttype    = {arXiv},
  eprint       = {2311.03530},
  timestamp    = {Tue, 14 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-03530.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KelkarBDABJ23,
  author       = {Mahimna Kelkar and
                  Kushal Babel and
                  Philip Daian and
                  James Austgen and
                  Vitalik Buterin and
                  Ari Juels},
  title        = {Complete Knowledge: Preventing Encumbrance of Cryptographic Secrets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {44},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/044},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KelkarBDABJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BabelJJKKJ23,
  author       = {Kushal Babel and
                  Mojan Javaheripi and
                  Yan Ji and
                  Mahimna Kelkar and
                  Farinaz Koushanfar and
                  Ari Juels},
  title        = {Lanturn: Measuring Economic Security of Smart Contracts Through Adaptive
                  Learning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1338},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1338},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BabelJJKKJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-06837,
  author       = {Weizhao Tang and
                  Lucianna Kiffer and
                  Giulia Fanti and
                  Ari Juels},
  title        = {Strategic Latency Reduction in Blockchain Peer-to-Peer Networks},
  journal      = {CoRR},
  volume       = {abs/2205.06837},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.06837},
  doi          = {10.48550/ARXIV.2205.06837},
  eprinttype    = {arXiv},
  eprint       = {2205.06837},
  timestamp    = {Tue, 17 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-06837.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/HouZJDTFJ21,
  author       = {Charlie Hou and
                  Mingxun Zhou and
                  Yan Ji and
                  Phil Daian and
                  Florian Tram{\`{e}}r and
                  Giulia Fanti and
                  Ari Juels},
  title        = {SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms
                  with Deep Reinforcement Learning},
  booktitle    = {28th Annual Network and Distributed System Security Symposium, {NDSS}
                  2021, virtually, February 21-25, 2021},
  publisher    = {The Internet Society},
  year         = {2021},
  url          = {https://www.ndss-symposium.org/ndss-paper/squirrl-automating-attack-analysis-on-blockchain-incentive-mechanisms-with-deep-reinforcement-learning/},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/HouZJDTFJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MaramMZJFKLMJM21,
  author       = {Deepak Maram and
                  Harjasleen Malvai and
                  Fan Zhang and
                  Nerla Jean{-}Louis and
                  Alexander Frolov and
                  Tyler Kell and
                  Tyrone Lobban and
                  Christine Moy and
                  Ari Juels and
                  Andrew Miller},
  title        = {CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance,
                  and Accountability},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {1348--1366},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00038},
  doi          = {10.1109/SP40001.2021.00038},
  timestamp    = {Thu, 21 Sep 2023 15:57:26 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/MaramMZJFKLMJM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-04380,
  author       = {Tyler Kell and
                  Haaroon Yousaf and
                  Sarah Allen and
                  Sarah Meiklejohn and
                  Ari Juels},
  title        = {Forsage: Anatomy of a Smart-Contract Pyramid Scheme},
  journal      = {CoRR},
  volume       = {abs/2105.04380},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.04380},
  eprinttype    = {arXiv},
  eprint       = {2105.04380},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-04380.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-04347,
  author       = {Kushal Babel and
                  Philip Daian and
                  Mahimna Kelkar and
                  Ari Juels},
  title        = {Clockwork Finance: Automated Analysis of Economic Security in Smart
                  Contracts},
  journal      = {CoRR},
  volume       = {abs/2109.04347},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.04347},
  eprinttype    = {arXiv},
  eprint       = {2109.04347},
  timestamp    = {Tue, 21 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-04347.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaramBKJ21,
  author       = {Deepak Maram and
                  Iddo Bentov and
                  Mahimna Kelkar and
                  Ari Juels},
  title        = {GoAT: File Geolocation via Anchor Timestamping},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {697},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/697},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaramBKJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BabelDKJ21,
  author       = {Kushal Babel and
                  Philip Daian and
                  Mahimna Kelkar and
                  Ari Juels},
  title        = {Clockwork Finance: Automated Analysis of Economic Security in Smart
                  Contracts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1147},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1147},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BabelDKJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KelkarDLJK21,
  author       = {Mahimna Kelkar and
                  Soubhik Deb and
                  Sishan Long and
                  Ari Juels and
                  Sreeram Kannan},
  title        = {Themis: Fast, Strong Order-Fairness in Byzantine Consensus},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1465},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1465},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KelkarDLJK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/ZhangHCKHJJMS20,
  author       = {Fan Zhang and
                  Warren He and
                  Raymond Cheng and
                  Jernej Kos and
                  Nicholas Hynes and
                  Noah M. Johnson and
                  Ari Juels and
                  Andrew Miller and
                  Dawn Song},
  title        = {The Ekiden Platform for Confidentiality-Preserving, Trustworthy, and
                  Performant Smart Contracts},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {18},
  number       = {3},
  pages        = {17--27},
  year         = {2020},
  url          = {https://doi.org/10.1109/MSEC.2020.2976984},
  doi          = {10.1109/MSEC.2020.2976984},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/ZhangHCKHJJMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MirkinJPKEJ20,
  author       = {Michael Mirkin and
                  Yan Ji and
                  Jonathan Pang and
                  Ariah Klages{-}Mundt and
                  Ittay Eyal and
                  Ari Juels},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {BDoS: Blockchain Denial-of-Service},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {601--619},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417247},
  doi          = {10.1145/3372297.3417247},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MirkinJPKEJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangMMGJ20,
  author       = {Fan Zhang and
                  Deepak Maram and
                  Harjasleen Malvai and
                  Steven Goldfeder and
                  Ari Juels},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {{DECO:} Liberating Web Data Using Decentralized Oracles for {TLS}},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {1919--1938},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417239},
  doi          = {10.1145/3372297.3417239},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangMMGJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Kelkar0GJ20,
  author       = {Mahimna Kelkar and
                  Fan Zhang and
                  Steven Goldfeder and
                  Ari Juels},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Order-Fairness for Byzantine Consensus},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12172},
  pages        = {451--480},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56877-1\_16},
  doi          = {10.1007/978-3-030-56877-1\_16},
  timestamp    = {Mon, 28 Aug 2023 21:17:50 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Kelkar0GJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/DaianGKLZBBJ20,
  author       = {Philip Daian and
                  Steven Goldfeder and
                  Tyler Kell and
                  Yunqi Li and
                  Xueyuan Zhao and
                  Iddo Bentov and
                  Lorenz Breidenbach and
                  Ari Juels},
  title        = {Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable
                  Value, and Consensus Instability},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {910--927},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00040},
  doi          = {10.1109/SP40000.2020.00040},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/DaianGKLZBBJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KelkarZGJ20,
  author       = {Mahimna Kelkar and
                  Fan Zhang and
                  Steven Goldfeder and
                  Ari Juels},
  title        = {Order-Fairness for Byzantine Consensus},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {269},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/269},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KelkarZGJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaramMZJFKLMJM20,
  author       = {Deepak Maram and
                  Harjasleen Malvai and
                  Fan Zhang and
                  Nerla Jean{-}Louis and
                  Alexander Frolov and
                  Tyler Kell and
                  Tyrone Lobban and
                  Christine Moy and
                  Ari Juels and
                  Andrew Miller},
  title        = {CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance,
                  and Accountability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {934},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/934},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaramMZJFKLMJM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/SchneiderMJMC19,
  author       = {Moritz Schneider and
                  Sinisa Matetic and
                  Ari Juels and
                  Andrew Miller and
                  Srdjan Capkun},
  title        = {Secure Brokered Delegation Through DelegaTEE},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {4},
  pages        = {43--52},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2909712},
  doi          = {10.1109/MSEC.2019.2909712},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/SchneiderMJMC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/BreidenbachDTJ19,
  author       = {Lorenz Breidenbach and
                  Philip Daian and
                  Florian Tram{\`{e}}r and
                  Ari Juels},
  title        = {The Hydra Framework for Principled, Automated Bug Bounties},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {17},
  number       = {4},
  pages        = {53--61},
  year         = {2019},
  url          = {https://doi.org/10.1109/MSEC.2019.2914109},
  doi          = {10.1109/MSEC.2019.2914109},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/BreidenbachDTJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aft/ZhangDBMJ19,
  author       = {Fan Zhang and
                  Philip Daian and
                  Iddo Bentov and
                  Ian Miers and
                  Ari Juels},
  title        = {Paralysis Proofs: Secure Dynamic Access Structures for Cryptocurrency
                  Custody and More},
  booktitle    = {Proceedings of the 1st {ACM} Conference on Advances in Financial Technologies,
                  {AFT} 2019, Zurich, Switzerland, October 21-23, 2019},
  pages        = {1--15},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3318041.3355459},
  doi          = {10.1145/3318041.3355459},
  timestamp    = {Thu, 11 Mar 2021 17:04:51 +0100},
  biburl       = {https://dblp.org/rec/conf/aft/ZhangDBMJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0001RCMKJ19,
  author       = {Rahul Chatterjee and
                  M. Sadegh Riazi and
                  Tanmoy Chowdhury and
                  Emanuela Marasco and
                  Farinaz Koushanfar and
                  Ari Juels},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric
                  Matching Algorithms},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {1171--1186},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3363208},
  doi          = {10.1145/3319535.3363208},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/0001RCMKJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CecchettiFMJ19,
  author       = {Ethan Cecchetti and
                  Ben Fisch and
                  Ian Miers and
                  Ari Juels},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {PIEs: Public Incompressible Encodings for Decentralized Storage},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {1351--1367},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354231},
  doi          = {10.1145/3319535.3354231},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/CecchettiFMJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BentovJ0BDJ19,
  author       = {Iddo Bentov and
                  Yan Ji and
                  Fan Zhang and
                  Lorenz Breidenbach and
                  Philip Daian and
                  Ari Juels},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {1521--1538},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3363221},
  doi          = {10.1145/3319535.3363221},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BentovJ0BDJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MaramZWLZJS19,
  author       = {Sai Krishna Deepak Maram and
                  Fan Zhang and
                  Lun Wang and
                  Andrew Low and
                  Yupeng Zhang and
                  Ari Juels and
                  Dawn Song},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {{CHURP:} Dynamic-Committee Proactive Secret Sharing},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2369--2386},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3363203},
  doi          = {10.1145/3319535.3363203},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MaramZWLZJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/ChengZKHHJJ0S19,
  author       = {Raymond Cheng and
                  Fan Zhang and
                  Jernej Kos and
                  Warren He and
                  Nicholas Hynes and
                  Noah M. Johnson and
                  Ari Juels and
                  Andrew Miller and
                  Dawn Song},
  title        = {Ekiden: {A} Platform for Confidentiality-Preserving, Trustworthy,
                  and Performant Smart Contracts},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2019, Stockholm, Sweden, June 17-19, 2019},
  pages        = {185--200},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EuroSP.2019.00023},
  doi          = {10.1109/EUROSP.2019.00023},
  timestamp    = {Tue, 09 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/ChengZKHHJJ0S19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-05234,
  author       = {Philip Daian and
                  Steven Goldfeder and
                  Tyler Kell and
                  Yunqi Li and
                  Xueyuan Zhao and
                  Iddo Bentov and
                  Lorenz Breidenbach and
                  Ari Juels},
  title        = {Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus
                  Instability in Decentralized Exchanges},
  journal      = {CoRR},
  volume       = {abs/1904.05234},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.05234},
  eprinttype    = {arXiv},
  eprint       = {1904.05234},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-05234.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-00938,
  author       = {Fan Zhang and
                  Sai Krishna Deepak Maram and
                  Harjasleen Malvai and
                  Steven Goldfeder and
                  Ari Juels},
  title        = {{DECO:} Liberating Web Data Using Decentralized Oracles for {TLS}},
  journal      = {CoRR},
  volume       = {abs/1909.00938},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.00938},
  eprinttype    = {arXiv},
  eprint       = {1909.00938},
  timestamp    = {Tue, 17 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-00938.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-01798,
  author       = {Charlie Hou and
                  Mingxun Zhou and
                  Yan Ji and
                  Phil Daian and
                  Florian Tram{\`{e}}r and
                  Giulia Fanti and
                  Ari Juels},
  title        = {SquirRL: Automating Attack Discovery on Blockchain Incentive Mechanisms
                  with Deep Reinforcement Learning},
  journal      = {CoRR},
  volume       = {abs/1912.01798},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.01798},
  eprinttype    = {arXiv},
  eprint       = {1912.01798},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-01798.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-07497,
  author       = {Michael Mirkin and
                  Yan Ji and
                  Jonathan Pang and
                  Ariah Klages{-}Mundt and
                  Ittay Eyal and
                  Ari Juels},
  title        = {BDoS: Blockchain Denial of Service},
  journal      = {CoRR},
  volume       = {abs/1912.07497},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.07497},
  eprinttype    = {arXiv},
  eprint       = {1912.07497},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-07497.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Maram0WLZJS19,
  author       = {Sai Krishna Deepak Maram and
                  Fan Zhang and
                  Lun Wang and
                  Andrew Low and
                  Yupeng Zhang and
                  Ari Juels and
                  Dawn Song},
  title        = {{CHURP:} Dynamic-Committee Proactive Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {17},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/017},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Maram0WLZJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChatterjeeRCMKJ19,
  author       = {Rahul Chatterjee and
                  M. Sadegh Riazi and
                  Tanmoy Chowdhury and
                  Emanuela Marasco and
                  Farinaz Koushanfar and
                  Ari Juels},
  title        = {Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric
                  Matching Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1103},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1103},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChatterjeeRCMKJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BreindenbachDTJ18,
  author       = {Lorenz Breidenbach and
                  Philip Daian and
                  Florian Tram{\`{e}}r and
                  Ari Juels},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant
                  Smart Contracts},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {1335--1352},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/breindenbach},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/BreindenbachDTJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MateticSMJC18,
  author       = {Sinisa Matetic and
                  Moritz Schneider and
                  Andrew Miller and
                  Ari Juels and
                  Srdjan Capkun},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {DelegaTEE: Brokered Delegation Using Trusted Execution Environments},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {1387--1403},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/matetic},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/MateticSMJC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-05141,
  author       = {Raymond Cheng and
                  Fan Zhang and
                  Jernej Kos and
                  Warren He and
                  Nicholas Hynes and
                  Noah M. Johnson and
                  Ari Juels and
                  Andrew Miller and
                  Dawn Song},
  title        = {Ekiden: {A} Platform for Confidentiality-Preserving, Trustworthy,
                  and Performant Smart Contract Execution},
  journal      = {CoRR},
  volume       = {abs/1804.05141},
  year         = {2018},
  url          = {http://arxiv.org/abs/1804.05141},
  eprinttype    = {arXiv},
  eprint       = {1804.05141},
  timestamp    = {Tue, 09 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1804-05141.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangDBJ18,
  author       = {Fan Zhang and
                  Philip Daian and
                  Iddo Bentov and
                  Ari Juels},
  title        = {Paralysis Proofs: Safe Access-Structure Updates for Cryptocurrencies
                  and More},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {96},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/096},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangDBJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MateticSMJC18,
  author       = {Sinisa Matetic and
                  Moritz Schneider and
                  Andrew Miller and
                  Ari Juels and
                  Srdjan Capkun},
  title        = {DelegaTEE: Brokered Delegation Using Trusted Execution Environments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {160},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/160},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MateticSMJC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CecchettiMJ18,
  author       = {Ethan Cecchetti and
                  Ian Miers and
                  Ari Juels},
  title        = {PIEs: Public Incompressible Encodings for Decentralized Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {684},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/684},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CecchettiMJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/AikatACJRRSS17,
  author       = {Jay Aikat and
                  Aditya Akella and
                  Jeffrey S. Chase and
                  Ari Juels and
                  Michael K. Reiter and
                  Thomas Ristenpart and
                  Vyas Sekar and
                  Michael M. Swift},
  title        = {Rethinking Security in the Era of Cloud Computing},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {15},
  number       = {3},
  pages        = {60--69},
  year         = {2017},
  url          = {https://doi.org/10.1109/MSP.2017.80},
  doi          = {10.1109/MSP.2017.80},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/AikatACJRRSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CecchettiZJKJS17,
  author       = {Ethan Cecchetti and
                  Fan Zhang and
                  Yan Ji and
                  Ahmed E. Kosba and
                  Ari Juels and
                  Elaine Shi},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Solidus: Confidential Distributed Ledger Transactions via {PVORM}},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {701--717},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134010},
  doi          = {10.1145/3133956.3134010},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CecchettiZJKJS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/WoodageCDJR17,
  author       = {Joanne Woodage and
                  Rahul Chatterjee and
                  Yevgeniy Dodis and
                  Ari Juels and
                  Thomas Ristenpart},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {A New Distribution-Sensitive Secure Sketch and Popularity-Proportional
                  Hashing},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {682--710},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_23},
  doi          = {10.1007/978-3-319-63697-9\_23},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/WoodageCDJR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/TramerZLHJS17,
  author       = {Florian Tram{\`{e}}r and
                  Fan Zhang and
                  Huang Lin and
                  Jean{-}Pierre Hubaux and
                  Ari Juels and
                  Elaine Shi},
  title        = {Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell
                  Knowledge},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2017, Paris, France, April 26-28, 2017},
  pages        = {19--34},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSP.2017.28},
  doi          = {10.1109/EUROSP.2017.28},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/TramerZLHJS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/TramerAGHHHJL17,
  author       = {Florian Tram{\`{e}}r and
                  Vaggelis Atlidakis and
                  Roxana Geambasu and
                  Daniel J. Hsu and
                  Jean{-}Pierre Hubaux and
                  Mathias Humbert and
                  Ari Juels and
                  Huang Lin},
  title        = {FairTest: Discovering Unwarranted Associations in Data-Driven Applications},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2017, Paris, France, April 26-28, 2017},
  pages        = {401--416},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSP.2017.29},
  doi          = {10.1109/EUROSP.2017.29},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/TramerAGHHHJL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/DaianEJS17,
  author       = {Philip Daian and
                  Ittay Eyal and
                  Ari Juels and
                  Emin G{\"{u}}n Sirer},
  editor       = {Michael Brenner and
                  Kurt Rohloff and
                  Joseph Bonneau and
                  Andrew Miller and
                  Peter Y. A. Ryan and
                  Vanessa Teague and
                  Andrea Bracciali and
                  Massimiliano Sala and
                  Federico Pintore and
                  Markus Jakobsson},
  title        = {(Short Paper) PieceWork: Generalized Outsourcing Control for Proofs
                  of Work},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2017 International
                  Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April
                  7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10323},
  pages        = {182--190},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70278-0\_11},
  doi          = {10.1007/978-3-319-70278-0\_11},
  timestamp    = {Tue, 16 Aug 2022 23:04:23 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/DaianEJS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/MateticAKDSGJC17,
  author       = {Sinisa Matetic and
                  Mansoor Ahmed and
                  Kari Kostiainen and
                  Aritra Dhar and
                  David M. Sommer and
                  Arthur Gervais and
                  Ari Juels and
                  Srdjan Capkun},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {{ROTE:} Rollback Protection for Trusted Execution},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {1289--1306},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/matetic},
  timestamp    = {Thu, 27 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/MateticAKDSGJC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhangEEJR17,
  author       = {Fan Zhang and
                  Ittay Eyal and
                  Robert Escriva and
                  Ari Juels and
                  Robbert van Renesse},
  editor       = {Engin Kirda and
                  Thomas Ristenpart},
  title        = {{REM:} Resource-Efficient Mining for Blockchains},
  booktitle    = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver,
                  BC, Canada, August 16-18, 2017},
  pages        = {1427--1444},
  publisher    = {{USENIX} Association},
  year         = {2017},
  url          = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/zhang},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/ZhangEEJR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MateticAKDSGJC17,
  author       = {Sinisa Matetic and
                  Mansoor Ahmed and
                  Kari Kostiainen and
                  Aritra Dhar and
                  David M. Sommer and
                  Arthur Gervais and
                  Ari Juels and
                  Srdjan Capkun},
  title        = {{ROTE:} Rollback Protection for Trusted Execution},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {48},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/048},
