Author of the publication

Authenticating Pervasive Devices with Human Protocols.

, and . CRYPTO, volume 3621 of Lecture Notes in Computer Science, page 293-308. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Juels, Ari
add a person with the name Juels, Ari
 

Other publications of authors with the same name

Parallel mixing., and . ACM Conference on Computer and Communications Security, page 220-226. ACM, (2004)RFID security and privacy: long-term research or short-term tinkering?, , , , , , and . WISEC, page 160. ACM, (2008)Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge., , , , , and . EuroS&P, page 19-34. IEEE, (2017)A Fuzzy Commitment Scheme., and . ACM Conference on Computer and Communications Security, page 28-36. ACM, (1999)Minimalist Cryptography for Low-Cost RFID Tags.. SCN, volume 3352 of Lecture Notes in Computer Science, page 149-164. Springer, (2004)Funkspiel schemes: an alternative to conventional tamper resistance., , , and . ACM Conference on Computer and Communications Security, page 125-133. ACM, (2000)Town Crier: An Authenticated Data Feed for Smart Contracts., , , , and . ACM Conference on Computer and Communications Security, page 270-282. ACM, (2016)Proofs of Work and Bread Pudding Protocols., and . Communications and Multimedia Security, volume 152 of IFIP Conference Proceedings, page 258-272. Kluwer, (1999)Technology Evaluation: The Security Implications of VeriChip Cloning., , , and . JAMIA, 13 (6): 601-607 (2006)Hiding Cliques for Cryptographic Security., and . Des. Codes Cryptogr., 20 (3): 269-280 (2000)