Steven Myers

According to our database1, Steven Myers authored at least 37 papers between 2001 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Practical Revocation and Key Rotation.
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018

2017
Efficient Hybrid Proxy Re-Encryption for Practical Revocation and Key Rotation.
IACR Cryptology ePrint Archive, 2017

Trustworthy and Portable Emulation Platform for Digital Preservation.
Proceedings of the 14th International Conference on Digital Preservation, 2017

2016
Dynamic and Private Cryptographic Access Control for Untrusted Clouds: Costs and Constructions (Extended Version).
CoRR, 2016

On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

2015
A link graph-based approach to identify forum spam.
Security and Communication Networks, 2015

An Overview of ANONIZE: A Large-Scale Anonymous Survey System.
IEEE Security & Privacy, 2015

ANONIZE: A Large-Scale Anonymous Survey System.
IACR Cryptology ePrint Archive, 2015

2014
Emergent Properties & Security: The Complexity ofSecurity as a Science.
Proceedings of the 2014 workshop on New Security Paradigms Workshop, 2014

2013
Black-box construction of a more than non-malleable CCA1 encryption scheme from plaintext awareness.
Journal of Computer Security, 2013

Black-Box Proof of Knowledge of Plaintext and Multiparty Computation with Low Communication Overhead.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

GPU and CPU parallelization of honest-but-curious secure two-party computation.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

2011
Threshold Fully Homomorphic Encryption and Secure Computation.
IACR Cryptology ePrint Archive, 2011

The Nuts and Bolts of a Forum Spam Automator.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

Prevalence and mitigation of forum spamming.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Toward securing sensor clouds.
Proceedings of the 2011 International Conference on Collaboration Technologies and Systems, 2011

2010
Structure-based kernels for the prediction of catalytic residues and their involvement in human inherited disease.
BMC Bioinformatics, 2010

Saving Energy on WiFi with Required IPsec.
Proceedings of the Security and Privacy in Communication Networks, 2010

Secure cloud computing with brokered trusted sensor networks.
Proceedings of the 2010 International Symposium on Collaborative Technologies and Systems, 2010

Mobile location tracking in metro areas: malnets and others.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Bit Encryption Is Complete.
Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science, 2009

A Case Study on Asprox Infection Dynamics.
Proceedings of the Detection of Intrusions and Malware, 2009

2008
Delayed password disclosure.
IJACT, 2008

On Seed-Incompressible Functions.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

Practice & prevention of home-router mid-stream injection attacks.
Proceedings of the 2008 eCrime Researchers Summit, 2008

2007
WiFi Epidemiology: Can Your Neighbors' Router Make Yours Sick?
CoRR, 2007

Experimental Investigation of IEEE 802.15.4 Transmission Power Control and Interference Minimization.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

IPSec: Performance Analysis and Enhancements.
Proceedings of IEEE International Conference on Communications, 2007

2006
Towards a Separation of Semantic and CCA Security for Public Key Encryption.
IACR Cryptology ePrint Archive, 2006

2005
Simple permutations mix well.
Theor. Comput. Sci., 2005

Helping the Phish Detect the Lure.
Proceedings of the Financial Cryptography and Data Security, 2005

A Chat at the Old Phishin' Hole.
Proceedings of the Financial Cryptography and Data Security, 2005

2004
Black-Box Composition Does Not Imply Adaptive Security.
Proceedings of the Advances in Cryptology, 2004

2003
Efficient Amplification of the Security of Weak Pseudo-Random Function Generators.
J. Cryptology, 2003

2001
Cryptographic Counters and Applications to Electronic Voting.
Proceedings of the Advances in Cryptology, 2001


  Loading...