Export 15 results:
Filters: Author is Ari Juels  [Clear All Filters]
Matetic S, Schneider M, Miller A, Juels A, Capkun S.  2018.  DelegaTEE: Brokered Delegation Using Trusted Execution Environments. 27th {USENIX} Security Symposium ({USENIX} Security 18). :1387--1403.
Breidenbach L, Daian P, Tramèr F, Juels A.  2018.  Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts. 27th {USENIX} Security Symposium ({USENIX} Security 18). :1335--1352.
Zhang F, Eyal I, Escriva R, Juels A, Van Renesse R.  2017.  REM: Resource-Efficient Mining for Blockchains. 26th {USENIX} Security Symposium ({USENIX} Security 17). :1427--1444.
Matetic S, Ahmed M, Kostiainen K, Dhar A, Sommer D, Gervais A, Juels A, Capkun S.  2017.  ROTE: Rollback Protection for Trusted Execution. 26th {USENIX} Security Symposium ({USENIX} Security 17). :1289-1306.
Tramèr F, Zhang F, Juels A, Reiter MK, Ristenpart T.  2016.  Stealing Machine Learning Models via Prediction APIs. 25th {USENIX} Security Symposium ({USENIX} Security 16). :601--618.
Everspaugh A, Chaterjee R, Scott S, Juels A, Ristenpart T.  2015.  The Pythia PRF Service. 24th {USENIX} Security Symposium ({USENIX} Security 15). :547--562.
Juels A, Yen T-F.  2012.  Sherlock Holmes and the Case of the Advanced Persistent Threat. 5th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats ({LEET} 12).
Oprea A, Juels A.  2010.  A Clean-Slate Look at Disk Scrubbing. 8th {USENIX} Conference on File and Storage Technologies ({FAST} 10).
van Dijk M, Juels A.  2010.  On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing. 5th {USENIX} Workshop on Hot Topics in Security (HotSec 10).
Juels A, Stamm S, Jakobsson M.  2007.  Combating Click Fraud via Premium Clicks. 16th {USENIX} Security Symposium ({USENIX} Security 07).
Bono S, Green M, Stubblefield A, Juels A, Rubin A, Szydlo M.  2005.  Security Analysis of a Cryptographically-Enabled RFID Device. 14th {USENIX} Security Symposium ({USENIX} Security 05).
Juels A.  2004.  RFID: Security and Privacy for Five-Cent Computers. 13th {USENIX} Security Symposium ({USENIX} Security 04).
Brainard J, Juels A, Kaliski B, Szydlo M.  2003.  A New Two-Server Approach for Authentication with Short Secrets. 12th {USENIX} Security Symposium ({USENIX} Security 03).