default search action
Ari Juels
Person information
- affiliation: Cornell University, Cornell Tech, New York City, NY, USA
- affiliation (former): RSA Laboratories, Bedford, MA, USA
- affiliation (PhD 1996): University of California, Berkeley, CA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i55]Kushal Babel, Nerla Jean-Louis, Yan Ji, Ujval Misra, Mahimna Kelkar, Kosala Yapa Mudiyanselage, Andrew Miller, Ari Juels:
PROF: Protected Order Flow in a Profit-Seeking World. CoRR abs/2408.02303 (2024) - [i54]Kushal Babel, Nerla Jean-Louis, Yan Ji, Ujval Misra, Mahimna Kelkar, Kosala Yapa Mudiyanselage, Andrew Miller, Ari Juels:
PROF: Protected Order Flow in a Profit-Seeking World. IACR Cryptol. ePrint Arch. 2024: 1241 (2024) - [i53]Mahimna Kelkar, Yunqi Li, Nerla Jean-Louis, Carolina Ortega Pérez, Kushal Babel, Andrew Miller, Ari Juels:
The Sting Framework: Proving the Existence of Superclass Adversaries. IACR Cryptol. ePrint Arch. 2024: 1676 (2024) - 2023
- [j19]Weizhao Tang, Lucianna Kiffer, Giulia Fanti, Ari Juels:
Strategic Latency Reduction in Blockchain Peer-to-Peer Networks. Proc. ACM Meas. Anal. Comput. Syst. 7(2): 32:1-32:33 (2023) - [c122]Mahimna Kelkar, Soubhik Deb, Sishan Long, Ari Juels, Sreeram Kannan:
Themis: Fast, Strong Order-Fairness in Byzantine Consensus. CCS 2023: 475-489 - [c121]Kushal Babel, Mojan Javaheripi, Yan Ji, Mahimna Kelkar, Farinaz Koushanfar, Ari Juels:
Lanturn: Measuring Economic Security of Smart Contracts Through Adaptive Learning. CCS 2023: 1212-1226 - [c120]Tyler Kell, Haaroon Yousaf, Sarah Allen, Sarah Meiklejohn, Ari Juels:
Forsage: Anatomy of a Smart-Contract Pyramid Scheme. FC 2023: 241-258 - [c119]Weizhao Tang, Lucianna Kiffer, Giulia Fanti, Ari Juels:
Strategic Latency Reduction in Blockchain Peer-to-Peer Networks. SIGMETRICS (Abstracts) 2023: 93-94 - [c118]Kushal Babel, Philip Daian, Mahimna Kelkar, Ari Juels:
Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts. SP 2023: 2499-2516 - [i52]Joshua Z. Tan, Tara Merk, Sarah Hubbard, Eliza R. Oak, Joni Pirovich, Ellie Rennie, Rolf Hoefer, Michael Zargham, Jason Potts, Chris Berg, Reuben Youngblom, Primavera De Filippi, Seth Frey, Jeff Strnad, Morshed Mannan, Kelsie Nabben, Silke Noa Elrifai, Jake Hartnell, Benjamin Mako Hill, Alexia Maddox, Woojin Lim, Tobin South, Ari Juels, Dan Boneh:
Open Problems in DAOs. CoRR abs/2310.19201 (2023) - [i51]James Austgen, Andrés Fábrega, Sarah Allen, Kushal Babel, Mahimna Kelkar, Ari Juels:
DAO Decentralization: Voting-Bloc Entropy, Bribery, and Dark DAOs. CoRR abs/2311.03530 (2023) - [i50]Mahimna Kelkar, Kushal Babel, Philip Daian, James Austgen, Vitalik Buterin, Ari Juels:
Complete Knowledge: Preventing Encumbrance of Cryptographic Secrets. IACR Cryptol. ePrint Arch. 2023: 44 (2023) - [i49]Kushal Babel, Mojan Javaheripi, Yan Ji, Mahimna Kelkar, Farinaz Koushanfar, Ari Juels:
Lanturn: Measuring Economic Security of Smart Contracts Through Adaptive Learning. IACR Cryptol. ePrint Arch. 2023: 1338 (2023) - 2022
- [i48]Weizhao Tang, Lucianna Kiffer, Giulia Fanti, Ari Juels:
Strategic Latency Reduction in Blockchain Peer-to-Peer Networks. CoRR abs/2205.06837 (2022) - 2021
- [c117]Charlie Hou, Mingxun Zhou, Yan Ji, Phil Daian, Florian Tramèr, Giulia Fanti, Ari Juels:
SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning. NDSS 2021 - [c116]Deepak Maram, Harjasleen Malvai, Fan Zhang, Nerla Jean-Louis, Alexander Frolov, Tyler Kell, Tyrone Lobban, Christine Moy, Ari Juels, Andrew Miller:
CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability. SP 2021: 1348-1366 - [i47]Tyler Kell, Haaroon Yousaf, Sarah Allen, Sarah Meiklejohn, Ari Juels:
Forsage: Anatomy of a Smart-Contract Pyramid Scheme. CoRR abs/2105.04380 (2021) - [i46]Kushal Babel, Philip Daian, Mahimna Kelkar, Ari Juels:
Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts. CoRR abs/2109.04347 (2021) - [i45]Deepak Maram, Iddo Bentov, Mahimna Kelkar, Ari Juels:
GoAT: File Geolocation via Anchor Timestamping. IACR Cryptol. ePrint Arch. 2021: 697 (2021) - [i44]Kushal Babel, Philip Daian, Mahimna Kelkar, Ari Juels:
Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts. IACR Cryptol. ePrint Arch. 2021: 1147 (2021) - [i43]Mahimna Kelkar, Soubhik Deb, Sishan Long, Ari Juels, Sreeram Kannan:
Themis: Fast, Strong Order-Fairness in Byzantine Consensus. IACR Cryptol. ePrint Arch. 2021: 1465 (2021) - 2020
- [j18]Fan Zhang, Warren He, Raymond Cheng, Jernej Kos, Nicholas Hynes, Noah M. Johnson, Ari Juels, Andrew Miller, Dawn Song:
The Ekiden Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts. IEEE Secur. Priv. 18(3): 17-27 (2020) - [c115]Michael Mirkin, Yan Ji, Jonathan Pang, Ariah Klages-Mundt, Ittay Eyal, Ari Juels:
BDoS: Blockchain Denial-of-Service. CCS 2020: 601-619 - [c114]Fan Zhang, Deepak Maram, Harjasleen Malvai, Steven Goldfeder, Ari Juels:
DECO: Liberating Web Data Using Decentralized Oracles for TLS. CCS 2020: 1919-1938 - [c113]Mahimna Kelkar, Fan Zhang, Steven Goldfeder, Ari Juels:
Order-Fairness for Byzantine Consensus. CRYPTO (3) 2020: 451-480 - [c112]Philip Daian, Steven Goldfeder, Tyler Kell, Yunqi Li, Xueyuan Zhao, Iddo Bentov, Lorenz Breidenbach, Ari Juels:
Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability. SP 2020: 910-927 - [i42]Mahimna Kelkar, Fan Zhang, Steven Goldfeder, Ari Juels:
Order-Fairness for Byzantine Consensus. IACR Cryptol. ePrint Arch. 2020: 269 (2020) - [i41]Deepak Maram, Harjasleen Malvai, Fan Zhang, Nerla Jean-Louis, Alexander Frolov, Tyler Kell, Tyrone Lobban, Christine Moy, Ari Juels, Andrew Miller:
CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability. IACR Cryptol. ePrint Arch. 2020: 934 (2020)
2010 – 2019
- 2019
- [j17]Moritz Schneider, Sinisa Matetic, Ari Juels, Andrew Miller, Srdjan Capkun:
Secure Brokered Delegation Through DelegaTEE. IEEE Secur. Priv. 17(4): 43-52 (2019) - [j16]Lorenz Breidenbach, Philip Daian, Florian Tramèr, Ari Juels:
The Hydra Framework for Principled, Automated Bug Bounties. IEEE Secur. Priv. 17(4): 53-61 (2019) - [c111]Fan Zhang, Philip Daian, Iddo Bentov, Ian Miers, Ari Juels:
Paralysis Proofs: Secure Dynamic Access Structures for Cryptocurrency Custody and More. AFT 2019: 1-15 - [c110]Rahul Chatterjee, M. Sadegh Riazi, Tanmoy Chowdhury, Emanuela Marasco, Farinaz Koushanfar, Ari Juels:
Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms. CCS 2019: 1171-1186 - [c109]Ethan Cecchetti, Ben Fisch, Ian Miers, Ari Juels:
PIEs: Public Incompressible Encodings for Decentralized Storage. CCS 2019: 1351-1367 - [c108]Iddo Bentov, Yan Ji, Fan Zhang, Lorenz Breidenbach, Philip Daian, Ari Juels:
Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware. CCS 2019: 1521-1538 - [c107]Sai Krishna Deepak Maram, Fan Zhang, Lun Wang, Andrew Low, Yupeng Zhang, Ari Juels, Dawn Song:
CHURP: Dynamic-Committee Proactive Secret Sharing. CCS 2019: 2369-2386 - [c106]Raymond Cheng, Fan Zhang, Jernej Kos, Warren He, Nicholas Hynes, Noah M. Johnson, Ari Juels, Andrew Miller, Dawn Song:
Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts. EuroS&P 2019: 185-200 - [i40]Philip Daian, Steven Goldfeder, Tyler Kell, Yunqi Li, Xueyuan Zhao, Iddo Bentov, Lorenz Breidenbach, Ari Juels:
Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges. CoRR abs/1904.05234 (2019) - [i39]Fan Zhang, Sai Krishna Deepak Maram, Harjasleen Malvai, Steven Goldfeder, Ari Juels:
DECO: Liberating Web Data Using Decentralized Oracles for TLS. CoRR abs/1909.00938 (2019) - [i38]Charlie Hou, Mingxun Zhou, Yan Ji, Phil Daian, Florian Tramèr, Giulia Fanti, Ari Juels:
SquirRL: Automating Attack Discovery on Blockchain Incentive Mechanisms with Deep Reinforcement Learning. CoRR abs/1912.01798 (2019) - [i37]Michael Mirkin, Yan Ji, Jonathan Pang, Ariah Klages-Mundt, Ittay Eyal, Ari Juels:
BDoS: Blockchain Denial of Service. CoRR abs/1912.07497 (2019) - [i36]Sai Krishna Deepak Maram, Fan Zhang, Lun Wang, Andrew Low, Yupeng Zhang, Ari Juels, Dawn Song:
CHURP: Dynamic-Committee Proactive Secret Sharing. IACR Cryptol. ePrint Arch. 2019: 17 (2019) - [i35]Rahul Chatterjee, M. Sadegh Riazi, Tanmoy Chowdhury, Emanuela Marasco, Farinaz Koushanfar, Ari Juels:
Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms. IACR Cryptol. ePrint Arch. 2019: 1103 (2019) - 2018
- [c105]Lorenz Breidenbach, Philip Daian, Florian Tramèr, Ari Juels:
Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts. USENIX Security Symposium 2018: 1335-1352 - [c104]Sinisa Matetic, Moritz Schneider, Andrew Miller, Ari Juels, Srdjan Capkun:
DelegaTEE: Brokered Delegation Using Trusted Execution Environments. USENIX Security Symposium 2018: 1387-1403 - [i34]Raymond Cheng, Fan Zhang, Jernej Kos, Warren He, Nicholas Hynes, Noah M. Johnson, Ari Juels, Andrew Miller, Dawn Song:
Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution. CoRR abs/1804.05141 (2018) - [i33]Fan Zhang, Philip Daian, Iddo Bentov, Ari Juels:
Paralysis Proofs: Safe Access-Structure Updates for Cryptocurrencies and More. IACR Cryptol. ePrint Arch. 2018: 96 (2018) - [i32]Sinisa Matetic, Moritz Schneider, Andrew Miller, Ari Juels, Srdjan Capkun:
DelegaTEE: Brokered Delegation Using Trusted Execution Environments. IACR Cryptol. ePrint Arch. 2018: 160 (2018) - [i31]Ethan Cecchetti, Ian Miers, Ari Juels:
PIEs: Public Incompressible Encodings for Decentralized Storage. IACR Cryptol. ePrint Arch. 2018: 684 (2018) - 2017
- [j15]Jay Aikat, Aditya Akella, Jeffrey S. Chase, Ari Juels, Michael K. Reiter, Thomas Ristenpart, Vyas Sekar, Michael M. Swift:
Rethinking Security in the Era of Cloud Computing. IEEE Secur. Priv. 15(3): 60-69 (2017) - [c103]Ethan Cecchetti, Fan Zhang, Yan Ji, Ahmed E. Kosba, Ari Juels, Elaine Shi:
Solidus: Confidential Distributed Ledger Transactions via PVORM. CCS 2017: 701-717 - [c102]Joanne Woodage, Rahul Chatterjee, Yevgeniy Dodis, Ari Juels, Thomas Ristenpart:
A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing. CRYPTO (3) 2017: 682-710 - [c101]Florian Tramèr, Fan Zhang, Huang Lin, Jean-Pierre Hubaux, Ari Juels, Elaine Shi:
Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge. EuroS&P 2017: 19-34 - [c100]Florian Tramèr, Vaggelis Atlidakis, Roxana Geambasu, Daniel J. Hsu, Jean-Pierre Hubaux, Mathias Humbert, Ari Juels, Huang Lin:
FairTest: Discovering Unwarranted Associations in Data-Driven Applications. EuroS&P 2017: 401-416 - [c99]Philip Daian, Ittay Eyal, Ari Juels, Emin Gün Sirer:
(Short Paper) PieceWork: Generalized Outsourcing Control for Proofs of Work. Financial Cryptography Workshops 2017: 182-190 - [c98]Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David M. Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun:
ROTE: Rollback Protection for Trusted Execution. USENIX Security Symposium 2017: 1289-1306 - [c97]Fan Zhang, Ittay Eyal, Robert Escriva, Ari Juels, Robbert van Renesse:
REM: Resource-Efficient Mining for Blockchains. USENIX Security Symposium 2017: 1427-1444 - [i30]Sinisa Matetic, Mansoor Ahmed, Kari Kostiainen, Aritra Dhar, David M. Sommer, Arthur Gervais, Ari Juels, Srdjan Capkun:
ROTE: Rollback Protection for Trusted Execution. IACR Cryptol. ePrint Arch. 2017: 48 (2017) - [i29]Fan Zhang, Ittay Eyal, Robert Escriva, Ari Juels, Robbert van Renesse:
REM: Resource-Efficient Mining for Blockchains. IACR Cryptol. ePrint Arch. 2017: 179 (2017) - [i28]Ethan Cecchetti, Fan Zhang, Yan Ji, Ahmed E. Kosba, Ari Juels, Elaine Shi:
Solidus: Confidential Distributed Ledger Transactions via PVORM. IACR Cryptol. ePrint Arch. 2017: 317 (2017) - [i27]Joanne Woodage, Rahul Chatterjee, Yevgeniy Dodis, Ari Juels, Thomas Ristenpart:
A New Distribution Sensitive Secure Sketch and a Comparison Between Approaches to Typo-Tolerant Authentication. IACR Cryptol. ePrint Arch. 2017: 542 (2017) - [i26]Lorenz Breidenbach, Philip Daian, Florian Tramèr, Ari Juels:
Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts. IACR Cryptol. ePrint Arch. 2017: 1090 (2017) - [i25]Iddo Bentov, Yan Ji, Fan Zhang, Yunqi Li, Xueyuan Zhao, Lorenz Breidenbach, Philip Daian, Ari Juels:
Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware. IACR Cryptol. ePrint Arch. 2017: 1153 (2017) - 2016
- [j14]Jean-Pierre Hubaux, Ari Juels:
Privacy is dead, long live privacy. Commun. ACM 59(6): 39-41 (2016) - [c96]Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, Elaine Shi:
Town Crier: An Authenticated Data Feed for Smart Contracts. CCS 2016: 270-282 - [c95]Ari Juels, Ahmed E. Kosba, Elaine Shi:
The Ring of Gyges: Investigating the Future of Criminal Smart Contracts. CCS 2016: 283-295 - [c94]Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed E. Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin Gün Sirer, Dawn Song, Roger Wattenhofer:
On Scaling Decentralized Blockchains - (A Position Paper). Financial Cryptography Workshops 2016: 106-125 - [c93]Bill Marino, Ari Juels:
Setting Standards for Altering and Undoing Smart Contracts. RuleML 2016: 151-166 - [c92]Rahul Chatterjee, Anish Athayle, Devdatta Akhawe, Ari Juels, Thomas Ristenpart:
pASSWORD tYPOS and How to Correct Them Securely. IEEE Symposium on Security and Privacy 2016: 799-818 - [c91]Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Stealing Machine Learning Models via Prediction APIs. USENIX Security Symposium 2016: 601-618 - [i24]Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Stealing Machine Learning Models via Prediction APIs. CoRR abs/1609.02943 (2016) - [i23]Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, Elaine Shi:
Town Crier: An Authenticated Data Feed for Smart Contracts. IACR Cryptol. ePrint Arch. 2016: 168 (2016) - [i22]Yevgeniy Dodis, Chaya Ganesh, Alexander Golovnev, Ari Juels, Thomas Ristenpart:
A Formal Treatment of Backdoored Pseudorandom Generators. IACR Cryptol. ePrint Arch. 2016: 306 (2016) - [i21]Ari Juels, Ahmed E. Kosba, Elaine Shi:
The Ring of Gyges: Investigating the Future of Criminal Smart Contracts. IACR Cryptol. ePrint Arch. 2016: 358 (2016) - [i20]Florian Tramèr, Fan Zhang, Huang Lin, Jean-Pierre Hubaux, Ari Juels, Elaine Shi:
Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge. IACR Cryptol. ePrint Arch. 2016: 635 (2016) - 2015
- [c90]Ari Juels, James Kelley, Roberto Tamassia, Nikos Triandopoulos:
Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable). CCS 2015: 1032-1047 - [c89]Yevgeniy Dodis, Chaya Ganesh, Alexander Golovnev, Ari Juels, Thomas Ristenpart:
A Formal Treatment of Backdoored Pseudorandom Generators. EUROCRYPT (1) 2015: 101-126 - [c88]Zhicong Huang, Erman Ayday, Jacques Fellay, Jean-Pierre Hubaux, Ari Juels:
GenoGuard: Protecting Genomic Data against Brute-Force Attacks. IEEE Symposium on Security and Privacy 2015: 447-462 - [c87]Rahul Chatterjee, Joseph Bonneau, Ari Juels, Thomas Ristenpart:
Cracking-Resistant Password Vaults Using Natural Language Encoders. IEEE Symposium on Security and Privacy 2015: 481-498 - [c86]Adam Everspaugh, Rahul Chatterjee, Samuel Scott, Ari Juels, Thomas Ristenpart:
The Pythia PRF Service. USENIX Security Symposium 2015: 547-562 - [i19]Florian Tramèr, Vaggelis Atlidakis, Roxana Geambasu, Daniel J. Hsu, Jean-Pierre Hubaux, Mathias Humbert, Ari Juels, Huang Lin:
Discovering Unwarranted Associations in Data-Driven Applications with the FairTest Testing Toolkit. CoRR abs/1510.02377 (2015) - [i18]Adam Everspaugh, Rahul Chatterjee, Samuel Scott, Ari Juels, Thomas Ristenpart:
The Pythia PRF Service. IACR Cryptol. ePrint Arch. 2015: 644 (2015) - [i17]Rahul Chatterjee, Joseph Bonneau, Ari Juels, Thomas Ristenpart:
Cracking-Resistant Password Vaults using Natural Language Encoders. IACR Cryptol. ePrint Arch. 2015: 788 (2015) - 2014
- [j13]Ari Juels, Bonnie Wong:
The interplay of neuroscience and cryptography: technical perspective. Commun. ACM 57(5): 109 (2014) - [j12]Ari Juels, Thomas Ristenpart:
Honey Encryption: Encryption beyond the Brute-Force Barrier. IEEE Secur. Priv. 12(4): 59-62 (2014) - [c85]Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Cross-Tenant Side-Channel Attacks in PaaS Clouds. CCS 2014: 990-1003 - [c84]Ting-Fang Yen, Victor Heorhiadi, Alina Oprea, Michael K. Reiter, Ari Juels:
An Epidemiological Study of Malware Encounters in a Large Enterprise. CCS 2014: 1117-1130 - [c83]Ari Juels, Thomas Ristenpart:
Honey Encryption: Security Beyond the Brute-Force Bound. EUROCRYPT 2014: 293-310 - [c82]Kevin D. Bowers, Catherine Hart, Ari Juels, Nikos Triandopoulos:
PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging. RAID 2014: 46-67 - [c81]Ari Juels:
A bodyguard of lies: the use of honey objects in information security. SACMAT 2014: 1-4 - [c80]Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, Jonathan Katz:
Permacoin: Repurposing Bitcoin Work for Data Preservation. IEEE Symposium on Security and Privacy 2014: 475-490 - [i16]Ari Juels, Thomas Ristenpart:
Honey Encryption: Security Beyond the Brute-Force Bound. IACR Cryptol. ePrint Arch. 2014: 155 (2014) - [i15]Ari Juels, James Kelley, Roberto Tamassia, Nikos Triandopoulos:
Falcon Codes: Fast, Authenticated LT Codes. IACR Cryptol. ePrint Arch. 2014: 903 (2014) - 2013
- [j11]Ari Juels, Alina Oprea:
New approaches to security and availability for cloud data. Commun. ACM 56(2): 64-73 (2013) - [j10]Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest:
FlipIt: The Game of "Stealthy Takeover". J. Cryptol. 26(4): 655-713 (2013) - [c79]Ting-Fang Yen, Alina Oprea, Kaan Onarlioglu, Todd Leetham, William K. Robertson, Ari Juels, Engin Kirda:
Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks. ACSAC 2013: 199-208 - [c78]Ari Juels, Ronald L. Rivest:
Honeywords: making password-cracking detectable. CCS 2013: 145-160 - [c77]Masoud Rostami, Ari Juels, Farinaz Koushanfar:
Heart-to-heart (H2H): authentication for implanted medical devices. CCS 2013: 1099-1112 - [c76]Ari Juels, Bryan Parno:
Fifth ACM cloud computing security workshop (CCSW 2013). CCS 2013: 1487-1488 - [c75]Masoud Rostami, Wayne P. Burleson, Farinaz Koushanfar, Ari Juels:
Balancing security and utility in medical devices? DAC 2013: 13:1-13:6 - [c74]Kevin D. Bowers, Ari Juels, Ronald L. Rivest, Emily Shen:
Drifting Keys: Impersonation detection for constrained devices. INFOCOM 2013: 1025-1033 - [c73]Davide Zanetti, Srdjan Capkun, Ari Juels:
Tailing RFID Tags for Clone Detection. NDSS 2013 - [e10]Ari Juels, Bryan Parno:
CCSW'13, Proceedings of the 2013 ACM Cloud Computing Security Workshop, Co-located with CCS 2013, Berlin, Germany, November 4, 2013. ACM 2013, ISBN 978-1-4503-2490-8 [contents] - [i14]Kevin D. Bowers, Catherine Hart, Ari Juels, Nikos Triandopoulos:
Securing the Data in Big Data Security Analytics. IACR Cryptol. ePrint Arch. 2013: 625 (2013) - 2012
- [c72]Emil Stefanov, Marten van Dijk, Ari Juels, Alina Oprea:
Iris: a scalable cloud file system with efficient integrity checks. ACSAC 2012: 229-238 - [c71]Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest, Emil Stefanov, Nikos Triandopoulos:
Hourglass schemes: how to prove that cloud files are encrypted. CCS 2012: 265-280 - [c70]Yinqian Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart:
Cross-VM side channels and their use to extract private keys. CCS 2012: 305-316 - [c69]Benjamin Farley, Ari Juels, Venkatanathan Varadarajan, Thomas Ristenpart, Kevin D. Bowers, Michael M. Swift:
More for your money: exploiting performance heterogeneity in public clouds. SoCC 2012: 20 - [c68]Kevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest, Nikos Triandopoulos:
Defending against the Unknown Enemy: Applying FlipIt to System Security. GameSec 2012: 248-263 - [c67]Ari Juels, Ting-Fang Yen:
Sherlock Holmes and the Case of the Advanced Persistent Threat. LEET 2012 - [e9]Ari Juels, Christof Paar:
RFID. Security and Privacy - 7th International Workshop, RFIDSec 2011, Amherst, USA, June 26-28, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7055, Springer 2012, ISBN 978-3-642-25285-3 [contents] - [i13]Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest:
FlipIt: The Game of "Stealthy Takeover". IACR Cryptol. ePrint Arch. 2012: 103 (2012) - [i12]Kevin D. Bowers, Marten van Dijk, Robert Griffin, Ari Juels, Alina Oprea, Ronald L. Rivest, Nikos Triandopoulos:
Defending Against the Unknown Enemy: Applying FlipIt to System Security. IACR Cryptol. ePrint Arch. 2012: 579 (2012) - 2011
- [c66]Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest:
How to tell if your cloud files are vulnerable to drive crashes. CCS 2011: 501-514 - [c65]Tamara Denning, Kevin D. Bowers, Marten van Dijk, Ari Juels:
Exploring implicit memory for painless password recovery. CHI 2011: 2615-2618 - [c64]Yinqian Zhang, Ari Juels, Alina Oprea, Michael K. Reiter:
HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis. IEEE Symposium on Security and Privacy 2011: 313-328 - [i11]Emil Stefanov, Marten van Dijk, Alina Oprea, Ari Juels:
Iris: A Scalable Cloud File System with Efficient Integrity Checks. IACR Cryptol. ePrint Arch. 2011: 585 (2011) - 2010
- [j9]Ari Juels:
Future tense. Commun. ACM 53(3): 120- (2010) - [c63]Alina Oprea, Ari Juels:
A Clean-Slate Look at Disk Scrubbing. FAST 2010: 57-70 - [c62]Ari Juels:
Biometrics in electronic travel documents. MM&Sec 2010: 1-2 - [c61]Ari Juels:
The Physical Basis of RFID Security. RFIDSec 2010: 1 - [c60]Marten van Dijk, Ari Juels:
On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing. HotSec 2010 - [c59]Ari Juels, Dario Catalano, Markus Jakobsson:
Coercion-Resistant Electronic Elections. Towards Trustworthy Elections 2010: 37-63 - [i10]Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina Oprea, Ronald L. Rivest:
How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes. IACR Cryptol. ePrint Arch. 2010: 214 (2010) - [i9]Marten van Dijk, Ari Juels:
On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing. IACR Cryptol. ePrint Arch. 2010: 305 (2010)
2000 – 2009
- 2009
- [j8]Ari Juels, Stephen A. Weis:
Defining strong privacy for RFID. ACM Trans. Inf. Syst. Secur. 13(1): 7:1-7:23 (2009) - [c58]Karl Koscher, Ari Juels, Vjekoslav Brajkovic, Tadayoshi Kohno:
EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond. CCS 2009: 33-42 - [c57]Kevin D. Bowers, Ari Juels, Alina Oprea:
Proofs of retrievability: theory and implementation. CCSW 2009: 43-54 - [c56]Kevin D. Bowers, Ari Juels, Alina Oprea:
HAIL: a high-availability and integrity layer for cloud storage. CCS 2009: 187-198 - [c55]Ari Juels:
Power games in RFID security. ICITST 2009: 1 - [c54]Markus Jakobsson, Ari Juels:
Server-side detection of malware infection. NSPW 2009: 11-22 - [c53]Mastooreh Salajegheh, Shane S. Clark, Benjamin Ransford, Kevin Fu, Ari Juels:
CCCP: Secure Remote Storage for Computational RFIDs. USENIX Security Symposium 2009: 215-230 - 2008
- [c52]Ari Juels, Ravikanth Pappu, Bryan Parno:
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security. USENIX Security Symposium 2008: 75-90 - [c51]Ari Juels:
RFID security: in the shoulder and on the loading dock. WISEC 2008: 1 - [c50]Gene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, Melanie R. Rieback:
RFID security and privacy: long-term research or short-term tinkering? WISEC 2008: 160 - [i8]Ari Juels, Ravikanth Pappu, Bryan Parno:
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security. IACR Cryptol. ePrint Arch. 2008: 44 (2008) - [i7]Kevin D. Bowers, Ari Juels, Alina Oprea:
Proofs of Retrievability: Theory and Implementation. IACR Cryptol. ePrint Arch. 2008: 175 (2008) - [i6]Kevin D. Bowers, Ari Juels, Alina Oprea:
HAIL: A High-Availability and Integrity Layer for Cloud Storage. IACR Cryptol. ePrint Arch. 2008: 489 (2008) - 2007
- [j7]John D. Halamka, Ari Juels:
In Response to: Letter to the Editor Regarding: "A Security Analysis of the Verichip Implantable RFID Device". J. Am. Medical Informatics Assoc. 14(2): 251 (2007) - [c49]Seung Geol Choi, Ariel Elbaz, Ari Juels, Tal Malkin, Moti Yung:
Two-Party Computing with Encrypted Data. ASIACRYPT 2007: 298-314 - [c48]Daniel V. Bailey, Dan Boneh, Eu-Jin Goh, Ari Juels:
Covert channels in privacy-preserving identification systems. CCS 2007: 297-306 - [c47]Ari Juels, Burton S. Kaliski Jr.:
Pors: proofs of retrievability for large files. CCS 2007: 584-597 - [c46]Thomas S. Heydt-Benjamin, Daniel V. Bailey, Kevin Fu, Ari Juels, Tom O'Hare:
Vulnerabilities in First-Generation RFID-enabled Credit Cards. Financial Cryptography 2007: 2-14 - [c45]Benessa Defend, Kevin Fu, Ari Juels:
Cryptanalysis of Two Lightweight RFID Authentication Schemes. PerCom Workshops 2007: 211-216 - [c44]Ari Juels, Stephen A. Weis:
Defining Strong Privacy for RFID. PerCom Workshops 2007: 342-347 - [c43]Ari Juels, Sid Stamm, Markus Jakobsson:
Combating Click Fraud via Premium Clicks. USENIX Security Symposium 2007 - 2006
- [j6]Ari Juels, Madhu Sudan:
A Fuzzy Vault Scheme. Des. Codes Cryptogr. 38(2): 237-257 (2006) - [j5]John D. Halamka, Ari Juels, Adam Stubblefield, Jonathan Westhues:
Technology Evaluation: The Security Implications of VeriChip Cloning. J. Am. Medical Informatics Assoc. 13(6): 601-607 (2006) - [j4]Ari Juels:
RFID security and privacy: a research survey. IEEE J. Sel. Areas Commun. 24(2): 381-394 (2006) - [c42]John G. Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung:
Fourth-factor authentication: somebody you know. CCS 2006: 168-178 - [c41]Ari Juels:
The Outer Limits of RFID Security. CHES 2006: 231 - [c40]Daniel V. Bailey, Ari Juels:
Shoehorning Security into the EPC Tag Standard. SCN 2006: 303-320 - [c39]Ari Juels, Markus Jakobsson, Tom N. Jagatic:
Cache Cookies for Browser Authentication (Extended Abstract). S&P 2006: 301-305 - [e8]Ari Juels, Gene Tsudik, Shouhuai Xu, Moti Yung:
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006. ACM 2006, ISBN 1-59593-548-7 [contents] - [e7]Ari Juels, Rebecca N. Wright, Sabrina De Capitani di Vimercati:
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006. ACM 2006 [contents] - [e6]Ari Juels, Marianne Winslett, Atsuhiro Goto:
Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria, VA, USA, November 3, 2006. ACM 2006, ISBN 1-59593-547-9 [contents] - [e5]Ari Juels, Ernesto Damiani, Alban Gabillon:
Proceedings of the 3rd ACM Workshop On Secure Web Services, SWS 2006, Alexandria, VA, USA, November 3, 2006. ACM 2006, ISBN 1-59593-546-0 [contents] - [e4]Ari Juels, Marianne Winslett:
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, WPES 2006, Alexandria, VA, USA, October 30, 2006. ACM 2006, ISBN 1-59593-556-8 [contents] - [e3]Radha Poovendran, Ari Juels:
Proceedings of the 2006 ACM Workshop on Wireless Security, Los Angeles, California, USA, September 29, 2006. ACM 2006, ISBN 1-59593-557-6 [contents] - [i5]Ari Juels, Stephen A. Weis:
Defining Strong Privacy for RFID. IACR Cryptol. ePrint Arch. 2006: 137 (2006) - 2005
- [j3]Simson L. Garfinkel, Ari Juels, Ravikanth Pappu:
RFID Privacy: An Overview of Problems and Proposed Solutions. IEEE Secur. Priv. 3(3): 34-43 (2005) - [c38]Ari Juels, Stephen A. Weis:
Authenticating Pervasive Devices with Human Protocols. CRYPTO 2005: 293-308 - [c37]Ari Juels, Paul F. Syverson, Daniel V. Bailey:
High-Power Proxies for Enhancing RFID Privacy and Utility. Privacy Enhancing Technologies 2005: 210-226 - [c36]Ari Juels, David Molnar, David A. Wagner:
Security and Privacy Issues in E-passports. SecureComm 2005: 74-88 - [c35]Steve Bono, Matthew Green, Adam Stubblefield, Ari Juels, Aviel D. Rubin, Michael Szydlo:
Security Analysis of a Cryptographically-Enabled RFID Device. USENIX Security Symposium 2005 - [c34]Ari Juels, Dario Catalano, Markus Jakobsson:
Coercion-resistant electronic elections. WPES 2005: 61-70 - [c33]Ari Juels:
Strengthening EPC tags against cloning. Workshop on Wireless Security 2005: 67-76 - [e2]Vijay Atluri, Catherine Meadows, Ari Juels:
Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005. ACM 2005, ISBN 1-59593-226-7 [contents] - [i4]Ari Juels, David Molnar, David A. Wagner:
Security and Privacy Issues in E-passports. IACR Cryptol. ePrint Arch. 2005: 95 (2005) - 2004
- [c32]Philippe Golle, Ari Juels:
Parallel mixing. CCS 2004: 220-226 - [c31]Brent Waters, Ari Juels, J. Alex Halderman, Edward W. Felten:
New client puzzle outsourcing techniques for DoS resistance. CCS 2004: 246-256 - [c30]Philippe Golle, Markus Jakobsson, Ari Juels, Paul F. Syverson:
Universal Re-encryption for Mixnets. CT-RSA 2004: 163-178 - [c29]Philippe Golle, Ari Juels:
Dining Cryptographers Revisited. EUROCRYPT 2004: 456-473 - [c28]Ari Juels:
"Yoking-Proofs" for RFID Tags. PerCom Workshops 2004: 138-143 - [c27]Ari Juels:
Minimalist Cryptography for Low-Cost RFID Tags. SCN 2004: 149-164 - [c26]Ari Juels:
RFID: Security and Privacy for Five-Cent Computers. USENIX Security Symposium 2004 - [c25]Ari Juels, John G. Brainard:
Soft blocking: flexible blocker tags on the cheap. WPES 2004: 1-7 - [c24]Ari Juels:
RFID: security and privacy for five-cent wireless devices. Workshop on Wireless Security 2004: 31 - [e1]Ari Juels:
Financial Cryptography, 8th International Conference, FC 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers. Lecture Notes in Computer Science 3110, Springer 2004, ISBN 3-540-22420-3 [contents] - 2003
- [c23]Ari Juels, Ronald L. Rivest, Michael Szydlo:
The blocker tag: selective blocking of RFID tags for consumer privacy. CCS 2003: 103-111 - [c22]Ari Juels, Ravikanth Pappu:
Squealing Euros: Privacy Protection in RFID-Enabled Banknotes. Financial Cryptography 2003: 103-121 - [c21]John G. Brainard, Ari Juels, Burt Kaliski, Michael Szydlo:
A New Two-Server Approach for Authentication with Short Secrets. USENIX Security Symposium 2003 - 2002
- [c20]Philippe Golle, Sheng Zhong, Dan Boneh, Markus Jakobsson, Ari Juels:
Optimistic Mixing for Exit-Polls. ASIACRYPT 2002: 451-465 - [c19]Markus Jakobsson, Ari Juels, Phong Q. Nguyen:
Proprietary Certificates. CT-RSA 2002: 164-181 - [c18]Ari Juels, Michael Szydlo:
A Two-Server, Sealed-Bid Auction Protocol. Financial Cryptography 2002: 72-86 - [c17]Ari Juels, Jorge Guajardo:
RSA Key Generation with Verifiable Randomness. Public Key Cryptography 2002: 357-374 - [c16]Markus Jakobsson, Ari Juels, Ronald L. Rivest:
Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking. USENIX Security Symposium 2002: 339-353 - [i3]Markus Jakobsson, Ari Juels, Ronald L. Rivest:
Making Mix Nets Robust For Electronic Voting By Randomized Partial Checking. IACR Cryptol. ePrint Arch. 2002: 25 (2002) - [i2]Ari Juels, Madhu Sudan:
A Fuzzy Vault Scheme. IACR Cryptol. ePrint Arch. 2002: 93 (2002) - [i1]Ari Juels, Dario Catalano, Markus Jakobsson:
Coercion-Resistant Electronic Elections. IACR Cryptol. ePrint Arch. 2002: 165 (2002) - 2001
- [c15]Niklas Frykholm, Ari Juels:
Error-tolerant password recovery. CCS 2001: 1-9 - [c14]Ari Juels:
Targeted Advertising ... And Privacy Too. CT-RSA 2001: 408-424 - [c13]Markus Jakobsson, Ari Juels:
An optimally robust hybrid mix network. PODC 2001: 284-292 - 2000
- [j2]Ari Juels, Marcus Peinado:
Hiding Cliques for Cryptographic Security. Des. Codes Cryptogr. 20(3): 269-280 (2000) - [j1]Ari Juels, Markus Jakobsson, Elizabeth A. M. Shriver, Bruce Hillyer:
How to turn loaded dice into fair coins. IEEE Trans. Inf. Theory 46(3): 911-921 (2000) - [c12]Markus Jakobsson, Ari Juels:
Mix and Match: Secure Function Evaluation via Ciphertexts. ASIACRYPT 2000: 162-177 - [c11]Markus Jakobsson, Ari Juels:
Addition of ElGamal Plaintexts. ASIACRYPT 2000: 346-358 - [c10]Johan Håstad, Jakob Jonsson, Ari Juels, Moti Yung:
Funkspiel schemes: an alternative to conventional tamper resistance. CCS 2000: 125-133
1990 – 1999
- 1999
- [c9]Ari Juels, Martin Wattenberg:
A Fuzzy Commitment Scheme. CCS 1999: 28-36 - [c8]Markus Jakobsson, Ari Juels:
Proofs of Work and Bread Pudding Protocols. Communications and Multimedia Security 1999: 258-272 - [c7]Ari Juels:
Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing. Financial Cryptography 1999: 29-45 - [c6]Ari Juels, John G. Brainard:
Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks. NDSS 1999 - 1998
- [c5]Markus Jakobsson, Elizabeth A. M. Shriver, Bruce Hillyer, Ari Juels:
A Practical Secure Physical Random Bit Generator. CCS 1998: 103-111 - [c4]Markus Jakobsson, Ari Juels:
X-Cash: Executable Digital Cash. Financial Cryptography 1998: 16-27 - [c3]Ari Juels, Marcus Peinado:
Hiding Cliques for Cryptographic Security. SODA 1998: 678-684 - 1997
- [c2]Ari Juels, Michael Luby, Rafail Ostrovsky:
Security of Blind Digital Signatures (Extended Abstract). CRYPTO 1997: 150-164 - 1995
- [c1]Ari Juels, Martin Wattenberg:
Stochastic Hillclimbing as a Baseline Mathod for Evaluating Genetic Algorithms. NIPS 1995: 430-436
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint