Steven Myers

According to our database1, Steven Myers authored at least 39 papers between 2001 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Best Practices Would Make Things Better in the IoT.
IEEE Secur. Priv., 2020

Toward a Secure Internet of Things: Directions for Research.
IEEE Secur. Priv., 2020

2018
Practical Revocation and Key Rotation.
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018

2017
Efficient Hybrid Proxy Re-Encryption for Practical Revocation and Key Rotation.
IACR Cryptol. ePrint Arch., 2017

Trustworthy and Portable Emulation Platform for Digital Preservation.
Proceedings of the 14th International Conference on Digital Preservation, 2017

2016
Dynamic and Private Cryptographic Access Control for Untrusted Clouds: Costs and Constructions (Extended Version).
CoRR, 2016

On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

2015
A link graph-based approach to identify forum spam.
Secur. Commun. Networks, 2015

An Overview of ANONIZE: A Large-Scale Anonymous Survey System.
IEEE Secur. Priv., 2015

ANONIZE: A Large-Scale Anonymous Survey System.
IACR Cryptol. ePrint Arch., 2015

2014
Emergent Properties & Security: The Complexity ofSecurity as a Science.
Proceedings of the 2014 workshop on New Security Paradigms Workshop, 2014

2013
Black-box construction of a more than non-malleable CCA1 encryption scheme from plaintext awareness.
J. Comput. Secur., 2013

Black-Box Proof of Knowledge of Plaintext and Multiparty Computation with Low Communication Overhead.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

GPU and CPU parallelization of honest-but-curious secure two-party computation.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

2011
Threshold Fully Homomorphic Encryption and Secure Computation.
IACR Cryptol. ePrint Arch., 2011

The Nuts and Bolts of a Forum Spam Automator.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

Prevalence and mitigation of forum spamming.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Toward securing sensor clouds.
Proceedings of the 2011 International Conference on Collaboration Technologies and Systems, 2011

2010
Structure-based kernels for the prediction of catalytic residues and their involvement in human inherited disease.
BMC Bioinform., 2010

Saving Energy on WiFi with Required IPsec.
Proceedings of the Security and Privacy in Communication Networks, 2010

Secure cloud computing with brokered trusted sensor networks.
Proceedings of the 2010 International Symposium on Collaborative Technologies and Systems, 2010

Mobile location tracking in metro areas: malnets and others.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Bit Encryption Is Complete.
Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science, 2009

A Case Study on Asprox Infection Dynamics.
Proceedings of the Detection of Intrusions and Malware, 2009

2008
On Seed-Incompressible Functions.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

Practice & prevention of home-router mid-stream injection attacks.
Proceedings of the 2008 eCrime Researchers Summit, 2008

2007
Delayed password disclosure.
SIGACT News, 2007

WiFi Epidemiology: Can Your Neighbors' Router Make Yours Sick?
CoRR, 2007

IPSec: Performance Analysis and Enhancements.
Proceedings of IEEE International Conference on Communications, 2007

2006
Towards a Separation of Semantic and CCA Security for Public Key Encryption.
IACR Cryptol. ePrint Arch., 2006

2005
Black-box limitations in cryptography.
PhD thesis, 2005

Simple permutations mix well.
Theor. Comput. Sci., 2005

Helping the Phish Detect the Lure.
Proceedings of the Financial Cryptography and Data Security, 2005

A Chat at the Old Phishin' Hole.
Proceedings of the Financial Cryptography and Data Security, 2005

2004
Black-Box Composition Does Not Imply Adaptive Security.
Proceedings of the Advances in Cryptology, 2004

2003
Efficient Amplification of the Security of Weak Pseudo-Random Function Generators.
J. Cryptol., 2003

2001
Cryptographic Counters and Applications to Electronic Voting.
Proceedings of the Advances in Cryptology, 2001


  Loading...