default search action
Steven Myers
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j11]L. Jean Camp, Ryan Henry, Tadayoshi Kohno, Shrirang Mare, Steven A. Myers, Shwetak N. Patel, Joshua Streiff:
Toward a Secure Internet of Things: Directions for Research. IEEE Secur. Priv. 18(4): 28-37 (2020) - [j10]Behnood Momenzadeh, Helen Dougherty, Matthew Remmel, Steven A. Myers, L. Jean Camp:
Best Practices Would Make Things Better in the IoT. IEEE Secur. Priv. 18(4): 38-47 (2020)
2010 – 2019
- 2018
- [c28]Steven A. Myers, Adam Shull:
Practical Revocation and Key Rotation. CT-RSA 2018: 157-178 - 2017
- [c27]Zahra Tarkhani, Geoffrey Brown, Steven A. Myers:
Trustworthy and Portable Emulation Platform for Digital Preservation. iPRES 2017 - [i6]Steven A. Myers, Adam Shull:
Efficient Hybrid Proxy Re-Encryption for Practical Revocation and Key Rotation. IACR Cryptol. ePrint Arch. 2017: 833 (2017) - 2016
- [c26]William C. Garrison III, Adam Shull, Steven A. Myers, Adam J. Lee:
On the Practicality of Cryptographically Enforcing Dynamic Access Control Policies in the Cloud. IEEE Symposium on Security and Privacy 2016: 819-838 - [i5]William C. Garrison III, Adam Shull, Adam J. Lee, Steven A. Myers:
Dynamic and Private Cryptographic Access Control for Untrusted Clouds: Costs and Constructions (Extended Version). CoRR abs/1602.09069 (2016) - 2015
- [j9]Susan Hohenberger, Steven A. Myers, Rafael Pass, Abhi Shelat:
An Overview of ANONIZE: A Large-Scale Anonymous Survey System. IEEE Secur. Priv. 13(2): 22-29 (2015) - [j8]Youngsang Shin, Steven A. Myers, Minaxi Gupta, Predrag Radivojac:
A link graph-based approach to identify forum spam. Secur. Commun. Networks 8(2): 176-188 (2015) - [i4]Susan Hohenberger, Steven A. Myers, Rafael Pass, Abhi Shelat:
ANONIZE: A Large-Scale Anonymous Survey System. IACR Cryptol. ePrint Arch. 2015: 681 (2015) - 2014
- [c25]Nathaniel Husted, Steven A. Myers:
Emergent Properties & Security: The Complexity ofSecurity as a Science. NSPW 2014: 1-14 - [c24]Susan Hohenberger, Steven A. Myers, Rafael Pass, Abhi Shelat:
ANONIZE: A Large-Scale Anonymous Survey System. IEEE Symposium on Security and Privacy 2014: 375-389 - 2013
- [j7]Steven A. Myers, Mona Sergi, Abhi Shelat:
Black-box construction of a more than non-malleable CCA1 encryption scheme from plaintext awareness. J. Comput. Secur. 21(5): 721-748 (2013) - [c23]Nathaniel Husted, Steven A. Myers, Abhi Shelat, Paul Grubbs:
GPU and CPU parallelization of honest-but-curious secure two-party computation. ACSAC 2013: 169-178 - [c22]Steven A. Myers, Mona Sergi, Abhi Shelat:
Black-Box Proof of Knowledge of Plaintext and Multiparty Computation with Low Communication Overhead. TCC 2013: 397-417 - 2012
- [c21]Steven A. Myers, Mona Sergi, Abhi Shelat:
Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness. SCN 2012: 149-165 - 2011
- [c20]Apu Kapadia, Steven A. Myers, XiaoFeng Wang, Geoffrey C. Fox:
Toward securing sensor clouds. CTS 2011: 280-289 - [c19]Youngsang Shin, Minaxi Gupta, Steven A. Myers:
Prevalence and mitigation of forum spamming. INFOCOM 2011: 2309-2317 - [c18]Nathaniel Husted, Steven A. Myers:
Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm. LEET 2011 - [c17]Youngsang Shin, Minaxi Gupta, Steven A. Myers:
The Nuts and Bolts of a Forum Spam Automator. LEET 2011 - [i3]Steven A. Myers, Mona Sergi, Abhi Shelat:
Threshold Fully Homomorphic Encryption and Secure Computation. IACR Cryptol. ePrint Arch. 2011: 454 (2011) - 2010
- [j6]Fuxiao Xin, Steven A. Myers, Yong Fuga Li, David N. Cooper, Sean D. Mooney, Predrag Radivojac:
Structure-based kernels for the prediction of catalytic residues and their involvement in human inherited disease. Bioinform. 26(16): 1975-1982 (2010) - [j5]Fuxiao Xin, Steven A. Myers, Yong Fuga Li, David N. Cooper, Sean D. Mooney, Predrag Radivojac:
Structure-based kernels for the prediction of catalytic residues and their involvement in human inherited disease. BMC Bioinform. 11(S-10): O4 (2010) - [c16]Nathaniel Husted, Steven A. Myers:
Mobile location tracking in metro areas: malnets and others. CCS 2010: 85-96 - [c15]Apu Kapadia, Steven A. Myers, XiaoFeng Wang, Geoffrey C. Fox:
Secure cloud computing with brokered trusted sensor networks. CTS 2010: 581-592 - [c14]Youngsang Shin, Steven A. Myers, Minaxi Gupta:
Saving Energy on WiFi with Required IPsec. SecureComm 2010: 144-161
2000 – 2009
- 2009
- [c13]Youngsang Shin, Steven A. Myers, Minaxi Gupta:
A Case Study on Asprox Infection Dynamics. DIMVA 2009: 1-20 - [c12]Steven A. Myers, Abhi Shelat:
Bit Encryption Is Complete. FOCS 2009: 607-616 - 2008
- [j4]Markus Jakobsson, Steven A. Myers:
Delayed password disclosure. Int. J. Appl. Cryptogr. 1(1): 47-59 (2008) - [c11]Steven A. Myers, Sid Stamm:
Practice & prevention of home-router mid-stream injection attacks. eCrime 2008: 1-14 - [c10]Shai Halevi, Steven A. Myers, Charles Rackoff:
On Seed-Incompressible Functions. TCC 2008: 19-36 - 2007
- [j3]Markus Jakobsson, Steven A. Myers:
Delayed password disclosure. SIGACT News 38(3): 56-75 (2007) - [c9]Markus Jakobsson, Steven A. Myers:
Delayed password disclosure. Digital Identity Management 2007: 17-26 - [c8]Craig A. Shue, Minaxi Gupta, Steven A. Myers:
IPSec: Performance Analysis and Enhancements. ICC 2007: 1527-1532 - [c7]Yael Gertner, Tal Malkin, Steven A. Myers:
Towards a Separation of Semantic and CCA Security for Public Key Encryption. TCC 2007: 434-455 - [i2]Hao Hu, Steven A. Myers, Vittoria Colizza, Alessandro Vespignani:
WiFi Epidemiology: Can Your Neighbors' Router Make Yours Sick? CoRR abs/0706.3146 (2007) - 2006
- [i1]Yael Gertner, Tal Malkin, Steven A. Myers:
Towards a Separation of Semantic and CCA Security for Public Key Encryption. IACR Cryptol. ePrint Arch. 2006: 447 (2006) - 2005
- [b1]Steven Myers:
Black-box limitations in cryptography. University of Toronto, Canada, 2005 - [j2]Shlomo Hoory, Avner Magen, Steven A. Myers, Charles Rackoff:
Simple permutations mix well. Theor. Comput. Sci. 348(2-3): 251-261 (2005) - [c6]Richard Clayton, Drew Dean, Markus Jakobsson, Steven A. Myers, Stuart G. Stubblebine, Michael Szydlo:
A Chat at the Old Phishin' Hole. Financial Cryptography 2005: 88 - [c5]Steven A. Myers:
Helping the Phish Detect the Lure. Financial Cryptography 2005: 90 - 2004
- [c4]Steven A. Myers:
Black-Box Composition Does Not Imply Adaptive Security. EUROCRYPT 2004: 189-206 - [c3]Shlomo Hoory, Avner Magen, Steven A. Myers, Charles Rackoff:
Simple Permutations Mix Well. ICALP 2004: 770-781 - 2003
- [j1]Steven A. Myers:
Efficient Amplification of the Security of Weak Pseudo-Random Function Generators. J. Cryptol. 16(1): 1-24 (2003) - 2001
- [c2]Jonathan Katz, Steven A. Myers, Rafail Ostrovsky:
Cryptographic Counters and Applications to Electronic Voting. EUROCRYPT 2001: 78-92 - [c1]Steven A. Myers:
Efficient Amplification of the Security of Weak Pseudo-random Function Generators. EUROCRYPT 2001: 358-372
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint