BibTeX records: Steven Myers

download as .bib file

@article{DBLP:journals/ieeesp/CampHKMMPS20,
  author       = {L. Jean Camp and
                  Ryan Henry and
                  Tadayoshi Kohno and
                  Shrirang Mare and
                  Steven A. Myers and
                  Shwetak N. Patel and
                  Joshua Streiff},
  title        = {Toward a Secure Internet of Things: Directions for Research},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {18},
  number       = {4},
  pages        = {28--37},
  year         = {2020},
  url          = {https://doi.org/10.1109/MSEC.2020.2970155},
  doi          = {10.1109/MSEC.2020.2970155},
  timestamp    = {Fri, 31 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/CampHKMMPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MomenzadehDRMC20,
  author       = {Behnood Momenzadeh and
                  Helen Dougherty and
                  Matthew Remmel and
                  Steven A. Myers and
                  L. Jean Camp},
  title        = {Best Practices Would Make Things Better in the IoT},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {18},
  number       = {4},
  pages        = {38--47},
  year         = {2020},
  url          = {https://doi.org/10.1109/MSEC.2020.2987780},
  doi          = {10.1109/MSEC.2020.2987780},
  timestamp    = {Fri, 31 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MomenzadehDRMC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/MyersS18,
  author       = {Steven A. Myers and
                  Adam Shull},
  editor       = {Nigel P. Smart},
  title        = {Practical Revocation and Key Rotation},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at
                  the {RSA} Conference 2018, San Francisco, CA, USA, April 16-20, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10808},
  pages        = {157--178},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76953-0\_9},
  doi          = {10.1007/978-3-319-76953-0\_9},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/MyersS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipres/TarkhaniBM17,
  author       = {Zahra Tarkhani and
                  Geoffrey Brown and
                  Steven A. Myers},
  editor       = {Shoichiro Hara and
                  Shigeo Sugimoto and
                  Makoto Goto},
  title        = {Trustworthy and Portable Emulation Platform for Digital Preservation},
  booktitle    = {Proceedings of the 14th International Conference on Digital Preservation,
                  iPRES 2017, Kyoto, Japan, September 25-29, 2017},
  year         = {2017},
  url          = {https://hdl.handle.net/11353/10.931066},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ipres/TarkhaniBM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MyersS17,
  author       = {Steven A. Myers and
                  Adam Shull},
  title        = {Efficient Hybrid Proxy Re-Encryption for Practical Revocation and
                  Key Rotation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {833},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/833},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MyersS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/GarrisonSML16,
  author       = {William C. Garrison III and
                  Adam Shull and
                  Steven A. Myers and
                  Adam J. Lee},
  title        = {On the Practicality of Cryptographically Enforcing Dynamic Access
                  Control Policies in the Cloud},
  booktitle    = {{IEEE} Symposium on Security and Privacy, {SP} 2016, San Jose, CA,
                  USA, May 22-26, 2016},
  pages        = {819--838},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SP.2016.54},
  doi          = {10.1109/SP.2016.54},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/GarrisonSML16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GarrisonSLM16,
  author       = {William C. Garrison III and
                  Adam Shull and
                  Adam J. Lee and
                  Steven A. Myers},
  title        = {Dynamic and Private Cryptographic Access Control for Untrusted Clouds:
                  Costs and Constructions (Extended Version)},
  journal      = {CoRR},
  volume       = {abs/1602.09069},
  year         = {2016},
  url          = {http://arxiv.org/abs/1602.09069},
  eprinttype    = {arXiv},
  eprint       = {1602.09069},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GarrisonSLM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/HohenbergerMPS15,
  author       = {Susan Hohenberger and
                  Steven A. Myers and
                  Rafael Pass and
                  Abhi Shelat},
  title        = {An Overview of {ANONIZE:} {A} Large-Scale Anonymous Survey System},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {13},
  number       = {2},
  pages        = {22--29},
  year         = {2015},
  url          = {https://doi.org/10.1109/MSP.2015.21},
  doi          = {10.1109/MSP.2015.21},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/HohenbergerMPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShinMGR15,
  author       = {Youngsang Shin and
                  Steven A. Myers and
                  Minaxi Gupta and
                  Predrag Radivojac},
  title        = {A link graph-based approach to identify forum spam},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {2},
  pages        = {176--188},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.970},
  doi          = {10.1002/SEC.970},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShinMGR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HohenbergerMPS15,
  author       = {Susan Hohenberger and
                  Steven A. Myers and
                  Rafael Pass and
                  Abhi Shelat},
  title        = {{ANONIZE:} {A} Large-Scale Anonymous Survey System},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {681},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/681},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HohenbergerMPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/HustedM14,
  author       = {Nathaniel Husted and
                  Steven A. Myers},
  editor       = {Konstantin Beznosov and
                  Anil Somayaji and
                  Tom Longstaff and
                  Paul C. van Oorschot},
  title        = {Emergent Properties {\&} Security: The Complexity ofSecurity as
                  a Science},
  booktitle    = {Proceedings of the 2014 workshop on New Security Paradigms Workshop,
                  Victoria, BC, Canada, September 15-18, 2014},
  pages        = {1--14},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2683467.2683468},
  doi          = {10.1145/2683467.2683468},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nspw/HustedM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/HohenbergerMPS14,
  author       = {Susan Hohenberger and
                  Steven A. Myers and
                  Rafael Pass and
                  Abhi Shelat},
  title        = {{ANONIZE:} {A} Large-Scale Anonymous Survey System},
  booktitle    = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley,
                  CA, USA, May 18-21, 2014},
  pages        = {375--389},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SP.2014.31},
  doi          = {10.1109/SP.2014.31},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/HohenbergerMPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/MyersSS13,
  author       = {Steven A. Myers and
                  Mona Sergi and
                  Abhi Shelat},
  title        = {Black-box construction of a more than non-malleable {CCA1} encryption
                  scheme from plaintext awareness},
  journal      = {J. Comput. Secur.},
  volume       = {21},
  number       = {5},
  pages        = {721--748},
  year         = {2013},
  url          = {https://doi.org/10.3233/JCS-130485},
  doi          = {10.3233/JCS-130485},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/MyersSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/HustedMSG13,
  author       = {Nathaniel Husted and
                  Steven A. Myers and
                  Abhi Shelat and
                  Paul Grubbs},
  editor       = {Charles N. Payne Jr.},
  title        = {{GPU} and {CPU} parallelization of honest-but-curious secure two-party
                  computation},
  booktitle    = {Annual Computer Security Applications Conference, {ACSAC} '13, New
                  Orleans, LA, USA, December 9-13, 2013},
  pages        = {169--178},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2523649.2523681},
  doi          = {10.1145/2523649.2523681},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/HustedMSG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MyersSS13,
  author       = {Steven A. Myers and
                  Mona Sergi and
                  Abhi Shelat},
  editor       = {Amit Sahai},
  title        = {Black-Box Proof of Knowledge of Plaintext and Multiparty Computation
                  with Low Communication Overhead},
  booktitle    = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
                  2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7785},
  pages        = {397--417},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36594-2\_23},
  doi          = {10.1007/978-3-642-36594-2\_23},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/MyersSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/MyersSS12,
  author       = {Steven A. Myers and
                  Mona Sergi and
                  Abhi Shelat},
  editor       = {Ivan Visconti and
                  Roberto De Prisco},
  title        = {Blackbox Construction of a More Than Non-Malleable {CCA1} Encryption
                  Scheme from Plaintext Awareness},
  booktitle    = {Security and Cryptography for Networks - 8th International Conference,
                  {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7485},
  pages        = {149--165},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32928-9\_9},
  doi          = {10.1007/978-3-642-32928-9\_9},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/MyersSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cts/KapadiaMWF11,
  author       = {Apu Kapadia and
                  Steven A. Myers and
                  XiaoFeng Wang and
                  Geoffrey C. Fox},
  editor       = {Waleed W. Smari and
                  Geoffrey C. Fox},
  title        = {Toward securing sensor clouds},
  booktitle    = {2011 International Conference on Collaboration Technologies and Systems,
                  {CTS} 2011, Philadelphia, Pennsylvania, USA, May 23-27, 2011},
  pages        = {280--289},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/CTS.2011.5928699},
  doi          = {10.1109/CTS.2011.5928699},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cts/KapadiaMWF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ShinGM11,
  author       = {Youngsang Shin and