  timestamp    = {Thu, 27 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MateticAKDSGJC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangEEJR17,
  author       = {Fan Zhang and
                  Ittay Eyal and
                  Robert Escriva and
                  Ari Juels and
                  Robbert van Renesse},
  title        = {{REM:} Resource-Efficient Mining for Blockchains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {179},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/179},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangEEJR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CecchettiZJKJS17,
  author       = {Ethan Cecchetti and
                  Fan Zhang and
                  Yan Ji and
                  Ahmed E. Kosba and
                  Ari Juels and
                  Elaine Shi},
  title        = {Solidus: Confidential Distributed Ledger Transactions via {PVORM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {317},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/317},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CecchettiZJKJS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WoodageCDJR17,
  author       = {Joanne Woodage and
                  Rahul Chatterjee and
                  Yevgeniy Dodis and
                  Ari Juels and
                  Thomas Ristenpart},
  title        = {A New Distribution Sensitive Secure Sketch and a Comparison Between
                  Approaches to Typo-Tolerant Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {542},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/542},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WoodageCDJR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BreidenbachDTJ17,
  author       = {Lorenz Breidenbach and
                  Philip Daian and
                  Florian Tram{\`{e}}r and
                  Ari Juels},
  title        = {Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant
                  Smart Contracts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1090},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1090},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BreidenbachDTJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BentovJZLZBDJ17,
  author       = {Iddo Bentov and
                  Yan Ji and
                  Fan Zhang and
                  Yunqi Li and
                  Xueyuan Zhao and
                  Lorenz Breidenbach and
                  Philip Daian and
                  Ari Juels},
  title        = {Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1153},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1153},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BentovJZLZBDJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/HubauxJ16,
  author       = {Jean{-}Pierre Hubaux and
                  Ari Juels},
  title        = {Privacy is dead, long live privacy},
  journal      = {Commun. {ACM}},
  volume       = {59},
  number       = {6},
  pages        = {39--41},
  year         = {2016},
  url          = {https://doi.org/10.1145/2834114},
  doi          = {10.1145/2834114},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/HubauxJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangCCJS16,
  author       = {Fan Zhang and
                  Ethan Cecchetti and
                  Kyle Croman and
                  Ari Juels and
                  Elaine Shi},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Town Crier: An Authenticated Data Feed for Smart Contracts},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {270--282},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978326},
  doi          = {10.1145/2976749.2978326},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangCCJS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JuelsKS16,
  author       = {Ari Juels and
                  Ahmed E. Kosba and
                  Elaine Shi},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {The Ring of Gyges: Investigating the Future of Criminal Smart Contracts},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {283--295},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978362},
  doi          = {10.1145/2976749.2978362},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JuelsKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/CromanDEGJKMSSS16,
  author       = {Kyle Croman and
                  Christian Decker and
                  Ittay Eyal and
                  Adem Efe Gencer and
                  Ari Juels and
                  Ahmed E. Kosba and
                  Andrew Miller and
                  Prateek Saxena and
                  Elaine Shi and
                  Emin G{\"{u}}n Sirer and
                  Dawn Song and
                  Roger Wattenhofer},
  editor       = {Jeremy Clark and
                  Sarah Meiklejohn and
                  Peter Y. A. Ryan and
                  Dan S. Wallach and
                  Michael Brenner and
                  Kurt Rohloff},
  title        = {On Scaling Decentralized Blockchains - {(A} Position Paper)},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2016 International
                  Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February
                  26, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9604},
  pages        = {106--125},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53357-4\_8},
  doi          = {10.1007/978-3-662-53357-4\_8},
  timestamp    = {Wed, 12 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/CromanDEGJKMSSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ruleml/MarinoJ16,
  author       = {Bill Marino and
                  Ari Juels},
  editor       = {Jos{\'{e}} J{\'{u}}lio Alferes and
                  Leopoldo E. Bertossi and
                  Guido Governatori and
                  Paul Fodor and
                  Dumitru Roman},
  title        = {Setting Standards for Altering and Undoing Smart Contracts},
  booktitle    = {Rule Technologies. Research, Tools, and Applications - 10th International
                  Symposium, RuleML 2016, Stony Brook, NY, USA, July 6-9, 2016. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9718},
  pages        = {151--166},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-42019-6\_10},
  doi          = {10.1007/978-3-319-42019-6\_10},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/ruleml/MarinoJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChatterjeeAAJR16,
  author       = {Rahul Chatterjee and
                  Anish Athayle and
                  Devdatta Akhawe and
                  Ari Juels and
                  Thomas Ristenpart},
  title        = {pASSWORD tYPOS and How to Correct Them Securely},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {799--818},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.53},
  doi          = {10.1109/SP.2016.53},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ChatterjeeAAJR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/TramerZJRR16,
  author       = {Florian Tram{\`{e}}r and
                  Fan Zhang and
                  Ari Juels and
                  Michael K. Reiter and
                  Thomas Ristenpart},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Stealing Machine Learning Models via Prediction APIs},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {601--618},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/tramer},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/TramerZJRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/TramerZJRR16,
  author       = {Florian Tram{\`{e}}r and
                  Fan Zhang and
                  Ari Juels and
                  Michael K. Reiter and
                  Thomas Ristenpart},
  title        = {Stealing Machine Learning Models via Prediction APIs},
  journal      = {CoRR},
  volume       = {abs/1609.02943},
  year         = {2016},
  url          = {http://arxiv.org/abs/1609.02943},
  eprinttype    = {arXiv},
  eprint       = {1609.02943},
  timestamp    = {Wed, 13 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/TramerZJRR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangCCJS16,
  author       = {Fan Zhang and
                  Ethan Cecchetti and
                  Kyle Croman and
                  Ari Juels and
                  Elaine Shi},
  title        = {Town Crier: An Authenticated Data Feed for Smart Contracts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {168},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/168},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangCCJS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DodisGGJR16,
  author       = {Yevgeniy Dodis and
                  Chaya Ganesh and
                  Alexander Golovnev and
                  Ari Juels and
                  Thomas Ristenpart},
  title        = {A Formal Treatment of Backdoored Pseudorandom Generators},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {306},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/306},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DodisGGJR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JuelsKS16,
  author       = {Ari Juels and
                  Ahmed E. Kosba and
                  Elaine Shi},
  title        = {The Ring of Gyges: Investigating the Future of Criminal Smart Contracts},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {358},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/358},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JuelsKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TramerZLHJS16,
  author       = {Florian Tram{\`{e}}r and
                  Fan Zhang and
                  Huang Lin and
                  Jean{-}Pierre Hubaux and
                  Ari Juels and
                  Elaine Shi},
  title        = {Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell
                  Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {635},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/635},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TramerZLHJS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JuelsKTT15,
  author       = {Ari Juels and
                  James Kelley and
                  Roberto Tamassia and
                  Nikos Triandopoulos},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Falcon Codes: Fast, Authenticated {LT} Codes (Or: Making Rapid Tornadoes
                  Unstoppable)},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1032--1047},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813728},
  doi          = {10.1145/2810103.2813728},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JuelsKTT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DodisGGJR15,
  author       = {Yevgeniy Dodis and
                  Chaya Ganesh and
                  Alexander Golovnev and
                  Ari Juels and
                  Thomas Ristenpart},
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {A Formal Treatment of Backdoored Pseudorandom Generators},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9056},
  pages        = {101--126},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46800-5\_5},
  doi          = {10.1007/978-3-662-46800-5\_5},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DodisGGJR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/HuangAFHJ15,
  author       = {Zhicong Huang and
                  Erman Ayday and
                  Jacques Fellay and
                  Jean{-}Pierre Hubaux and
                  Ari Juels},
  title        = {GenoGuard: Protecting Genomic Data against Brute-Force Attacks},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
                  CA, USA, May 17-21, 2015},
  pages        = {447--462},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SP.2015.34},
  doi          = {10.1109/SP.2015.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/HuangAFHJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChatterjeeBJR15,
  author       = {Rahul Chatterjee and
                  Joseph Bonneau and
                  Ari Juels and
                  Thomas Ristenpart},
  title        = {Cracking-Resistant Password Vaults Using Natural Language Encoders},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
                  CA, USA, May 17-21, 2015},
  pages        = {481--498},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SP.2015.36},
  doi          = {10.1109/SP.2015.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ChatterjeeBJR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/EverspaughCSJR15,
  author       = {Adam Everspaugh and
                  Rahul Chatterjee and
                  Samuel Scott and
                  Ari Juels and
                  Thomas Ristenpart},
  editor       = {Jaeyeon Jung and
                  Thorsten Holz},
  title        = {The Pythia {PRF} Service},
  booktitle    = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
                  D.C., USA, August 12-14, 2015},
  pages        = {547--562},
  publisher    = {{USENIX} Association},
  year         = {2015},
  url          = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/everspaugh},
  timestamp    = {Mon, 01 Feb 2021 08:42:57 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/EverspaughCSJR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/TramerAGHHHJL15,
  author       = {Florian Tram{\`{e}}r and
                  Vaggelis Atlidakis and
                  Roxana Geambasu and
                  Daniel J. Hsu and
                  Jean{-}Pierre Hubaux and
                  Mathias Humbert and
                  Ari Juels and
                  Huang Lin},
  title        = {Discovering Unwarranted Associations in Data-Driven Applications with
                  the FairTest Testing Toolkit},
  journal      = {CoRR},
  volume       = {abs/1510.02377},
  year         = {2015},
  url          = {http://arxiv.org/abs/1510.02377},
  eprinttype    = {arXiv},
  eprint       = {1510.02377},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/TramerAGHHHJL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EverspaughCSJR15,
  author       = {Adam Everspaugh and
                  Rahul Chatterjee and
                  Samuel Scott and
                  Ari Juels and
                  Thomas Ristenpart},
  title        = {The Pythia {PRF} Service},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {644},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/644},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EverspaughCSJR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChatterjeeBJR15,
  author       = {Rahul Chatterjee and
                  Joseph Bonneau and
                  Ari Juels and
                  Thomas Ristenpart},
  title        = {Cracking-Resistant Password Vaults using Natural Language Encoders},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {788},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/788},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChatterjeeBJR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/JuelsW14,
  author       = {Ari Juels and
                  Bonnie Wong},
  title        = {The interplay of neuroscience and cryptography: technical perspective},
  journal      = {Commun. {ACM}},
  volume       = {57},
  number       = {5},
  pages        = {109},
  year         = {2014},
  url          = {https://doi.org/10.1145/2594446},
  doi          = {10.1145/2594446},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/JuelsW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/JuelsR14,
  author       = {Ari Juels and
                  Thomas Ristenpart},
  title        = {Honey Encryption: Encryption beyond the Brute-Force Barrier},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {12},
  number       = {4},
  pages        = {59--62},
  year         = {2014},
  url          = {https://doi.org/10.1109/MSP.2014.67},
  doi          = {10.1109/MSP.2014.67},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/JuelsR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangJRR14,
  author       = {Yinqian Zhang and
                  Ari Juels and
                  Michael K. Reiter and
                  Thomas Ristenpart},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Cross-Tenant Side-Channel Attacks in PaaS Clouds},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {990--1003},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660356},
  doi          = {10.1145/2660267.2660356},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangJRR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YenHORJ14,
  author       = {Ting{-}Fang Yen and
                  Victor Heorhiadi and
                  Alina Oprea and
                  Michael K. Reiter and
                  Ari Juels},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {An Epidemiological Study of Malware Encounters in a Large Enterprise},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1117--1130},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660330},
  doi          = {10.1145/2660267.2660330},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YenHORJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/JuelsR14,
  author       = {Ari Juels and
                  Thomas Ristenpart},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {Honey Encryption: Security Beyond the Brute-Force Bound},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {293--310},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_17},
  doi          = {10.1007/978-3-642-55220-5\_17},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/JuelsR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/BowersHJT14,
  author       = {Kevin D. Bowers and
                  Catherine Hart and
                  Ari Juels and
                  Nikos Triandopoulos},
  editor       = {Angelos Stavrou and
                  Herbert Bos and
                  Georgios Portokalidis},
  title        = {PillarBox: Combating Next-Generation Malware with Fast Forward-Secure
                  Logging},
  booktitle    = {Research in Attacks, Intrusions and Defenses - 17th International
                  Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8688},
  pages        = {46--67},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11379-1\_3},
  doi          = {10.1007/978-3-319-11379-1\_3},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/BowersHJT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/Juels14,
  author       = {Ari Juels},
  editor       = {Sylvia L. Osborn and
                  Mahesh V. Tripunitara and
                  Ian M. Molloy},
  title        = {A bodyguard of lies: the use of honey objects in information security},
  booktitle    = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  '14, London, ON, Canada - June 25 - 27, 2014},
  pages        = {1--4},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2613087.2613088},
  doi          = {10.1145/2613087.2613088},
  timestamp    = {Wed, 02 Jun 2021 09:13:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/Juels14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MillerJSPK14,
  author       = {Andrew Miller and
                  Ari Juels and
                  Elaine Shi and
                  Bryan Parno and
                  Jonathan Katz},
  title        = {Permacoin: Repurposing Bitcoin Work for Data Preservation},
  booktitle    = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley,
                  CA, USA, May 18-21, 2014},
  pages        = {475--490},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SP.2014.37},
  doi          = {10.1109/SP.2014.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/MillerJSPK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JuelsR14,
  author       = {Ari Juels and
                  Thomas Ristenpart},
  title        = {Honey Encryption: Security Beyond the Brute-Force Bound},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {155},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/155},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JuelsR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JuelsKTT14,
  author       = {Ari Juels and
                  James Kelley and
                  Roberto Tamassia and
                  Nikos Triandopoulos},
  title        = {Falcon Codes: Fast, Authenticated {LT} Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {903},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/903},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JuelsKTT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/JuelsO13,
  author       = {Ari Juels and
                  Alina Oprea},
  title        = {New approaches to security and availability for cloud data},
  journal      = {Commun. {ACM}},
  volume       = {56},
  number       = {2},
  pages        = {64--73},
  year         = {2013},
  url          = {https://doi.org/10.1145/2408776.2408793},
  doi          = {10.1145/2408776.2408793},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/JuelsO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DijkJOR13,
  author       = {Marten van Dijk and
                  Ari Juels and
                  Alina Oprea and
                  Ronald L. Rivest},
  title        = {FlipIt: The Game of "Stealthy Takeover"},
  journal      = {J. Cryptol.},
  volume       = {26},
  number       = {4},
  pages        = {655--713},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00145-012-9134-5},
  doi          = {10.1007/S00145-012-9134-5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DijkJOR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/YenOOLRJK13,
  author       = {Ting{-}Fang Yen and
                  Alina Oprea and
                  Kaan Onarlioglu and
                  Todd Leetham and
                  William K. Robertson and
                  Ari Juels and
                  Engin Kirda},
  editor       = {Charles N. Payne Jr.},
  title        = {Beehive: large-scale log analysis for detecting suspicious activity
                  in enterprise networks},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {199--208},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523670},
  doi          = {10.1145/2523649.2523670},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/YenOOLRJK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JuelsR13,
  author       = {Ari Juels and
                  Ronald L. Rivest},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Honeywords: making password-cracking detectable},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {145--160},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516671},
  doi          = {10.1145/2508859.2516671},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JuelsR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RostamiJK13,
  author       = {Masoud Rostami and
                  Ari Juels and
                  Farinaz Koushanfar},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Heart-to-heart {(H2H):} authentication for implanted medical devices},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {1099--1112},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516658},
  doi          = {10.1145/2508859.2516658},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/RostamiJK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JuelsP13,
  author       = {Ari Juels and
                  Bryan Parno},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Fifth {ACM} cloud computing security workshop {(CCSW} 2013)},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {1487--1488},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2509033},
  doi          = {10.1145/2508859.2509033},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JuelsP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dac/RostamiBKJ13,
  author       = {Masoud Rostami and
                  Wayne P. Burleson and
                  Farinaz Koushanfar and
                  Ari Juels},
  title        = {Balancing security and utility in medical devices?},
  booktitle    = {The 50th Annual Design Automation Conference 2013, {DAC} '13, Austin,
                  TX, USA, May 29 - June 07, 2013},
  pages        = {13:1--13:6},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2463209.2488750},
  doi          = {10.1145/2463209.2488750},
  timestamp    = {Fri, 04 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dac/RostamiBKJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/BowersJRS13,
  author       = {Kevin D. Bowers and
                  Ari Juels and
                  Ronald L. Rivest and
                  Emily Shen},
  title        = {Drifting Keys: Impersonation detection for constrained devices},
  booktitle    = {Proceedings of the {IEEE} {INFOCOM} 2013, Turin, Italy, April 14-19,
                  2013},
  pages        = {1025--1033},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INFCOM.2013.6566892},
  doi          = {10.1109/INFCOM.2013.6566892},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/BowersJRS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ZanettiCJ13,
  author       = {Davide Zanetti and
                  Srdjan Capkun and
                  Ari Juels},
  title        = {Tailing {RFID} Tags for Clone Detection},
  booktitle    = {20th Annual Network and Distributed System Security Symposium, {NDSS}
                  2013, San Diego, California, USA, February 24-27, 2013},
  publisher    = {The Internet Society},
  year         = {2013},
  url          = {https://www.ndss-symposium.org/ndss2013/tailing-rfid-tags-clone-detection},
  timestamp    = {Mon, 01 Feb 2021 08:42:13 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ZanettiCJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2013ccsw,
  editor       = {Ari Juels and
                  Bryan Parno},
  title        = {CCSW'13, Proceedings of the 2013 {ACM} Cloud Computing Security Workshop,
                  Co-located with {CCS} 2013, Berlin, Germany, November 4, 2013},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {http://dl.acm.org/citation.cfm?id=2517488},
  isbn         = {978-1-4503-2490-8},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2013ccsw.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BowersHJT13,
  author       = {Kevin D. Bowers and
                  Catherine Hart and
                  Ari Juels and
                  Nikos Triandopoulos},
  title        = {Securing the Data in Big Data Security Analytics},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {625},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/625},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BowersHJT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/StefanovDJO12,
  author       = {Emil Stefanov and
                  Marten van Dijk and
                  Ari Juels and
                  Alina Oprea},
  editor       = {Robert H'obbes' Zakon},
  title        = {Iris: a scalable cloud file system with efficient integrity checks},
  booktitle    = {28th Annual Computer Security Applications Conference, {ACSAC} 2012,
                  Orlando, FL, USA, 3-7 December 2012},
  pages        = {229--238},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2420950.2420985},
  doi          = {10.1145/2420950.2420985},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/StefanovDJO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DijkJORST12,
  author       = {Marten van Dijk and
                  Ari Juels and
                  Alina Oprea and
                  Ronald L. Rivest and
                  Emil Stefanov and
                  Nikos Triandopoulos},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Hourglass schemes: how to prove that cloud files are encrypted},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {265--280},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382227},
  doi          = {10.1145/2382196.2382227},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/DijkJORST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangJRR12,
  author       = {Yinqian Zhang and
                  Ari Juels and
                  Michael K. Reiter and
                  Thomas Ristenpart},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Cross-VM side channels and their use to extract private keys},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {305--316},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382230},
  doi          = {10.1145/2382196.2382230},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangJRR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloud/FarleyJVRBS12,
  author       = {Benjamin Farley and
                  Ari Juels and
                  Venkatanathan Varadarajan and
                  Thomas Ristenpart and
                  Kevin D. Bowers and
                  Michael M. Swift},
  editor       = {Michael J. Carey and
                  Steven Hand},
  title        = {More for your money: exploiting performance heterogeneity in public
                  clouds},
  booktitle    = {{ACM} Symposium on Cloud Computing, {SOCC} '12, San Jose, CA, USA,
                  October 14-17, 2012},
  pages        = {20},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2391229.2391249},
  doi          = {10.1145/2391229.2391249},
  timestamp    = {Tue, 20 Dec 2022 17:33:10 +0100},
  biburl       = {https://dblp.org/rec/conf/cloud/FarleyJVRBS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gamesec/BowersDGJORT12,
  author       = {Kevin D. Bowers and
                  Marten van Dijk and
                  Robert Griffin and
                  Ari Juels and
                  Alina Oprea and
                  Ronald L. Rivest and
                  Nikos Triandopoulos},
  editor       = {Jens Grossklags and
                  Jean C. Walrand},
  title        = {Defending against the Unknown Enemy: Applying FlipIt to System Security},
  booktitle    = {Decision and Game Theory for Security - Third International Conference,
                  GameSec 2012, Budapest, Hungary, November 5-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7638},
  pages        = {248--263},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34266-0\_15},
  doi          = {10.1007/978-3-642-34266-0\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gamesec/BowersDGJORT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/leet/JuelsY12,
  author       = {Ari Juels and
                  Ting{-}Fang Yen},
  editor       = {Engin Kirda},
  title        = {Sherlock Holmes and the Case of the Advanced Persistent Threat},
  booktitle    = {5th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '12, San Jose, CA, USA, April 24, 2012},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/leet12/workshop-program/presentation/juels},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/leet/JuelsY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/rfidsec/2011,
  editor       = {Ari Juels and
                  Christof Paar},
  title        = {{RFID.} Security and Privacy - 7th International Workshop, RFIDSec
                  2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7055},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-25286-0},
  doi          = {10.1007/978-3-642-25286-0},
  isbn         = {978-3-642-25285-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DijkJOR12,
  author       = {Marten van Dijk and
                  Ari Juels and
                  Alina Oprea and
                  Ronald L. Rivest},
  title        = {FlipIt: The Game of "Stealthy Takeover"},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {103},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/103},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DijkJOR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BowersDGJORT12,
  author       = {Kevin D. Bowers and
                  Marten van Dijk and
                  Robert Griffin and
                  Ari Juels and
                  Alina Oprea and
                  Ronald L. Rivest and
                  Nikos Triandopoulos},
  title        = {Defending Against the Unknown Enemy: Applying FlipIt to System Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {579},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/579},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BowersDGJORT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BowersDJOR11,
  author       = {Kevin D. Bowers and
                  Marten van Dijk and
                  Ari Juels and
                  Alina Oprea and
                  Ronald L. Rivest},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {How to tell if your cloud files are vulnerable to drive crashes},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {501--514},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046707.2046766},
  doi          = {10.1145/2046707.2046766},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BowersDJOR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/DenningBDJ11,
  author       = {Tamara Denning and
                  Kevin D. Bowers and
                  Marten van Dijk and
                  Ari Juels},
  editor       = {Desney S. Tan and
                  Saleema Amershi and
                  Bo Begole and
                  Wendy A. Kellogg and
                  Manas Tungare},
  title        = {Exploring implicit memory for painless password recovery},
  booktitle    = {Proceedings of the International Conference on Human Factors in Computing
                  Systems, {CHI} 2011, Vancouver, BC, Canada, May 7-12, 2011},
  pages        = {2615--2618},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1978942.1979323},
  doi          = {10.1145/1978942.1979323},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/DenningBDJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhangJOR11,
  author       = {Yinqian Zhang and
                  Ari Juels and
                  Alina Oprea and
                  Michael K. Reiter},
  title        = {HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis},
  booktitle    = {32nd {IEEE} Symposium on Security and Privacy, {SP} 2011, 22-25 May
                  2011, Berkeley, California, {USA}},
  pages        = {313--328},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SP.2011.31},
  doi          = {10.1109/SP.2011.31},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ZhangJOR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StefanovDOJ11,
  author       = {Emil Stefanov and
                  Marten van Dijk and
                  Alina Oprea and
                  Ari Juels},
  title        = {Iris: {A} Scalable Cloud File System with Efficient Integrity Checks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {585},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/585},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StefanovDOJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Juels10,
  author       = {Ari Juels},
  title        = {Future tense},
  journal      = {Commun. {ACM}},
  volume       = {53},
  number       = {3},
  pages        = {120},
  year         = {2010},
  url          = {https://doi.org/10.1145/1666420.1666448},
  doi          = {10.1145/1666420.1666448},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Juels10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fast/OpreaJ10,
  author       = {Alina Oprea and
                  Ari Juels},
  editor       = {Randal C. Burns and
                  Kimberly Keeton},
  title        = {A Clean-Slate Look at Disk Scrubbing},
  booktitle    = {8th {USENIX} Conference on File and Storage Technologies, San Jose,
                  CA, USA, February 23-26, 2010},
  pages        = {57--70},
  publisher    = {{USENIX}},
  year         = {2010},
  url          = {http://www.usenix.org/events/fast10/tech/full\_papers/oprea.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fast/OpreaJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmsec/Juels10,
  author       = {Ari Juels},
  editor       = {Patrizio Campisi and
                  Jana Dittmann and
                  Scott Craver},
  title        = {Biometrics in electronic travel documents},
  booktitle    = {Multimedia and Security Workshop, MM{\&}Sec 2010, Roma, Italy,
                  September 9-10, 2010},
  pages        = {1--2},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1854229.1854231},
  doi          = {10.1145/1854229.1854231},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmsec/Juels10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/Juels10,
  author       = {Ari Juels},
  editor       = {Siddika Berna {\"{O}}rs Yal{\c{c}}in},
  title        = {The Physical Basis of {RFID} Security},
  booktitle    = {Radio Frequency Identification: Security and Privacy Issues - 6th
                  International Workshop, RFIDSec 2010, Istanbul, Turkey, June 8-9,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6370},
  pages        = {1},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16822-2\_1},
  doi          = {10.1007/978-3-642-16822-2\_1},
  timestamp    = {Fri, 03 Sep 2021 17:40:55 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/Juels10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DijkJ10,
  author       = {Marten van Dijk and
                  Ari Juels},
  editor       = {Wietse Z. Venema},
  title        = {On the Impossibility of Cryptography Alone for Privacy-Preserving
                  Cloud Computing},
  booktitle    = {5th {USENIX} Workshop on Hot Topics in Security, HotSec'10, Washington,
                  D.C., USA, August 10, 2010},
  publisher    = {{USENIX} Association},
  year         = {2010},
  url          = {https://www.usenix.org/conference/hotsec10/impossibility-cryptography-alone-privacy-preserving-cloud-computing},
  timestamp    = {Mon, 01 Feb 2021 08:43:16 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/DijkJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wote/JuelsCJ10,
  author       = {Ari Juels and
                  Dario Catalano and
                  Markus Jakobsson},
  editor       = {David Chaum and
                  Markus Jakobsson and
                  Ronald L. Rivest and
                  Peter Y. A. Ryan and
                  Josh Benaloh and
                  Miroslaw Kutylowski and
                  Ben Adida},
  title        = {Coercion-Resistant Electronic Elections},
  booktitle    = {Towards Trustworthy Elections, New Directions in Electronic Voting},
  series       = {Lecture Notes in Computer Science},
  volume       = {6000},
  pages        = {37--63},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12980-3\_2},
  doi          = {10.1007/978-3-642-12980-3\_2},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/wote/JuelsCJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BowersDJOR10,
  author       = {Kevin D. Bowers and
                  Marten van Dijk and
                  Ari Juels and
                  Alina Oprea and
                  Ronald L. Rivest},
  title        = {How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {214},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/214},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BowersDJOR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DijkJ10,
  author       = {Marten van Dijk and
                  Ari Juels},
  title        = {On the Impossibility of Cryptography Alone for Privacy-Preserving
                  Cloud Computing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {305},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/305},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DijkJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/JuelsW09,
  author       = {Ari Juels and
                  Stephen A. Weis},
  title        = {Defining strong privacy for {RFID}},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {7:1--7:23},
  year         = {2009},
  url          = {https://doi.org/10.1145/1609956.1609963},
  doi          = {10.1145/1609956.1609963},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/JuelsW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KoscherJBK09,
  author       = {Karl Koscher and
                  Ari Juels and
                  Vjekoslav Brajkovic and
                  Tadayoshi Kohno},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {{EPC} {RFID} tag security weaknesses and defenses: passport cards,
                  enhanced drivers licenses, and beyond},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {33--42},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653668},
  doi          = {10.1145/1653662.1653668},
  timestamp    = {Tue, 10 Nov 2020 19:58:07 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KoscherJBK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BowersJO09a,
  author       = {Kevin D. Bowers and
                  Ari Juels and
                  Alina Oprea},
  editor       = {Radu Sion and
                  Dawn Song},
  title        = {Proofs of retrievability: theory and implementation},
  booktitle    = {Proceedings of the first {ACM} Cloud Computing Security Workshop,
                  {CCSW} 2009, Chicago, IL, USA, November 13, 2009},
  pages        = {43--54},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655008.1655015},
  doi          = {10.1145/1655008.1655015},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BowersJO09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BowersJO09,
  author       = {Kevin D. Bowers and
                  Ari Juels and
                  Alina Oprea},
  editor       = {Ehab Al{-}Shaer and
                  Somesh Jha and
                  Angelos D. Keromytis},
  title        = {{HAIL:} a high-availability and integrity layer for cloud storage},
  booktitle    = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages        = {187--198},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653662.1653686},
  doi          = {10.1145/1653662.1653686},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BowersJO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/Juels09,
  author       = {Ari Juels},
  title        = {Power games in {RFID} security},
  booktitle    = {Proceedings of the 4th International Conference for Internet Technology
                  and Secured Transactions, {ICITST} 2009, London, UK, November 9-12,
                  2009},
  pages        = {1},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICITST.2009.5402509},
  doi          = {10.1109/ICITST.2009.5402509},
  timestamp    = {Mon, 09 Aug 2021 17:01:45 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/Juels09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/JakobssonJ09,
  author       = {Markus Jakobsson and
                  Ari Juels},
  editor       = {Anil Somayaji and
                  Richard Ford},
  title        = {Server-side detection of malware infection},
  booktitle    = {Proceedings of the 2009 Workshop on New Security Paradigms, Oxford,
                  United Kingdom, September 8-11, 2009},
  pages        = {11--22},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1719030.1719033},
  doi          = {10.1145/1719030.1719033},
  timestamp    = {Tue, 06 Nov 2018 16:58:38 +0100},
  biburl       = {https://dblp.org/rec/conf/nspw/JakobssonJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SalajeghehCRFJ09,
  author       = {Mastooreh Salajegheh and
                  Shane S. Clark and
                  Benjamin Ransford and
                  Kevin Fu and
                  Ari Juels},
  editor       = {Fabian Monrose},
  title        = {{CCCP:} Secure Remote Storage for Computational RFIDs},
  booktitle    = {18th {USENIX} Security Symposium, Montreal, Canada, August 10-14,
                  2009, Proceedings},
  pages        = {215--230},
  publisher    = {{USENIX} Association},
  year         = {2009},
  url          = {http://www.usenix.org/events/sec09/tech/full\_papers/salajegheh.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SalajeghehCRFJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JuelsPP08,
  author       = {Ari Juels and
                  Ravikanth Pappu and
                  Bryan Parno},
  editor       = {Paul C. van Oorschot},
  title        = {Unidirectional Key Distribution Across Time and Space with Applications
                  to {RFID} Security},
  booktitle    = {Proceedings of the 17th {USENIX} Security Symposium, July 28-August
                  1, 2008, San Jose, CA, {USA}},
  pages        = {75--90},
  publisher    = {{USENIX} Association},
  year         = {2008},
  url          = {http://www.usenix.org/events/sec08/tech/full\_papers/juels/juels.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JuelsPP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/Juels08,
  author       = {Ari Juels},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {{RFID} security: in the shoulder and on the loading dock},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352534},
  doi          = {10.1145/1352533.1352534},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/Juels08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/TsudikBJKMPR08,
  author       = {Gene Tsudik and
                  Mike Burmester and
                  Ari Juels and
                  Alfred Kobsa and
                  David Molnar and
                  Roberto Di Pietro and
                  Melanie R. Rieback},
  editor       = {Virgil D. Gligor and
                  Jean{-}Pierre Hubaux and
                  Radha Poovendran},
  title        = {{RFID} security and privacy: long-term research or short-term tinkering?},
  booktitle    = {Proceedings of the First {ACM} Conference on Wireless Network Security,
                  {WISEC} 2008, Alexandria, VA, USA, March 31 - April 02, 2008},
  pages        = {160},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352533.1352560},
  doi          = {10.1145/1352533.1352560},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/TsudikBJKMPR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JuelsPP08,
  author       = {Ari Juels and
                  Ravikanth Pappu and
                  Bryan Parno},
  title        = {Unidirectional Key Distribution Across Time and Space with Applications
                  to {RFID} Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {44},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/044},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JuelsPP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BowersJO08,
  author       = {Kevin D. Bowers and
                  Ari Juels and
                  Alina Oprea},
  title        = {Proofs of Retrievability: Theory and Implementation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {175},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/175},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BowersJO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BowersJO08a,
  author       = {Kevin D. Bowers and
                  Ari Juels and
                  Alina Oprea},
  title        = {{HAIL:} {A} High-Availability and Integrity Layer for Cloud Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {489},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/489},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BowersJO08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jamia/HalamkaJ07,
  author       = {John D. Halamka and
                  Ari Juels},
  title        = {In Response to: Letter to the Editor Regarding: "A Security Analysis
                  of the Verichip Implantable {RFID} Device"},
  journal      = {J. Am. Medical Informatics Assoc.},
  volume       = {14},
  number       = {2},
  pages        = {251},
  year         = {2007},
  url          = {https://doi.org/10.1197/jamia.M2339},
  doi          = {10.1197/JAMIA.M2339},
  timestamp    = {Wed, 10 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jamia/HalamkaJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChoiEJMY07,
  author       = {Seung Geol Choi and
                  Ariel Elbaz and
                  Ari Juels and
                  Tal Malkin and
                  Moti Yung},
  editor       = {Kaoru Kurosawa},
  title        = {Two-Party Computing with Encrypted Data},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kuching, Malaysia, December 2-6, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4833},
  pages        = {298--314},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76900-2\_18},
  doi          = {10.1007/978-3-540-76900-2\_18},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChoiEJMY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BaileyBGJ07,
  author       = {Daniel V. Bailey and
                  Dan Boneh and
                  Eu{-}Jin Goh and
                  Ari Juels},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Covert channels in privacy-preserving identification systems},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {297--306},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315283},
  doi          = {10.1145/1315245.1315283},
  timestamp    = {Tue, 10 Nov 2020 20:00:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BaileyBGJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JuelsK07,
  author       = {Ari Juels and
                  Burton S. Kaliski Jr.},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Pors: proofs of retrievability for large files},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {584--597},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315317},
  doi          = {10.1145/1315245.1315317},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JuelsK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Heydt-BenjaminBFJO07,
  author       = {Thomas S. Heydt{-}Benjamin and
                  Daniel V. Bailey and
                  Kevin Fu and
                  Ari Juels and
                  Tom O'Hare},
  editor       = {Sven Dietrich and
                  Rachna Dhamija},
  title        = {Vulnerabilities in First-Generation RFID-enabled Credit Cards},
  booktitle    = {Financial Cryptography and Data Security, 11th International Conference,
                  {FC} 2007, and 1st International Workshop on Usable Security, {USEC}
                  2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4886},
  pages        = {2--14},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77366-5\_2},
  doi          = {10.1007/978-3-540-77366-5\_2},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Heydt-BenjaminBFJO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/DefendFJ07,
  author       = {Benessa Defend and
                  Kevin Fu and
                  Ari Juels},
  title        = {Cryptanalysis of Two Lightweight {RFID} Authentication Schemes},
  booktitle    = {Fifth Annual {IEEE} International Conference on Pervasive Computing
                  and Communications - Workshops (PerCom Workshops 2007), 19-23 March
                  2007, White Plains, New York, {USA}},
  pages        = {211--216},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/PERCOMW.2007.34},
  doi          = {10.1109/PERCOMW.2007.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/DefendFJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/JuelsW07,
  author       = {Ari Juels and
                  Stephen A. Weis},
  title        = {Defining Strong Privacy for {RFID}},
  booktitle    = {Fifth Annual {IEEE} International Conference on Pervasive Computing
                  and Communications - Workshops (PerCom Workshops 2007), 19-23 March
                  2007, White Plains, New York, {USA}},
  pages        = {342--347},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/PERCOMW.2007.37},
  doi          = {10.1109/PERCOMW.2007.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/JuelsW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JuelsSJ07,
  author       = {Ari Juels and
                  Sid Stamm and
                  Markus Jakobsson},
  editor       = {Niels Provos},
  title        = {Combating Click Fraud via Premium Clicks},
  booktitle    = {Proceedings of the 16th {USENIX} Security Symposium, Boston, MA, USA,
                  August 6-10, 2007},
  publisher    = {{USENIX} Association},
  year         = {2007},
  url          = {https://www.usenix.org/conference/16th-usenix-security-symposium/combating-click-fraud-premium-clicks},
  timestamp    = {Mon, 01 Feb 2021 08:43:02 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JuelsSJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JuelsS06,
  author       = {Ari Juels and
                  Madhu Sudan},
  title        = {A Fuzzy Vault Scheme},
  journal      = {Des. Codes Cryptogr.},
  volume       = {38},
  number       = {2},
  pages        = {237--257},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-005-6343-z},
  doi          = {10.1007/S10623-005-6343-Z},
  timestamp    = {Tue, 14 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JuelsS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jamia/HalamkaJSW06,
  author       = {John D. Halamka and
                  Ari Juels and
                  Adam Stubblefield and
                  Jonathan Westhues},
  title        = {Technology Evaluation: The Security Implications of VeriChip Cloning},
  journal      = {J. Am. Medical Informatics Assoc.},
  volume       = {13},
  number       = {6},
  pages        = {601--607},
  year         = {2006},
  url          = {https://doi.org/10.1197/jamia.M2143},
  doi          = {10.1197/JAMIA.M2143},
  timestamp    = {Wed, 10 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jamia/HalamkaJSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/Juels06,
  author       = {Ari Juels},
  title        = {{RFID} security and privacy: a research survey},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {24},
  number       = {2},
  pages        = {381--394},
  year         = {2006},
  url          = {https://doi.org/10.1109/JSAC.2005.861395},
  doi          = {10.1109/JSAC.2005.861395},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/Juels06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BrainardJRSY06,
  author       = {John G. Brainard and
                  Ari Juels and
                  Ronald L. Rivest and
                  Michael Szydlo and
                  Moti Yung},
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {Fourth-factor authentication: somebody you know},
  booktitle    = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  pages        = {168--178},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405.1180427},
  doi          = {10.1145/1180405.1180427},
  timestamp    = {Wed, 24 Feb 2021 17:28:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BrainardJRSY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/Juels06,
  author       = {Ari Juels},
  editor       = {Louis Goubin and
                  Mitsuru Matsui},
  title        = {The Outer Limits of {RFID} Security},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2006, 8th International
                  Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4249},
  pages        = {231},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11894063\_18},
  doi          = {10.1007/11894063\_18},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/Juels06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BaileyJ06,
  author       = {Daniel V. Bailey and
                  Ari Juels},
  editor       = {Roberto De Prisco and
                  Moti Yung},
  title        = {Shoehorning Security into the {EPC} Tag Standard},
  booktitle    = {Security and Cryptography for Networks, 5th International Conference,
                  {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4116},
  pages        = {303--320},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11832072\_21},
  doi          = {10.1007/11832072\_21},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/BaileyJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/JuelsJJ06,
  author       = {Ari Juels and
                  Markus Jakobsson and
                  Tom N. Jagatic},
  title        = {Cache Cookies for Browser Authentication (Extended Abstract)},
  booktitle    = {2006 {IEEE} Symposium on Security and Privacy (S{\&}P 2006), 21-24
                  May 2006, Berkeley, California, {USA}},
  pages        = {301--305},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/SP.2006.8},
  doi          = {10.1109/SP.2006.8},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/JuelsJJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2006stc,
  editor       = {Ari Juels and
                  Gene Tsudik and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Proceedings of the 1st {ACM} Workshop on Scalable Trusted Computing,
                  {STC} 2006, Alexandria, VA, USA, November 3, 2006},
  publisher    = {{ACM}},
  year         = {2006},
  isbn         = {1-59593-548-7},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2006stc.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2006usa,
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405},
  doi          = {10.1145/1180405},
  timestamp    = {Wed, 24 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2006usa.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dim/2006,
  editor       = {Ari Juels and
                  Marianne Winslett and
                  Atsuhiro Goto},
  title        = {Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria,
                  VA, USA, November 3, 2006},
  publisher    = {{ACM}},
  year         = {2006},
  isbn         = {1-59593-547-9},
  timestamp    = {Tue, 15 May 2007 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dim/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sws/2006,
  editor       = {Ari Juels and
                  Ernesto Damiani and
                  Alban Gabillon},
  title        = {Proceedings of the 3rd {ACM} Workshop On Secure Web Services, {SWS}
                  2006, Alexandria, VA, USA, November 3, 2006},
  publisher    = {{ACM}},
  year         = {2006},
  isbn         = {1-59593-546-0},
  timestamp    = {Tue, 22 Apr 2008 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sws/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2006,
  editor       = {Ari Juels and
