Export 15 results:
Filters: Author is Ari Juels  [Clear All Filters]
Zhang F, Eyal I, Escriva R, Juels A, Van Renesse R.  2017.  REM: Resource-Efficient Mining for Blockchains. 26th USENIX Security Symposium (USENIX Security 17). :1427--1444.
Matetic S, Ahmed M, Kostiainen K, Dhar A, Sommer D, Gervais A, Juels A, Capkun S.  2017.  ROTE: Rollback Protection for Trusted Execution. 26th USENIX Security Symposium (USENIX Security 17). :1289-1306.
Tramèr F, Zhang F, Juels A, Reiter MK, Ristenpart T.  2016.  Stealing Machine Learning Models via Prediction APIs. 25th USENIX Security Symposium (USENIX Security 16). :601--618.
Everspaugh A, Chaterjee R, Scott S, Juels A, Ristenpart T.  2015.  The Pythia PRF Service. 24th USENIX Security Symposium (USENIX Security 15). :547--562.
Juels A, Yen T-F.  2012.  Sherlock Holmes and the Case of the Advanced Persistent Threat. 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 12).
Oprea A, Juels A.  2010.  A Clean-Slate Look at Disk Scrubbing. 8th USENIX Conference on File and Storage Technologies (FAST 10).
van Dijk M, Juels A.  2010.  On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing. 5th USENIX Workshop on Hot Topics in Security (HotSec 10).
Juels A, Stamm S, Jakobsson M.  2007.  Combating Click Fraud via Premium Clicks. 16th USENIX Security Symposium (USENIX Security 07).
Juels A.  2004.  RFID: Security and Privacy for Five-Cent Computers. 13th USENIX Security Symposium (USENIX Security 04).
Brainard J, Juels A, Kaliski B, Szydlo M.  2003.  A New Two-Server Approach for Authentication with Short Secrets. 12th USENIX Security Symposium (USENIX Security 03).