Biblio

Export 15 results:
Filters: Author is Ari Juels  [Clear All Filters]
2017
Zhang F, Eyal I, Escriva R, Juels A, Van Renesse R.  2017.  REM: Resource-Efficient Mining for Blockchains. 26th USENIX Security Symposium (USENIX Security 17). :1427--1444.
Matetic S, Ahmed M, Kostiainen K, Dhar A, Sommer D, Gervais A, Juels A, Capkun S.  2017.  ROTE: Rollback Protection for Trusted Execution. 26th USENIX Security Symposium (USENIX Security 17). :1289-1306.
2016
Tramèr F, Zhang F, Juels A, Reiter MK, Ristenpart T.  2016.  Stealing Machine Learning Models via Prediction APIs. 25th USENIX Security Symposium (USENIX Security 16). :601--618.
2015
Everspaugh A, Chaterjee R, Scott S, Juels A, Ristenpart T.  2015.  The Pythia PRF Service. 24th USENIX Security Symposium (USENIX Security 15). :547--562.
2012
Juels A, Yen T-F.  2012.  Sherlock Holmes and the Case of the Advanced Persistent Threat. 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET 12).
2010
Oprea A, Juels A.  2010.  A Clean-Slate Look at Disk Scrubbing. 8th USENIX Conference on File and Storage Technologies (FAST 10).
van Dijk M, Juels A.  2010.  On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing. 5th USENIX Workshop on Hot Topics in Security (HotSec 10).
2007
Juels A, Stamm S, Jakobsson M.  2007.  Combating Click Fraud via Premium Clicks. 16th USENIX Security Symposium (USENIX Security 07).
2004
Juels A.  2004.  RFID: Security and Privacy for Five-Cent Computers. 13th USENIX Security Symposium (USENIX Security 04).
2003
Brainard J, Juels A, Kaliski B, Szydlo M.  2003.  A New Two-Server Approach for Authentication with Short Secrets. 12th USENIX Security Symposium (USENIX Security 03).