Steven Myers

According to our database1, Steven Myers authored at least 39 papers between 2001 and 2020.

Collaborative distances:



In proceedings 
PhD thesis 




Best Practices Would Make Things Better in the IoT.
IEEE Secur. Priv., 2020

Toward a Secure Internet of Things: Directions for Research.
IEEE Secur. Priv., 2020

Practical Revocation and Key Rotation.
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018

Efficient Hybrid Proxy Re-Encryption for Practical Revocation and Key Rotation.
IACR Cryptol. ePrint Arch., 2017

Trustworthy and Portable Emulation Platform for Digital Preservation.
Proceedings of the 14th International Conference on Digital Preservation, 2017

Dynamic and Private Cryptographic Access Control for Untrusted Clouds: Costs and Constructions (Extended Version).
CoRR, 2016

On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

A link graph-based approach to identify forum spam.
Secur. Commun. Networks, 2015

An Overview of ANONIZE: A Large-Scale Anonymous Survey System.
IEEE Secur. Priv., 2015

ANONIZE: A Large-Scale Anonymous Survey System.
IACR Cryptol. ePrint Arch., 2015

Emergent Properties & Security: The Complexity ofSecurity as a Science.
Proceedings of the 2014 workshop on New Security Paradigms Workshop, 2014

Black-box construction of a more than non-malleable CCA1 encryption scheme from plaintext awareness.
J. Comput. Secur., 2013

Black-Box Proof of Knowledge of Plaintext and Multiparty Computation with Low Communication Overhead.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

GPU and CPU parallelization of honest-but-curious secure two-party computation.
Proceedings of the Annual Computer Security Applications Conference, 2013

Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Threshold Fully Homomorphic Encryption and Secure Computation.
IACR Cryptol. ePrint Arch., 2011

The Nuts and Bolts of a Forum Spam Automator.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

Prevalence and mitigation of forum spamming.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Toward securing sensor clouds.
Proceedings of the 2011 International Conference on Collaboration Technologies and Systems, 2011

Structure-based kernels for the prediction of catalytic residues and their involvement in human inherited disease.
BMC Bioinform., 2010

Saving Energy on WiFi with Required IPsec.
Proceedings of the Security and Privacy in Communication Networks, 2010

Secure cloud computing with brokered trusted sensor networks.
Proceedings of the 2010 International Symposium on Collaborative Technologies and Systems, 2010

Mobile location tracking in metro areas: malnets and others.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Bit Encryption Is Complete.
Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science, 2009

A Case Study on Asprox Infection Dynamics.
Proceedings of the Detection of Intrusions and Malware, 2009

Delayed password disclosure.
Int. J. Appl. Cryptogr., 2008

On Seed-Incompressible Functions.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

Practice & prevention of home-router mid-stream injection attacks.
Proceedings of the 2008 eCrime Researchers Summit, 2008

WiFi Epidemiology: Can Your Neighbors' Router Make Yours Sick?
CoRR, 2007

IPSec: Performance Analysis and Enhancements.
Proceedings of IEEE International Conference on Communications, 2007

Towards a Separation of Semantic and CCA Security for Public Key Encryption.
IACR Cryptol. ePrint Arch., 2006

Black-box limitations in cryptography.
PhD thesis, 2005

Simple permutations mix well.
Theor. Comput. Sci., 2005

Helping the Phish Detect the Lure.
Proceedings of the Financial Cryptography and Data Security, 2005

A Chat at the Old Phishin' Hole.
Proceedings of the Financial Cryptography and Data Security, 2005

Black-Box Composition Does Not Imply Adaptive Security.
Proceedings of the Advances in Cryptology, 2004

Efficient Amplification of the Security of Weak Pseudo-Random Function Generators.
J. Cryptol., 2003

Cryptographic Counters and Applications to Electronic Voting.
Proceedings of the Advances in Cryptology, 2001