                  Minaxi Gupta and
                  Steven A. Myers},
  title        = {Prevalence and mitigation of forum spamming},
  booktitle    = {{INFOCOM} 2011. 30th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  10-15 April 2011, Shanghai, China},
  pages        = {2309--2317},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/INFCOM.2011.5935048},
  doi          = {10.1109/INFCOM.2011.5935048},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ShinGM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/leet/HustedM11,
  author       = {Nathaniel Husted and
                  Steven A. Myers},
  editor       = {Christopher Kruegel},
  title        = {Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm},
  booktitle    = {4th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '11, Boston, MA, USA, March 29, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/leet11/why-mobile-mobile-wireless-malware-wont-cause-storm},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/leet/HustedM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/leet/ShinGM11,
  author       = {Youngsang Shin and
                  Minaxi Gupta and
                  Steven A. Myers},
  editor       = {Christopher Kruegel},
  title        = {The Nuts and Bolts of a Forum Spam Automator},
  booktitle    = {4th {USENIX} Workshop on Large-Scale Exploits and Emergent Threats,
                  {LEET} '11, Boston, MA, USA, March 29, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/leet11/nuts-and-bolts-forum-spam-automator},
  timestamp    = {Thu, 22 May 2014 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/leet/ShinGM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MyersSS11,
  author       = {Steven A. Myers and
                  Mona Sergi and
                  Abhi Shelat},
  title        = {Threshold Fully Homomorphic Encryption and Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {454},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/454},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MyersSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bioinformatics/XinMLCMR10,
  author       = {Fuxiao Xin and
                  Steven A. Myers and
                  Yong Fuga Li and
                  David N. Cooper and
                  Sean D. Mooney and
                  Predrag Radivojac},
  title        = {Structure-based kernels for the prediction of catalytic residues and
                  their involvement in human inherited disease},
  journal      = {Bioinform.},
  volume       = {26},
  number       = {16},
  pages        = {1975--1982},
  year         = {2010},
  url          = {https://doi.org/10.1093/bioinformatics/btq319},
  doi          = {10.1093/BIOINFORMATICS/BTQ319},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bioinformatics/XinMLCMR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bmcbi/XinMLCMR10,
  author       = {Fuxiao Xin and
                  Steven A. Myers and
                  Yong Fuga Li and
                  David N. Cooper and
                  Sean D. Mooney and
                  Predrag Radivojac},
  title        = {Structure-based kernels for the prediction of catalytic residues and
                  their involvement in human inherited disease},
  journal      = {{BMC} Bioinform.},
  volume       = {11},
  number       = {{S-10}},
  pages        = {O4},
  year         = {2010},
  url          = {https://doi.org/10.1186/1471-2105-11-S10-O4},
  doi          = {10.1186/1471-2105-11-S10-O4},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bmcbi/XinMLCMR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HustedM10,
  author       = {Nathaniel Husted and
                  Steven A. Myers},
  editor       = {Ehab Al{-}Shaer and
                  Angelos D. Keromytis and
                  Vitaly Shmatikov},
  title        = {Mobile location tracking in metro areas: malnets and others},
  booktitle    = {Proceedings of the 17th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2010, Chicago, Illinois, USA, October 4-8, 2010},
  pages        = {85--96},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866307.1866318},
  doi          = {10.1145/1866307.1866318},
  timestamp    = {Tue, 10 Nov 2020 20:00:21 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HustedM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cts/KapadiaMWF10,
  author       = {Apu Kapadia and
                  Steven A. Myers and
                  XiaoFeng Wang and
                  Geoffrey C. Fox},
  editor       = {Waleed W. Smari and
                  William K. McQuay},
  title        = {Secure cloud computing with brokered trusted sensor networks},
  booktitle    = {2010 International Symposium on Collaborative Technologies and Systems,
                  {CTS} 2010, Chicago, Illinois, USA, May 17-21, 2010},
  pages        = {581--592},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/CTS.2010.5478459},
  doi          = {10.1109/CTS.2010.5478459},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cts/KapadiaMWF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ShinMG10,
  author       = {Youngsang Shin and
                  Steven A. Myers and
                  Minaxi Gupta},
  editor       = {Sushil Jajodia and
                  Jianying Zhou},
  title        = {Saving Energy on WiFi with Required IPsec},
  booktitle    = {Security and Privacy in Communication Networks - 6th Iternational
                  {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010.
