


default search action
BibTeX records: Steven Myers
@article{DBLP:journals/ieeesp/CampHKMMPS20, author = {L. Jean Camp and Ryan Henry and Tadayoshi Kohno and Shrirang Mare and Steven A. Myers and Shwetak N. Patel and Joshua Streiff}, title = {Toward a Secure Internet of Things: Directions for Research}, journal = {{IEEE} Secur. Priv.}, volume = {18}, number = {4}, pages = {28--37}, year = {2020}, url = {https://doi.org/10.1109/MSEC.2020.2970155}, doi = {10.1109/MSEC.2020.2970155}, timestamp = {Fri, 31 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/CampHKMMPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MomenzadehDRMC20, author = {Behnood Momenzadeh and Helen Dougherty and Matthew Remmel and Steven A. Myers and L. Jean Camp}, title = {Best Practices Would Make Things Better in the IoT}, journal = {{IEEE} Secur. Priv.}, volume = {18}, number = {4}, pages = {38--47}, year = {2020}, url = {https://doi.org/10.1109/MSEC.2020.2987780}, doi = {10.1109/MSEC.2020.2987780}, timestamp = {Fri, 31 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/MomenzadehDRMC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/MyersS18, author = {Steven A. Myers and Adam Shull}, editor = {Nigel P. Smart}, title = {Practical Revocation and Key Rotation}, booktitle = {Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at the {RSA} Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10808}, pages = {157--178}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76953-0\_9}, doi = {10.1007/978-3-319-76953-0\_9}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/MyersS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipres/TarkhaniBM17, author = {Zahra Tarkhani and Geoffrey Brown and Steven A. Myers}, editor = {Shoichiro Hara and Shigeo Sugimoto and Makoto Goto}, title = {Trustworthy and Portable Emulation Platform for Digital Preservation}, booktitle = {Proceedings of the 14th International Conference on Digital Preservation, iPRES 2017, Kyoto, Japan, September 25-29, 2017}, year = {2017}, url = {https://hdl.handle.net/11353/10.931066}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ipres/TarkhaniBM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MyersS17, author = {Steven A. Myers and Adam Shull}, title = {Efficient Hybrid Proxy Re-Encryption for Practical Revocation and Key Rotation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {833}, year = {2017}, url = {http://eprint.iacr.org/2017/833}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MyersS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/GarrisonSML16, author = {William C. Garrison III and Adam Shull and Steven A. Myers and Adam J. Lee}, title = {On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA, USA, May 22-26, 2016}, pages = {819--838}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SP.2016.54}, doi = {10.1109/SP.2016.54}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/GarrisonSML16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GarrisonSLM16, author = {William C. Garrison III and Adam Shull and Adam J. Lee and Steven A. Myers}, title = {Dynamic and Private Cryptographic Access Control for Untrusted Clouds: Costs and Constructions (Extended Version)}, journal = {CoRR}, volume = {abs/1602.09069}, year = {2016}, url = {http://arxiv.org/abs/1602.09069}, eprinttype = {arXiv}, eprint = {1602.09069}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GarrisonSLM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/HohenbergerMPS15, author = {Susan Hohenberger and Steven A. Myers and Rafael Pass and Abhi Shelat}, title = {An Overview of {ANONIZE:} {A} Large-Scale Anonymous Survey System}, journal = {{IEEE} Secur. Priv.}, volume = {13}, number = {2}, pages = {22--29}, year = {2015}, url = {https://doi.org/10.1109/MSP.2015.21}, doi = {10.1109/MSP.2015.21}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/HohenbergerMPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShinMGR15, author = {Youngsang Shin and Steven A. Myers and Minaxi Gupta and Predrag Radivojac}, title = {A link graph-based approach to identify forum spam}, journal = {Secur. Commun. Networks}, volume = {8}, number = {2}, pages = {176--188}, year = {2015}, url = {https://doi.org/10.1002/sec.970}, doi = {10.1002/SEC.970}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShinMGR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HohenbergerMPS15, author = {Susan Hohenberger and Steven A. Myers and Rafael Pass and Abhi Shelat}, title = {{ANONIZE:} {A} Large-Scale Anonymous Survey System}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {681}, year = {2015}, url = {http://eprint.iacr.org/2015/681}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HohenbergerMPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/HustedM14, author = {Nathaniel Husted and Steven A. Myers}, editor = {Konstantin Beznosov and Anil Somayaji and Tom Longstaff and Paul C. van Oorschot}, title = {Emergent Properties {\&} Security: The Complexity ofSecurity as a Science}, booktitle = {Proceedings of the 2014 workshop on New Security Paradigms Workshop, Victoria, BC, Canada, September 15-18, 2014}, pages = {1--14}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2683467.2683468}, doi = {10.1145/2683467.2683468}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/HustedM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/HohenbergerMPS14, author = {Susan Hohenberger and Steven A. Myers and Rafael Pass and Abhi Shelat}, title = {{ANONIZE:} {A} Large-Scale Anonymous Survey System}, booktitle = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley, CA, USA, May 18-21, 2014}, pages = {375--389}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SP.2014.31}, doi = {10.1109/SP.2014.31}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/HohenbergerMPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/MyersSS13, author = {Steven A. Myers and Mona Sergi and Abhi Shelat}, title = {Black-box construction of a more than non-malleable {CCA1} encryption scheme from plaintext awareness}, journal = {J. Comput. Secur.}, volume = {21}, number = {5}, pages = {721--748}, year = {2013}, url = {https://doi.org/10.3233/JCS-130485}, doi = {10.3233/JCS-130485}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/MyersSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HustedMSG13, author = {Nathaniel Husted and Steven A. Myers and Abhi Shelat and Paul Grubbs}, editor = {Charles N. Payne Jr.}, title = {{GPU} and {CPU} parallelization of honest-but-curious secure two-party computation}, booktitle = {Annual Computer Security Applications Conference, {ACSAC} '13, New Orleans, LA, USA, December 9-13, 2013}, pages = {169--178}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2523649.2523681}, doi = {10.1145/2523649.2523681}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/HustedMSG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/MyersSS13, author = {Steven A. Myers and Mona Sergi and Abhi Shelat}, editor = {Amit Sahai}, title = {Black-Box Proof of Knowledge of Plaintext and Multiparty Computation with Low Communication Overhead}, booktitle = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC} 2013, Tokyo, Japan, March 3-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7785}, pages = {397--417}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36594-2\_23}, doi = {10.1007/978-3-642-36594-2\_23}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/MyersSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/MyersSS12, author = {Steven A. Myers and Mona Sergi and Abhi Shelat}, editor = {Ivan Visconti and Roberto De Prisco}, title = {Blackbox Construction of a More Than Non-Malleable {CCA1} Encryption Scheme from Plaintext Awareness}, booktitle = {Security and Cryptography for Networks - 8th International Conference, {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7485}, pages = {149--165}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32928-9\_9}, doi = {10.1007/978-3-642-32928-9\_9}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/MyersSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cts/KapadiaMWF11, author = {Apu Kapadia and Steven A. Myers and XiaoFeng Wang and Geoffrey C. Fox}, editor = {Waleed W. Smari and Geoffrey C. Fox}, title = {Toward securing sensor clouds}, booktitle = {2011 International Conference on Collaboration Technologies and Systems, {CTS} 2011, Philadelphia, Pennsylvania, USA, May 23-27, 2011}, pages = {280--289}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/CTS.2011.5928699}, doi = {10.1109/CTS.2011.5928699}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cts/KapadiaMWF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ShinGM11, author = {Youngsang Shin and Minaxi Gupta and Steven A. Myers}, title = {Prevalence and mitigation of forum spamming}, booktitle = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 10-15 April 2011, Shanghai, China}, pages = {2309--2317}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/INFCOM.2011.5935048}, doi = {10.1109/INFCOM.2011.5935048}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ShinGM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/leet/HustedM11, author = {Nathaniel Husted and Steven A. Myers}, editor = {Christopher Kruegel}, title = {Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm}, booktitle = {4th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats, {LEET} '11, Boston, MA, USA, March 29, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/leet11/why-mobile-mobile-wireless-malware-wont-cause-storm}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/leet/HustedM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/leet/ShinGM11, author = {Youngsang Shin and Minaxi Gupta and Steven A. Myers}, editor = {Christopher Kruegel}, title = {The Nuts and Bolts of a Forum Spam Automator}, booktitle = {4th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats, {LEET} '11, Boston, MA, USA, March 29, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/leet11/nuts-and-bolts-forum-spam-automator}, timestamp = {Thu, 22 May 2014 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/leet/ShinGM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MyersSS11, author = {Steven A. Myers and Mona Sergi and Abhi Shelat}, title = {Threshold Fully Homomorphic Encryption and Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {454}, year = {2011}, url = {http://eprint.iacr.org/2011/454}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MyersSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/XinMLCMR10, author = {Fuxiao Xin and Steven A. Myers and Yong Fuga Li and David N. Cooper and Sean D. Mooney and Predrag Radivojac}, title = {Structure-based kernels for the prediction of catalytic residues and their involvement in human inherited disease}, journal = {Bioinform.}, volume = {26}, number = {16}, pages = {1975--1982}, year = {2010}, url = {https://doi.org/10.1093/bioinformatics/btq319}, doi = {10.1093/BIOINFORMATICS/BTQ319}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bioinformatics/XinMLCMR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bmcbi/XinMLCMR10, author = {Fuxiao Xin and Steven A. Myers and Yong Fuga Li and David N. Cooper and Sean D. Mooney and Predrag Radivojac}, title = {Structure-based kernels for the prediction of catalytic residues and their involvement in human inherited disease}, journal = {{BMC} Bioinform.