Steven Myers
According to our database1,
Steven Myers
authored at least 39 papers
between 2001 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
2018
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 14th International Conference on Digital Preservation, 2017
2016
Dynamic and Private Cryptographic Access Control for Untrusted Clouds: Costs and Constructions (Extended Version).
CoRR, 2016
On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud.
Proceedings of the IEEE Symposium on Security and Privacy, 2016
2015
IEEE Secur. Priv., 2015
2014
Proceedings of the 2014 workshop on New Security Paradigms Workshop, 2014
2013
Black-box construction of a more than non-malleable CCA1 encryption scheme from plaintext awareness.
J. Comput. Secur., 2013
Black-Box Proof of Knowledge of Plaintext and Multiparty Computation with Low Communication Overhead.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of the 2011 International Conference on Collaboration Technologies and Systems, 2011
2010
Structure-based kernels for the prediction of catalytic residues and their involvement in human inherited disease.
BMC Bioinform., 2010
Proceedings of the Security and Privacy in Communication Networks, 2010
Proceedings of the 2010 International Symposium on Collaborative Technologies and Systems, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
2009
Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science, 2009
Proceedings of the Detection of Intrusions and Malware, 2009
2008
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008
Proceedings of the 2008 eCrime Researchers Summit, 2008
2007
Proceedings of IEEE International Conference on Communications, 2007
2006
IACR Cryptol. ePrint Arch., 2006
2005
Proceedings of the Financial Cryptography and Data Security, 2005
Proceedings of the Financial Cryptography and Data Security, 2005
2004
Proceedings of the Advances in Cryptology, 2004
2003
J. Cryptol., 2003
2001
Proceedings of the Advances in Cryptology, 2001