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {50},
  pages        = {144--161},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16161-2\_9},
  doi          = {10.1007/978-3-642-16161-2\_9},
  timestamp    = {Sun, 07 Jan 2018 16:52:46 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/ShinMG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/ShinMG09,
  author       = {Youngsang Shin and
                  Steven A. Myers and
                  Minaxi Gupta},
  editor       = {Ulrich Flegel and
                  Danilo Bruschi},
  title        = {A Case Study on Asprox Infection Dynamics},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  6th International Conference, {DIMVA} 2009, Como, Italy, July 9-10,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5587},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02918-9\_1},
  doi          = {10.1007/978-3-642-02918-9\_1},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dimva/ShinMG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/MyersS09,
  author       = {Steven A. Myers and
                  Abhi Shelat},
  title        = {Bit Encryption Is Complete},
  booktitle    = {50th Annual {IEEE} Symposium on Foundations of Computer Science, {FOCS}
                  2009, Atlanta, Georgia, USA, October 25-27, 2009},
  pages        = {607--616},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/FOCS.2009.65},
  doi          = {10.1109/FOCS.2009.65},
  timestamp    = {Tue, 08 Jul 2025 16:36:22 +0200},
  biburl       = {https://dblp.org/rec/conf/focs/MyersS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/JakobssonM08,
  author       = {Markus Jakobsson and
                  Steven A. Myers},
  title        = {Delayed password disclosure},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {1},
  pages        = {47--59},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJACT.2008.017051},
  doi          = {10.1504/IJACT.2008.017051},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/JakobssonM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecrime/MyersS08,
  author       = {Steven A. Myers and
                  Sid Stamm},
  title        = {Practice {\&} prevention of home-router mid-stream injection attacks},
  booktitle    = {2008 eCrime Researchers Summit, eCrime 2008, Atlanta, GA, USA, October
                  15-16, 2008},
  pages        = {1--14},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/ECRIME.2008.4696969},
  doi          = {10.1109/ECRIME.2008.4696969},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecrime/MyersS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HaleviMR08,
  author       = {Shai Halevi and
                  Steven A. Myers and
                  Charles Rackoff},
  editor       = {Ran Canetti},
  title        = {On Seed-Incompressible Functions},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {19--36},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_2},
  doi          = {10.1007/978-3-540-78524-8\_2},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HaleviMR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/JakobssonM07,
  author       = {Markus Jakobsson and
                  Steven A. Myers},
  title        = {Delayed password disclosure},
  journal      = {{SIGACT} News},
  volume       = {38},
  number       = {3},
  pages        = {56--75},
  year         = {2007},
  url          = {https://doi.org/10.1145/1324215.1324228},
  doi          = {10.1145/1324215.1324228},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/JakobssonM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/JakobssonM07,
  author       = {Markus Jakobsson and
                  Steven A. Myers},
  editor       = {Atsuhiro Goto},
  title        = {Delayed password disclosure},
  booktitle    = {Proceedings of the 2007 Workshop on Digital Identity Management, Fairfax,
                  VA, USA, November 2, 2007},
  pages        = {17--26},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314403.1314407},
  doi          = {10.1145/1314403.1314407},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dim/JakobssonM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/ShueGM07,
  author       = {Craig A. Shue and
                  Minaxi Gupta and
                  Steven A. Myers},
  title        = {IPSec: Performance Analysis and Enhancements},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2007, Glasgow, Scotland, UK, 24-28 June 2007},
  pages        = {1527--1532},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICC.2007.256},
  doi          = {10.1109/ICC.2007.256},
  timestamp    = {Tue, 19 Jun 2018 07:53:33 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/ShueGM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GertnerMM07,
  author       = {Yael Gertner and
                  Tal Malkin and
                  Steven A. Myers},
  editor       = {Salil P. Vadhan},
  title        = {Towards a Separation of Semantic and {CCA} Security for Public Key
                  Encryption},
  booktitle    = {Theory of Cryptography, 4th Theory of Cryptography Conference, {TCC}
                  2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4392},
  pages        = {434--455},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-70936-7\_24},
  doi          = {10.1007/978-3-540-70936-7\_24},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/GertnerMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0706-3146,
  author       = {Hao Hu and
                  Steven A. Myers and
                  Vittoria Colizza and
                  Alessandro Vespignani},
  title        = {WiFi Epidemiology: Can Your Neighbors' Router Make Yours Sick?},
  journal      = {CoRR},
  volume       = {abs/0706.3146},
  year         = {2007},
  url          = {http://arxiv.org/abs/0706.3146},
  eprinttype    = {arXiv},
  eprint       = {0706.3146},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0706-3146.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GertnerMM06,
  author       = {Yael Gertner and
                  Tal Malkin and
                  Steven A. Myers},
  title        = {Towards a Separation of Semantic and {CCA} Security for Public Key
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {447},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/447},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GertnerMM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ca/Myers05,
  author       = {Steven Myers},
  title        = {Black-box limitations in cryptography},
  school       = {University of Toronto, Canada},
  year         = {2005},
  url          = {https://librarysearch.library.utoronto.ca/permalink/01UTORONTO\_INST/14bjeso/alma991106390086606196},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ca/Myers05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/HooryMMR05,
  author       = {Shlomo Hoory and
                  Avner Magen and
                  Steven A. Myers and
                  Charles Rackoff},
  title        = {Simple permutations mix well},
  journal      = {Theor. Comput. Sci.},
  volume       = {348},
  number       = {2-3},
  pages        = {251--261},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.tcs.2005.09.016},
  doi          = {10.1016/J.TCS.2005.09.016},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/HooryMMR05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/ClaytonDJMSS05,
  author       = {Richard Clayton and
                  Drew Dean and
                  Markus Jakobsson and
                  Steven A. Myers and
                  Stuart G. Stubblebine and
                  Michael Szydlo},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {A Chat at the Old Phishin' Hole},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {88},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_8},
  doi          = {10.1007/11507840\_8},
  timestamp    = {Tue, 10 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/ClaytonDJMSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Myers05,
  author       = {Steven A. Myers},
  editor       = {Andrew S. Patrick and
                  Moti Yung},
  title        = {Helping the Phish Detect the Lure},
  booktitle    = {Financial Cryptography and Data Security, 9th International Conference,
                  {FC} 2005, Roseau, The Commonwealth of Dominica, February 28 - March
                  3, 2005, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3570},
  pages        = {90},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11507840\_10},
  doi          = {10.1007/11507840\_10},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/Myers05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Myers04,
  author       = {Steven A. Myers},
  editor       = {Christian Cachin and
                  Jan Camenisch},
  title        = {Black-Box Composition Does Not Imply Adaptive Security},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Interlaken,
                  Switzerland, May 2-6, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3027},
  pages        = {189--206},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24676-3\_12},
  doi          = {10.1007/978-3-540-24676-3\_12},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Myers04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/HooryMMR04,
  author       = {Shlomo Hoory and
                  Avner Magen and
                  Steven A. Myers and
                  Charles Rackoff},
  editor       = {Josep D{\'{\i}}az and
                  Juhani Karhum{\"{a}}ki and
                  Arto Lepist{\"{o}} and
                  Donald Sannella},
  title        = {Simple Permutations Mix Well},
  booktitle    = {Automata, Languages and Programming: 31st International Colloquium,
                  {ICALP} 2004, Turku, Finland, July 12-16, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3142},
  pages        = {770--781},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27836-8\_65},
  doi          = {10.1007/978-3-540-27836-8\_65},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/HooryMMR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Myers03,
  author       = {Steven A. Myers},
  title        = {Efficient Amplification of the Security of Weak Pseudo-Random Function
                  Generators},
  journal      = {J. Cryptol.},
  volume       = {16},
  number       = {1},
  pages        = {1--24},
  year         = {2003},
  url          = {https://doi.org/10.1007/s00145-002-0007-1},
  doi          = {10.1007/S00145-002-0007-1},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/Myers03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KatzMO01,
  author       = {Jonathan Katz and
                  Steven A. Myers and
                  Rafail Ostrovsky},
  editor       = {Birgit Pfitzmann},
  title        = {Cryptographic Counters and Applications to Electronic Voting},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
                  on the Theory and Application of Cryptographic Techniques, Innsbruck,
                  Austria, May 6-10, 2001, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {2045},
  pages        = {78--92},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44987-6\_6},
  doi          = {10.1007/3-540-44987-6\_6},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KatzMO01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Myers01,
  author       = {Steven A. Myers},
  editor       = {Birgit Pfitzmann},
  title        = {Efficient Amplification of the Security of Weak Pseudo-random Function
                  Generators},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
                  on the Theory and Application of Cryptographic Techniques, Innsbruck,
                  Austria, May 6-10, 2001, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {2045},
  pages        = {358--372},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44987-6\_22},
  doi          = {10.1007/3-540-44987-6\_22},
  timestamp    = {Tue, 28 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Myers01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}