Name
Papers
Collaborators
ARI JUELS
135
195
Citations 
PageRank 
Referers 
7263
590.42
11018
Referees 
References 
2258
1791
Search Limit
1001000
Title
Citations
PageRank
Year
Themis: Fast, Strong Order-Fairness in Byzantine Consensus.00.342021
CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability20.372021
DECO: Liberating Web Data Using Decentralized Oracles for TLS30.412020
BDoS: Blockchain Denial-of-Service10.352020
Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges.10.352019
Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms00.342019
CHURP: Dynamic-Committee Proactive Secret Sharing.30.362019
Paralysis Proofs - Secure Dynamic Access Structures for Cryptocurrency Custody and More.00.342019
Secure Brokered Delegation Through DelegaTEE00.342019
Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts100.512019
Paralysis Proofs: Safe Access-Structure Updates for Cryptocurrencies and More.00.342018
FairTest: Discovering Unwarranted Associations in Data-Driven Applications140.602017
(Short Paper) PieceWork: Generalized Outsourcing Control for Proofs of Work.00.342017
Rote: Rollback Protection For Trusted Execution190.622017
A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing.10.342017
Solidus: Confidential Distributed Ledger Transactions via PVORM.110.682017
The Ring of Gyges: Investigating the Future of Criminal Smart Contracts.303.132016
Setting Standards For Altering And Undoing Smart Contracts60.992016
Privacy is dead, long live privacy.20.392016
pASSWORD tYPOS and How to Correct Them Securely90.472016
On Scaling Decentralized Blockchains - (A Position Paper).101.182016
Stealing Machine Learning Models Via Prediction Apis1073.312016
Town Crier: An Authenticated Data Feed for Smart Contracts.693.982016
Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable)20.402015
Discovering Unwarranted Associations in Data-Driven Applications with the FairTest Testing Toolkit70.682015
The Pythia PRF Service.80.512015
GenoGuard: Protecting Genomic Data against Brute-Force Attacks100.522015
Honey Encryption: Encryption beyond the Brute-Force Barrier80.612014
PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging.90.602014
Permacoin: Repurposing Bitcoin Work for Data Preservation694.322014
Cross-Tenant Side-Channel Attacks in PaaS Clouds1012.692014
Securing the Data in Big Data Security Analytics.00.342013
New approaches to security and availability for cloud data561.622013
Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks512.412013
Tailing RFID Tags for Clone Detection.140.612013
FlipIt: The Game of "Stealthy Takeover"723.292013
Honeywords: making password-cracking detectable351.432013
Heart-to-heart (H2H): authentication for implanted medical devices581.602013
Defending Against the Unknown Enemy: Applying FlipIt to System Security.70.692012
More for your money: exploiting performance heterogeneity in public clouds802.432012
Cross-VM side channels and their use to extract private keys2878.262012
Iris: a scalable cloud file system with efficient integrity checks611.582011
HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis1264.302011
Exploring implicit memory for painless password recovery161.432011
How to tell if your cloud files are vulnerable to drive crashes452.132011
A clean-slate look at disk scrubbing230.892010
The physical basis of RFID security00.342010
Biometrics in electronic travel documents.00.342010
On the impossibility of cryptography alone for privacy-preserving cloud computing301.462010
CCCP: secure remote storage for computational RFIDs101.082009
  • 1
  • 2