}, volume = {11}, number = {{S-10}}, pages = {O4}, year = {2010}, url = {https://doi.org/10.1186/1471-2105-11-S10-O4}, doi = {10.1186/1471-2105-11-S10-O4}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bmcbi/XinMLCMR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HustedM10, author = {Nathaniel Husted and Steven A. Myers}, editor = {Ehab Al{-}Shaer and Angelos D. Keromytis and Vitaly Shmatikov}, title = {Mobile location tracking in metro areas: malnets and others}, booktitle = {Proceedings of the 17th {ACM} Conference on Computer and Communications Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010}, pages = {85--96}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866307.1866318}, doi = {10.1145/1866307.1866318}, timestamp = {Tue, 10 Nov 2020 20:00:21 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HustedM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cts/KapadiaMWF10, author = {Apu Kapadia and Steven A. Myers and XiaoFeng Wang and Geoffrey C. Fox}, editor = {Waleed W. Smari and William K. McQuay}, title = {Secure cloud computing with brokered trusted sensor networks}, booktitle = {2010 International Symposium on Collaborative Technologies and Systems, {CTS} 2010, Chicago, Illinois, USA, May 17-21, 2010}, pages = {581--592}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/CTS.2010.5478459}, doi = {10.1109/CTS.2010.5478459}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cts/KapadiaMWF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ShinMG10, author = {Youngsang Shin and Steven A. Myers and Minaxi Gupta}, editor = {Sushil Jajodia and Jianying Zhou}, title = {Saving Energy on WiFi with Required IPsec}, booktitle = {Security and Privacy in Communication Networks - 6th Iternational {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {50}, pages = {144--161}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16161-2\_9}, doi = {10.1007/978-3-642-16161-2\_9}, timestamp = {Sun, 07 Jan 2018 16:52:46 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/ShinMG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dimva/ShinMG09, author = {Youngsang Shin and Steven A. Myers and Minaxi Gupta}, editor = {Ulrich Flegel and Danilo Bruschi}, title = {A Case Study on Asprox Infection Dynamics}, booktitle = {Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, {DIMVA} 2009, Como, Italy, July 9-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5587}, pages = {1--20}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02918-9\_1}, doi = {10.1007/978-3-642-02918-9\_1}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/dimva/ShinMG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/MyersS09, author = {Steven A. Myers and Abhi Shelat}, title = {Bit Encryption Is Complete}, booktitle = {50th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS} 2009, Atlanta, Georgia, USA, October 25-27, 2009}, pages = {607--616}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/FOCS.2009.65}, doi = {10.1109/FOCS.2009.65}, timestamp = {Tue, 08 Jul 2025 16:36:22 +0200}, biburl = {https://dblp.org/rec/conf/focs/MyersS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/JakobssonM08, author = {Markus Jakobsson and Steven A. Myers}, title = {Delayed password disclosure}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {1}, pages = {47--59}, year = {2008}, url = {https://doi.org/10.1504/IJACT.2008.017051}, doi = {10.1504/IJACT.2008.017051}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/JakobssonM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/MyersS08, author = {Steven A. Myers and Sid Stamm}, title = {Practice {\&} prevention of home-router mid-stream injection attacks}, booktitle = {2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October 15-16, 2008}, pages = {1--14}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/ECRIME.2008.4696969}, doi = {10.1109/ECRIME.2008.4696969}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecrime/MyersS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HaleviMR08, author = {Shai Halevi and Steven A. Myers and Charles Rackoff}, editor = {Ran Canetti}, title = {On Seed-Incompressible Functions}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {19--36}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_2}, doi = {10.1007/978-3-540-78524-8\_2}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HaleviMR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/JakobssonM07, author = {Markus Jakobsson and Steven A. Myers}, title = {Delayed password disclosure}, journal = {{SIGACT} News}, volume = {38}, number = {3}, pages = {56--75}, year = {2007}, url = {https://doi.org/10.1145/1324215.1324228}, doi = {10.1145/1324215.1324228}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/JakobssonM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dim/JakobssonM07, author = {Markus Jakobsson and Steven A. Myers}, editor = {Atsuhiro Goto}, title = {Delayed password disclosure}, booktitle = {Proceedings of the 2007 Workshop on Digital Identity Management, Fairfax, VA, USA, November 2, 2007}, pages = {17--26}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314403.1314407}, doi = {10.1145/1314403.1314407}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dim/JakobssonM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/ShueGM07, author = {Craig A. Shue and Minaxi Gupta and Steven A. Myers}, title = {IPSec: Performance Analysis and Enhancements}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2007, Glasgow, Scotland, UK, 24-28 June 2007}, pages = {1527--1532}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ICC.2007.256}, doi = {10.1109/ICC.2007.256}, timestamp = {Tue, 19 Jun 2018 07:53:33 +0200}, biburl = {https://dblp.org/rec/conf/icc/ShueGM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GertnerMM07, author = {Yael Gertner and Tal Malkin and Steven A. Myers}, editor = {Salil P. Vadhan}, title = {Towards a Separation of Semantic and {CCA} Security for Public Key Encryption}, booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC} 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4392}, pages = {434--455}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-70936-7\_24}, doi = {10.1007/978-3-540-70936-7\_24}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GertnerMM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0706-3146, author = {Hao Hu and Steven A. Myers and Vittoria Colizza and Alessandro Vespignani}, title = {WiFi Epidemiology: Can Your Neighbors' Router Make Yours Sick?}, journal = {CoRR}, volume = {abs/0706.3146}, year = {2007}, url = {http://arxiv.org/abs/0706.3146}, eprinttype = {arXiv}, eprint = {0706.3146}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0706-3146.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GertnerMM06, author = {Yael Gertner and Tal Malkin and Steven A. Myers}, title = {Towards a Separation of Semantic and {CCA} Security for Public Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {447}, year = {2006}, url = {http://eprint.iacr.org/2006/447}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GertnerMM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ca/Myers05, author = {Steven Myers}, title = {Black-box limitations in cryptography}, school = {University of Toronto, Canada}, year = {2005}, url = {https://librarysearch.library.utoronto.ca/permalink/01UTORONTO\_INST/14bjeso/alma991106390086606196}, timestamp = {Wed, 10 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ca/Myers05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/HooryMMR05, author = {Shlomo Hoory and Avner Magen and Steven A. Myers and Charles Rackoff}, title = {Simple permutations mix well}, journal = {Theor. Comput. Sci.}, volume = {348}, number = {2-3}, pages = {251--261}, year = {2005}, url = {https://doi.org/10.1016/j.tcs.2005.09.016}, doi = {10.1016/J.TCS.2005.09.016}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/HooryMMR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/ClaytonDJMSS05, author = {Richard Clayton and Drew Dean and Markus Jakobsson and Steven A. Myers and Stuart G. Stubblebine and Michael Szydlo}, editor = {Andrew S. Patrick and Moti Yung}, title = {A Chat at the Old Phishin' Hole}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {88}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_8}, doi = {10.1007/11507840\_8}, timestamp = {Tue, 10 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/ClaytonDJMSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Myers05, author = {Steven A. Myers}, editor = {Andrew S. Patrick and Moti Yung}, title = {Helping the Phish Detect the Lure}, booktitle = {Financial Cryptography and Data Security, 9th International Conference, {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3570}, pages = {90}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11507840\_10}, doi = {10.1007/11507840\_10}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/Myers05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Myers04, author = {Steven A. Myers}, editor = {Christian Cachin and Jan Camenisch}, title = {Black-Box Composition Does Not Imply Adaptive Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3027}, pages = {189--206}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24676-3\_12}, doi = {10.1007/978-3-540-24676-3\_12}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Myers04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/HooryMMR04, author = {Shlomo Hoory and Avner Magen and Steven A. Myers and Charles Rackoff}, editor = {Josep D{\'{\i}}az and Juhani Karhum{\"{a}}ki and Arto Lepist{\"{o}} and Donald Sannella}, title = {Simple Permutations Mix Well}, booktitle = {Automata, Languages and Programming: 31st International Colloquium, {ICALP} 2004, Turku, Finland, July 12-16, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3142}, pages = {770--781}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27836-8\_65}, doi = {10.1007/978-3-540-27836-8\_65}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/HooryMMR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Myers03, author = {Steven A. Myers}, title = {Efficient Amplification of the Security of Weak Pseudo-Random Function Generators}, journal = {J. Cryptol.}, volume = {16}, number = {1}, pages = {1--24}, year = {2003}, url = {https://doi.org/10.1007/s00145-002-0007-1}, doi = {10.1007/S00145-002-0007-1}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Myers03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KatzMO01, author = {Jonathan Katz and Steven A. Myers and Rafail Ostrovsky}, editor = {Birgit Pfitzmann}, title = {Cryptographic Counters and Applications to Electronic Voting}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {2045}, pages = {78--92}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44987-6\_6}, doi = {10.1007/3-540-44987-6\_6}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KatzMO01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Myers01, author = {Steven A. Myers}, editor = {Birgit Pfitzmann}, title = {Efficient Amplification of the Security of Weak Pseudo-random Function Generators}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {2045}, pages = {358--372}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44987-6\_22}, doi = {10.1007/3-540-44987-6\_22}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Myers01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.