                  Marianne Winslett},
  title        = {Proceedings of the 2006 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2006, Alexandria, VA, USA, October 30, 2006},
  publisher    = {{ACM}},
  year         = {2006},
  isbn         = {1-59593-556-8},
  timestamp    = {Mon, 07 Apr 2008 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ws/2006,
  editor       = {Radha Poovendran and
                  Ari Juels},
  title        = {Proceedings of the 2006 {ACM} Workshop on Wireless Security, Los Angeles,
                  California, USA, September 29, 2006},
  publisher    = {{ACM}},
  year         = {2006},
  isbn         = {1-59593-557-6},
  timestamp    = {Thu, 07 Feb 2008 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ws/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JuelsW06,
  author       = {Ari Juels and
                  Stephen A. Weis},
  title        = {Defining Strong Privacy for {RFID}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {137},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/137},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JuelsW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/GarfinkelJP05,
  author       = {Simson L. Garfinkel and
                  Ari Juels and
                  Ravikanth Pappu},
  title        = {{RFID} Privacy: An Overview of Problems and Proposed Solutions},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {3},
  number       = {3},
  pages        = {34--43},
  year         = {2005},
  url          = {https://doi.org/10.1109/MSP.2005.78},
  doi          = {10.1109/MSP.2005.78},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/GarfinkelJP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JuelsW05,
  author       = {Ari Juels and
                  Stephen A. Weis},
  editor       = {Victor Shoup},
  title        = {Authenticating Pervasive Devices with Human Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3621},
  pages        = {293--308},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535218\_18},
  doi          = {10.1007/11535218\_18},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/JuelsW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/JuelsSB05,
  author       = {Ari Juels and
                  Paul F. Syverson and
                  Daniel V. Bailey},
  editor       = {George Danezis and
                  David M. Martin Jr.},
  title        = {High-Power Proxies for Enhancing {RFID} Privacy and Utility},
  booktitle    = {Privacy Enhancing Technologies, 5th International Workshop, {PET}
                  2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3856},
  pages        = {210--226},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11767831\_14},
  doi          = {10.1007/11767831\_14},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/JuelsSB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/JuelsMW05,
  author       = {Ari Juels and
                  David Molnar and
                  David A. Wagner},
  title        = {Security and Privacy Issues in E-passports},
  booktitle    = {First International Conference on Security and Privacy for Emerging
                  Areas in Communications Networks, SecureComm 2005, Athens, Greece,
                  5-9 September, 2005},
  pages        = {74--88},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/SECURECOMM.2005.59},
  doi          = {10.1109/SECURECOMM.2005.59},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/JuelsMW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Bono0SJRS05,
  author       = {Steve Bono and
                  Matthew Green and
                  Adam Stubblefield and
                  Ari Juels and
                  Aviel D. Rubin and
                  Michael Szydlo},
  editor       = {Patrick D. McDaniel},
  title        = {Security Analysis of a Cryptographically-Enabled {RFID} Device},
  booktitle    = {Proceedings of the 14th {USENIX} Security Symposium, Baltimore, MD,
                  USA, July 31 - August 5, 2005},
  publisher    = {{USENIX} Association},
  year         = {2005},
  url          = {https://www.usenix.org/conference/14th-usenix-security-symposium/security-analysis-cryptographically-enabled-rfid-device},
  timestamp    = {Mon, 01 Feb 2021 08:42:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Bono0SJRS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/JuelsCJ05,
  author       = {Ari Juels and
                  Dario Catalano and
                  Markus Jakobsson},
  editor       = {Vijay Atluri and
                  Sabrina De Capitani di Vimercati and
                  Roger Dingledine},
  title        = {Coercion-resistant electronic elections},
  booktitle    = {Proceedings of the 2005 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2005, Alexandria, VA, USA, November 7, 2005},
  pages        = {61--70},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102199.1102213},
  doi          = {10.1145/1102199.1102213},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/JuelsCJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ws/Juels05,
  author       = {Ari Juels},
  editor       = {Markus Jakobsson and
                  Radha Poovendran},
  title        = {Strengthening {EPC} tags against cloning},
  booktitle    = {Proceedings of the 2005 {ACM} Workshop on Wireless Security, Cologne,
                  Germany, September 2, 2005},
  pages        = {67--76},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1080793.1080805},
  doi          = {10.1145/1080793.1080805},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ws/Juels05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2005,
  editor       = {Vijay Atluri and
                  Catherine Meadows and
                  Ari Juels},
  title        = {Proceedings of the 12th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  publisher    = {{ACM}},
  year         = {2005},
  isbn         = {1-59593-226-7},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JuelsMW05,
  author       = {Ari Juels and
                  David Molnar and
                  David A. Wagner},
  title        = {Security and Privacy Issues in E-passports},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {95},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/095},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JuelsMW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GolleJ04,
  author       = {Philippe Golle and
                  Ari Juels},
  editor       = {Vijayalakshmi Atluri and
                  Birgit Pfitzmann and
                  Patrick D. McDaniel},
  title        = {Parallel mixing},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004},
  pages        = {220--226},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1030083.1030113},
  doi          = {10.1145/1030083.1030113},
  timestamp    = {Fri, 13 Nov 2020 16:10:44 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GolleJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WatersJHF04,
  author       = {Brent Waters and
                  Ari Juels and
                  J. Alex Halderman and
                  Edward W. Felten},
  editor       = {Vijayalakshmi Atluri and
                  Birgit Pfitzmann and
                  Patrick D. McDaniel},
  title        = {New client puzzle outsourcing techniques for DoS resistance},
  booktitle    = {Proceedings of the 11th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004},
  pages        = {246--256},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1030083.1030117},
  doi          = {10.1145/1030083.1030117},
  timestamp    = {Fri, 13 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WatersJHF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/GolleJJS04,
  author       = {Philippe Golle and
                  Markus Jakobsson and
                  Ari Juels and
                  Paul F. Syverson},
  editor       = {Tatsuaki Okamoto},
  title        = {Universal Re-encryption for Mixnets},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at
                  the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2964},
  pages        = {163--178},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24660-2\_14},
  doi          = {10.1007/978-3-540-24660-2\_14},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/GolleJJS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GolleJ04,
  author       = {Philippe Golle and
                  Ari Juels},
  editor       = {Christian Cachin and
                  Jan Camenisch},
  title        = {Dining Cryptographers Revisited},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Interlaken,
                  Switzerland, May 2-6, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3027},
  pages        = {456--473},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24676-3\_27},
  doi          = {10.1007/978-3-540-24676-3\_27},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GolleJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/Juels04,
  author       = {Ari Juels},
  title        = {"Yoking-Proofs" for {RFID} Tags},
  booktitle    = {2nd {IEEE} Conference on Pervasive Computing and Communications Workshops
                  (PerCom 2004 Workshops), 14-17 March 2004, Orlando, FL, {USA}},
  pages        = {138--143},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/PERCOMW.2004.1276920},
  doi          = {10.1109/PERCOMW.2004.1276920},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/Juels04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Juels04,
  author       = {Ari Juels},
  editor       = {Carlo Blundo and
                  Stelvio Cimato},
  title        = {Minimalist Cryptography for Low-Cost {RFID} Tags},
  booktitle    = {Security in Communication Networks, 4th International Conference,
                  {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3352},
  pages        = {149--164},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30598-9\_11},
  doi          = {10.1007/978-3-540-30598-9\_11},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Juels04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Juels04,
  author       = {Ari Juels},
  editor       = {Matt Blaze},
  title        = {{RFID:} Security and Privacy for Five-Cent Computers},
  booktitle    = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13,
                  2004, San Diego, CA, {USA}},
  publisher    = {{USENIX}},
  year         = {2004},
  url          = {http://www.usenix.org/publications/library/proceedings/sec04/tech/slides/juels.htm},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Juels04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/JuelsB04,
  author       = {Ari Juels and
                  John G. Brainard},
  editor       = {Vijay Atluri and
                  Paul F. Syverson and
                  Sabrina De Capitani di Vimercati},
  title        = {Soft blocking: flexible blocker tags on the cheap},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2004, Washington, DC, USA, October 28, 2004},
  pages        = {1--7},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029179.1029181},
  doi          = {10.1145/1029179.1029181},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/JuelsB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ws/Juels04,
  author       = {Ari Juels},
  editor       = {Markus Jakobsson and
                  Adrian Perrig},
  title        = {{RFID:} security and privacy for five-cent wireless devices},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Wireless Security, Philadelphia,
                  PA, USA, October 1, 2004},
  pages        = {31},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1023646.1023652},
  doi          = {10.1145/1023646.1023652},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ws/Juels04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2004,
  editor       = {Ari Juels},
  title        = {Financial Cryptography, 8th International Conference, {FC} 2004, Key
                  West, FL, USA, February 9-12, 2004. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3110},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b98935},
  doi          = {10.1007/B98935},
  isbn         = {3-540-22420-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JuelsRS03,
  author       = {Ari Juels and
                  Ronald L. Rivest and
                  Michael Szydlo},
  editor       = {Sushil Jajodia and
                  Vijayalakshmi Atluri and
                  Trent Jaeger},
  title        = {The blocker tag: selective blocking of {RFID} tags for consumer privacy},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  pages        = {103--111},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/948109.948126},
  doi          = {10.1145/948109.948126},
  timestamp    = {Tue, 10 Nov 2020 20:00:42 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JuelsRS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JuelsP03,
  author       = {Ari Juels and
                  Ravikanth Pappu},
  editor       = {Rebecca N. Wright},
  title        = {Squealing Euros: Privacy Protection in RFID-Enabled Banknotes},
  booktitle    = {Financial Cryptography, 7th International Conference, {FC} 2003, Guadeloupe,
                  French West Indies, January 27-30, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2742},
  pages        = {103--121},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45126-6\_8},
  doi          = {10.1007/978-3-540-45126-6\_8},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/JuelsP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/BrainardJKS03,
  author       = {John G. Brainard and
                  Ari Juels and
                  Burt Kaliski and
                  Michael Szydlo},
  title        = {A New Two-Server Approach for Authentication with Short Secrets},
  booktitle    = {Proceedings of the 12th {USENIX} Security Symposium, Washington, D.C.,
                  USA, August 4-8, 2003},
  publisher    = {{USENIX} Association},
  year         = {2003},
  url          = {https://www.usenix.org/conference/12th-usenix-security-symposium/new-two-server-approach-authentication-short-secrets},
  timestamp    = {Mon, 01 Feb 2021 08:43:16 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/BrainardJKS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GolleZBJJ02,
  author       = {Philippe Golle and
                  Sheng Zhong and
                  Dan Boneh and
                  Markus Jakobsson and
                  Ari Juels},
  editor       = {Yuliang Zheng},
  title        = {Optimistic Mixing for Exit-Polls},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Queenstown, New Zealand, December 1-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2501},
  pages        = {451--465},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36178-2\_28},
  doi          = {10.1007/3-540-36178-2\_28},
  timestamp    = {Wed, 02 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GolleZBJJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/JakobssonJN02,
  author       = {Markus Jakobsson and
                  Ari Juels and
                  Phong Q. Nguyen},
  editor       = {Bart Preneel},
  title        = {Proprietary Certificates},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at
                  the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2271},
  pages        = {164--181},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45760-7\_12},
  doi          = {10.1007/3-540-45760-7\_12},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/JakobssonJN02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JuelsS02,
  author       = {Ari Juels and
                  Michael Szydlo},
  editor       = {Matt Blaze},
  title        = {A Two-Server, Sealed-Bid Auction Protocol},
  booktitle    = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton,
                  Bermuda, March 11-14, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2357},
  pages        = {72--86},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36504-4\_6},
  doi          = {10.1007/3-540-36504-4\_6},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/JuelsS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/JuelsG02,
  author       = {Ari Juels and
                  Jorge Guajardo},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {{RSA} Key Generation with Verifiable Randomness},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {357--374},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_26},
  doi          = {10.1007/3-540-45664-3\_26},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/JuelsG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/JakobssonJR02,
  author       = {Markus Jakobsson and
                  Ari Juels and
                  Ronald L. Rivest},
  editor       = {Dan Boneh},
  title        = {Making Mix Nets Robust for Electronic Voting by Randomized Partial
                  Checking},
  booktitle    = {Proceedings of the 11th {USENIX} Security Symposium, San Francisco,
                  CA, USA, August 5-9, 2002},
  pages        = {339--353},
  publisher    = {{USENIX}},
  year         = {2002},
  url          = {http://www.usenix.org/publications/library/proceedings/sec02/jakobsson.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/JakobssonJR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JakobssonJR02,
  author       = {Markus Jakobsson and
                  Ari Juels and
                  Ronald L. Rivest},
  title        = {Making Mix Nets Robust For Electronic Voting By Randomized Partial
                  Checking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {25},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/025},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JakobssonJR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JuelsS02,
  author       = {Ari Juels and
                  Madhu Sudan},
  title        = {A Fuzzy Vault Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {93},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/093},
  timestamp    = {Tue, 14 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JuelsS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JuelsCJ02,
  author       = {Ari Juels and
                  Dario Catalano and
                  Markus Jakobsson},
  title        = {Coercion-Resistant Electronic Elections},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {165},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/165},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JuelsCJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FrykholmJ01,
  author       = {Niklas Frykholm and
                  Ari Juels},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {Error-tolerant password recovery},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {1--9},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.501985},
  doi          = {10.1145/501983.501985},
  timestamp    = {Tue, 10 Nov 2020 20:00:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FrykholmJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Juels01,
  author       = {Ari Juels},
  editor       = {David Naccache},
  title        = {Targeted Advertising ... And Privacy Too},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at
                  {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2020},
  pages        = {408--424},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45353-9\_30},
  doi          = {10.1007/3-540-45353-9\_30},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Juels01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/JakobssonJ01,
  author       = {Markus Jakobsson and
                  Ari Juels},
  editor       = {Ajay D. Kshemkalyani and
                  Nir Shavit},
  title        = {An optimally robust hybrid mix network},
  booktitle    = {Proceedings of the Twentieth Annual {ACM} Symposium on Principles
                  of Distributed Computing, {PODC} 2001, Newport, Rhode Island, USA,
                  August 26-29, 2001},
  pages        = {284--292},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/383962.384046},
  doi          = {10.1145/383962.384046},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/JakobssonJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JuelsP00,
  author       = {Ari Juels and
                  Marcus Peinado},
  title        = {Hiding Cliques for Cryptographic Security},
  journal      = {Des. Codes Cryptogr.},
  volume       = {20},
  number       = {3},
  pages        = {269--280},
  year         = {2000},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JuelsP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/JuelsJSH00,
  author       = {Ari Juels and
                  Markus Jakobsson and
                  Elizabeth A. M. Shriver and
                  Bruce Hillyer},
  title        = {How to turn loaded dice into fair coins},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {46},
  number       = {3},
  pages        = {911--921},
  year         = {2000},
  url          = {https://doi.org/10.1109/18.841170},
  doi          = {10.1109/18.841170},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/JuelsJSH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/JakobssonJ00,
  author       = {Markus Jakobsson and
                  Ari Juels},
  editor       = {Tatsuaki Okamoto},
  title        = {Mix and Match: Secure Function Evaluation via Ciphertexts},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kyoto, Japan, December 3-7, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1976},
  pages        = {162--177},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44448-3\_13},
  doi          = {10.1007/3-540-44448-3\_13},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/JakobssonJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/JakobssonJ00a,
  author       = {Markus Jakobsson and
                  Ari Juels},
  editor       = {Tatsuaki Okamoto},
  title        = {Addition of ElGamal Plaintexts},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kyoto, Japan, December 3-7, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1976},
  pages        = {346--358},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44448-3\_26},
  doi          = {10.1007/3-540-44448-3\_26},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/JakobssonJ00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HastadJJY00,
  author       = {Johan H{\aa}stad and
                  Jakob Jonsson and
                  Ari Juels and
                  Moti Yung},
  editor       = {Dimitris Gritzalis and
                  Sushil Jajodia and
                  Pierangela Samarati},
  title        = {Funkspiel schemes: an alternative to conventional tamper resistance},
  booktitle    = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and
                  Communications Security, Athens, Greece, November 1-4, 2000},
  pages        = {125--133},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/352600.352619},
  doi          = {10.1145/352600.352619},
  timestamp    = {Tue, 10 Nov 2020 20:00:15 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HastadJJY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JuelsW99,
  author       = {Ari Juels and
                  Martin Wattenberg},
  editor       = {Juzar Motiwalla and
                  Gene Tsudik},
  title        = {A Fuzzy Commitment Scheme},
  booktitle    = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
                  Communications Security, Singapore, November 1-4, 1999},
  pages        = {28--36},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/319709.319714},
  doi          = {10.1145/319709.319714},
  timestamp    = {Tue, 10 Nov 2020 20:00:25 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JuelsW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/JakobssonJ99,
  author       = {Markus Jakobsson and
                  Ari Juels},
  editor       = {Bart Preneel},
  title        = {Proofs of Work and Bread Pudding Protocols},
  booktitle    = {Secure Information Networks: Communications and Multimedia Security,
                  {IFIP} {TC6/TC11} Joint Working Conference on Communications and Multimedia
                  Security {(CMS} '99), September 20-21, 1999, Leuven, Belgium},
  series       = {{IFIP} Conference Proceedings},
  volume       = {152},
  pages        = {258--272},
  publisher    = {Kluwer},
  year         = {1999},
  timestamp    = {Mon, 14 Oct 2002 12:00:15 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/JakobssonJ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Juels99,
  author       = {Ari Juels},
  editor       = {Matthew K. Franklin},
  title        = {Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing},
  booktitle    = {Financial Cryptography, Third International Conference, FC'99, Anguilla,
                  British West Indies, February 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1648},
  pages        = {29--45},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48390-X\_3},
  doi          = {10.1007/3-540-48390-X\_3},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Juels99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/JuelsB99,
  author       = {Ari Juels and
                  John G. Brainard},
  title        = {Client Puzzles: {A} Cryptographic Countermeasure Against Connection
                  Depletion Attacks},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 1999, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {1999},
  url          = {https://www.ndss-symposium.org/ndss1999/cryptographic-defense-against-connection-depletion-attacks/},
  timestamp    = {Mon, 01 Feb 2021 08:42:19 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/JuelsB99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JakobssonSHJ98,
  author       = {Markus Jakobsson and
                  Elizabeth A. M. Shriver and
                  Bruce Hillyer and
                  Ari Juels},
  editor       = {Li Gong and
                  Michael K. Reiter},
  title        = {A Practical Secure Physical Random Bit Generator},
  booktitle    = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
                  Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  pages        = {103--111},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/288090.288114},
  doi          = {10.1145/288090.288114},
  timestamp    = {Tue, 10 Nov 2020 20:00:11 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JakobssonSHJ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JakobssonJ98,
  author       = {Markus Jakobsson and
                  Ari Juels},
  editor       = {Rafael Hirschfeld},
  title        = {X-Cash: Executable Digital Cash},
  booktitle    = {Financial Cryptography, Second International Conference, FC'98, Anguilla,
                  British West Indies, February 23-25, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1465},
  pages        = {16--27},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055470},
  doi          = {10.1007/BFB0055470},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/JakobssonJ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/JuelsP98,
  author       = {Ari Juels and
                  Marcus Peinado},
  editor       = {Howard J. Karloff},
  title        = {Hiding Cliques for Cryptographic Security},
  booktitle    = {Proceedings of the Ninth Annual {ACM-SIAM} Symposium on Discrete Algorithms,
                  25-27 January 1998, San Francisco, California, {USA}},
  pages        = {678--684},
  publisher    = {{ACM/SIAM}},
  year         = {1998},
  url          = {http://dl.acm.org/citation.cfm?id=314613.315047},
  timestamp    = {Thu, 05 Jul 2018 07:29:49 +0200},
  biburl       = {https://dblp.org/rec/conf/soda/JuelsP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JuelsLO97,
  author       = {Ari Juels and
                  Michael Luby and
                  Rafail Ostrovsky},
  editor       = {Burton S. Kaliski Jr.},
  title        = {Security of Blind Digital Signatures (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1294},
  pages        = {150--164},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052233},
  doi          = {10.1007/BFB0052233},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/JuelsLO97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nips/JuelsW95,
  author       = {Ari Juels and
                  Martin Wattenberg},
  editor       = {David S. Touretzky and
                  Michael Mozer and
                  Michael E. Hasselmo},
  title        = {Stochastic Hillclimbing as a Baseline Mathod for Evaluating Genetic
                  Algorithms},
  booktitle    = {Advances in Neural Information Processing Systems 8, NIPS, Denver,
                  CO, USA, November 27-30, 1995},
  pages        = {430--436},
  publisher    = {{MIT} Press},
  year         = {1995},
  url          = {http://papers.nips.cc/paper/1172-stochastic-hillclimbing-as-a-baseline-method-for-evaluating-genetic-algorithms},
  timestamp    = {Mon, 16 May 2022 15:41:51 +0200},
  biburl       = {https://dblp.org/rec/conf/nips/JuelsW95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics