The scientist’s investigation covers issues in Computer security, Cryptography, Authentication, Adversary and Internet privacy. His biological study spans a wide range of topics, including Computer network and Identification. His Cryptography research incorporates themes from ElGamal encryption, Theoretical computer science, Password, Set and Access control.
His studies in Authentication integrate themes in fields like Cipher, Security analysis, Oracle and Digital signature transponder. His research in Adversary intersects with topics in Cloud storage and Artificial neural network, Machine learning, Artificial intelligence, Feature vector. His Internet privacy research includes elements of Lightweight Extensible Authentication Protocol and Multi-factor authentication.
His primary areas of investigation include Computer security, Cryptography, Authentication, Password and Computer network. Ari Juels has researched Computer security in several fields, including Scheme and Internet privacy. The study incorporates disciplines such as Adversary, Theoretical computer science, Set and Server in addition to Cryptography.
The concepts of his Authentication study are interwoven with issues in Radio-frequency identification and Identification. His Password research incorporates elements of Cryptographic primitive and Honey Encryption. Ari Juels interconnects Key and Cloud computing in the investigation of issues within Computer network.
Ari Juels spends much of his time researching Computer security, Cryptocurrency, Confidentiality, Smart contract and Blockchain. His study in the fields of Exploit and Cryptography under the domain of Computer security overlaps with other disciplines such as Profitability index and Delegation. Ari Juels has included themes like Biometrics and Identification in his Cryptography study.
His work in Cryptocurrency tackles topics such as Payment which are related to areas like Risk analysis. His study in Confidentiality is interdisciplinary in nature, drawing from both Oblivious ram, Correctness, Software deployment and Reliability. Ari Juels combines subjects such as Data feed, Side channel attack and Undo with his study of Smart contract.
His primary areas of study are Computer security, Smart contract, Confidentiality, Blockchain and Cryptocurrency. His Computer security research includes themes of Software, World Wide Web and Database transaction. His studies deal with areas such as Utility computing, Identity and Cryptography as well as World Wide Web.
His Confidentiality research is multidisciplinary, incorporating perspectives in Pseudonymity, Key, Software deployment and Fidelity. His work deals with themes such as Overlay network and Scalability, which intersect with Blockchain. His Cryptocurrency study combines topics from a wide range of disciplines, such as Authentication, Anonymity, Internet privacy and Scripting language.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
RFID security and privacy: a research survey
IEEE Journal on Selected Areas in Communications (2006)
Pors: proofs of retrievability for large files
Ari Juels;Burton S. Kaliski.
computer and communications security (2007)
A fuzzy vault scheme
A. Juels;M. Sudan.
international symposium on information theory (2002)
A fuzzy commitment scheme
Ari Juels;Martin Wattenberg.
computer and communications security (1999)
The blocker tag: selective blocking of RFID tags for consumer privacy
Ari Juels;Ronald L. Rivest;Michael Szydlo.
computer and communications security (2003)
HAIL: a high-availability and integrity layer for cloud storage
Kevin D. Bowers;Ari Juels;Alina Oprea.
computer and communications security (2009)
Authenticating pervasive devices with human protocols
Ari Juels;Stephen A. Weis.
international cryptology conference (2005)
Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks.
Ari Juels;John G. Brainard.
network and distributed system security symposium (1999)
On Scaling Decentralized Blockchains
Kyle Croman;Christian Decker;Ittay Eyal;Adem Efe Gencer.
financial cryptography (2016)
Cross-VM side channels and their use to extract private keys
Yinqian Zhang;Ari Juels;Michael K. Reiter;Thomas Ristenpart.
computer and communications security (2012)
Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking d-index is inferred from publications deemed to belong to the considered discipline.
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: