Steven Myers

According to our database1, Steven Myers authored at least 37 papers between 2001 and 2018.

Collaborative distances:



In proceedings 
PhD thesis 




Practical Revocation and Key Rotation.
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018

Efficient Hybrid Proxy Re-Encryption for Practical Revocation and Key Rotation.
IACR Cryptology ePrint Archive, 2017

Trustworthy and Portable Emulation Platform for Digital Preservation.
Proceedings of the 14th International Conference on Digital Preservation, 2017

Dynamic and Private Cryptographic Access Control for Untrusted Clouds: Costs and Constructions (Extended Version).
CoRR, 2016

On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

A link graph-based approach to identify forum spam.
Security and Communication Networks, 2015

An Overview of ANONIZE: A Large-Scale Anonymous Survey System.
IEEE Security & Privacy, 2015

ANONIZE: A Large-Scale Anonymous Survey System.
IACR Cryptology ePrint Archive, 2015

Emergent Properties & Security: The Complexity ofSecurity as a Science.
Proceedings of the 2014 workshop on New Security Paradigms Workshop, 2014

Black-box construction of a more than non-malleable CCA1 encryption scheme from plaintext awareness.
Journal of Computer Security, 2013

Black-Box Proof of Knowledge of Plaintext and Multiparty Computation with Low Communication Overhead.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

GPU and CPU parallelization of honest-but-curious secure two-party computation.
Proceedings of the Annual Computer Security Applications Conference, 2013

Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Threshold Fully Homomorphic Encryption and Secure Computation.
IACR Cryptology ePrint Archive, 2011

The Nuts and Bolts of a Forum Spam Automator.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm.
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011

Prevalence and mitigation of forum spamming.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Toward securing sensor clouds.
Proceedings of the 2011 International Conference on Collaboration Technologies and Systems, 2011

Structure-based kernels for the prediction of catalytic residues and their involvement in human inherited disease.
BMC Bioinformatics, 2010

Saving Energy on WiFi with Required IPsec.
Proceedings of the Security and Privacy in Communication Networks, 2010

Secure cloud computing with brokered trusted sensor networks.
Proceedings of the 2010 International Symposium on Collaborative Technologies and Systems, 2010

Mobile location tracking in metro areas: malnets and others.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Bit Encryption Is Complete.
Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science, 2009

A Case Study on Asprox Infection Dynamics.
Proceedings of the Detection of Intrusions and Malware, 2009

Delayed password disclosure.
IJACT, 2008

On Seed-Incompressible Functions.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

Practice & prevention of home-router mid-stream injection attacks.
Proceedings of the 2008 eCrime Researchers Summit, 2008

WiFi Epidemiology: Can Your Neighbors' Router Make Yours Sick?
CoRR, 2007

Experimental Investigation of IEEE 802.15.4 Transmission Power Control and Interference Minimization.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

IPSec: Performance Analysis and Enhancements.
Proceedings of IEEE International Conference on Communications, 2007

Towards a Separation of Semantic and CCA Security for Public Key Encryption.
IACR Cryptology ePrint Archive, 2006

Simple permutations mix well.
Theor. Comput. Sci., 2005

Helping the Phish Detect the Lure.
Proceedings of the Financial Cryptography and Data Security, 2005

A Chat at the Old Phishin' Hole.
Proceedings of the Financial Cryptography and Data Security, 2005

Black-Box Composition Does Not Imply Adaptive Security.
Proceedings of the Advances in Cryptology, 2004

Efficient Amplification of the Security of Weak Pseudo-Random Function Generators.
J. Cryptology, 2003

Cryptographic Counters and Applications to Electronic Voting.
Proceedings of the Advances in Cryptology, 2001