Ari Juels
Orcid: 0009-0002-1143-5504Affiliations:
- Cornell University, Cornell Tech, New York City, NY, USA
- RSA Laboratories, Bedford, MA, USA (former)
- University of California, Berkeley, CA, USA (PhD 1996)
According to our database1,
Ari Juels
authored at least 153 papers
between 1995 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on arijuels.com
-
on twitter.com
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
2023
Proc. ACM Meas. Anal. Comput. Syst., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Financial Cryptography and Data Security, 2023
2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
2020
The Ekiden Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts.
IEEE Secur. Priv., 2020
CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability.
IACR Cryptol. ePrint Arch., 2020
Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms.
IACR Cryptol. ePrint Arch., 2019
SquirRL: Automating Attack Discovery on Blockchain Incentive Mechanisms with Deep Reinforcement Learning.
CoRR, 2019
Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges.
CoRR, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Paralysis Proofs: Secure Dynamic Access Structures for Cryptocurrency Custody and More.
Proceedings of the 1st ACM Conference on Advances in Financial Technologies, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution.
CoRR, 2018
2017
A New Distribution Sensitive Secure Sketch and a Comparison Between Approaches to Typo-Tolerant Authentication.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
Proceedings of the Rule Technologies. Research, Tools, and Applications, 2016
Proceedings of the Financial Cryptography and Data Security, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Discovering Unwarranted Associations in Data-Driven Applications with the FairTest Testing Toolkit.
CoRR, 2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Commun. ACM, 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013
Proceedings of the 50th Annual Design Automation Conference 2013, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks.
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2012
Proceedings of the ACM Symposium on Cloud Computing, SOCC '12, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the International Conference on Human Factors in Computing Systems, 2011
2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010
Proceedings of the Multimedia and Security Workshop, 2010
Proceedings of the 8th USENIX Conference on File and Storage Technologies, 2010
2009
Proceedings of the 18th USENIX Security Symposium, 2009
Proceedings of the 2009 Workshop on New Security Paradigms, 2009
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009
EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security.
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the First ACM Conference on Wireless Network Security, 2008
Proceedings of the First ACM Conference on Wireless Network Security, 2008
2007
In Response to: Letter to the Editor Regarding: "A Security Analysis of the Verichip Implantable RFID Device".
J. Am. Medical Informatics Assoc., 2007
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007
Proceedings of the Financial Cryptography and Data Security, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
Proceedings of the Advances in Cryptology, 2007
2006
J. Am. Medical Informatics Assoc., 2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
2005
IEEE Secur. Priv., 2005
Proceedings of the 2005 ACM Workshop on Wireless Security, 2005
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005
Proceedings of the Advances in Cryptology, 2005
2004
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
2003
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003
Proceedings of the Financial Cryptography, 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Public Key Cryptography, 2002
Proceedings of the Financial Cryptography, 6th International Conference, 2002
2001
Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, 2001
Proceedings of the Topics in Cryptology, 2001
2000
Hiding Cliques for Cryptographic Security.
Des. Codes Cryptogr., 2000
Proceedings of the CCS 2000, 2000
Proceedings of the Advances in Cryptology, 2000
1999
Proceedings of the Network and Distributed System Security Symposium, 1999
Proceedings of the Financial Cryptography, 1999
Proofs of Work and Bread Pudding Protocols.
Proceedings of the Secure Information Networks: Communications and Multimedia Security, 1999
1998
1997
Proceedings of the Advances in Cryptology, 1997
1995
Proceedings of the Advances in Neural Information Processing Systems 8, 1995