What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ari Juels
Google Scholar
96
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Liquefaction: Privately Liquefying Blockchain Assets.
James Austgen
Andrés Fábrega
Mahimna Kelkar
Dani Vilardell
Sarah Allen
Kushal Babel
Jay Yu
Ari Juels
2025
conf/uss
Voting-Bloc Entropy: A New Metric for DAO Decentralization.
Andrés Fábrega
Amy Zhao
Jay Yu
James Austgen
Sarah Allen
Kushal Babel
Mahimna Kelkar
Ari Juels
2024
conf/ccs
Complete Knowledge: Preventing Encumbrance of Cryptographic Secrets.
Mahimna Kelkar
Kushal Babel
Philip Daian
James Austgen
Vitalik Buterin
Ari Juels
2024
conf/fc
GoAT: File Geolocation via Anchor Timestamping.
Deepak Maram
Mahimna Kelkar
Iddo Bentov
Ari Juels
2023
conf/ccs
Lanturn: Measuring Economic Security of Smart Contracts Through Adaptive Learning.
Kushal Babel
Mojan Javaheripi
Yan Ji
Mahimna Kelkar
Farinaz Koushanfar
Ari Juels
2023
conf/ccs
Themis: Fast, Strong Order-Fairness in Byzantine Consensus.
Mahimna Kelkar
Soubhik Deb
Sishan Long
Ari Juels
Sreeram Kannan
2023
conf/fc
Forsage: Anatomy of a Smart-Contract Pyramid Scheme.
Tyler Kell
Haaroon Yousaf
Sarah Allen
Sarah Meiklejohn
Ari Juels
2023
conf/sp
Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts.
Kushal Babel
Philip Daian
Mahimna Kelkar
Ari Juels
2021
conf/sp
CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability.
Deepak Maram
Harjasleen Malvai
Fan Zhang
Nerla Jean-Louis
Alexander Frolov
Tyler Kell
Tyrone Lobban
Christine Moy
Ari Juels
Andrew Miller
2021
conf/ndss
SquirRL: Automating Attack Analysis on Blockchain Incentive Mechanisms with Deep Reinforcement Learning.
Charlie Hou
Mingxun Zhou
Yan Ji
Phil Daian
Florian Tramèr
Giulia Fanti
Ari Juels
2020
conf/ccs
BDoS: Blockchain Denial-of-Service.
Michael Mirkin
Yan Ji
Jonathan Pang
Ariah Klages-Mundt
Ittay Eyal
Ari Juels
2020
conf/ccs
DECO: Liberating Web Data Using Decentralized Oracles for TLS.
Fan Zhang
Deepak Maram
Harjasleen Malvai
Steven Goldfeder
Ari Juels
2020
conf/crypto
Order-Fairness for Byzantine Consensus.
Mahimna Kelkar
Fan Zhang
Steven Goldfeder
Ari Juels
2020
conf/sp
Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability.
Philip Daian
Steven Goldfeder
Tyler Kell
Yunqi Li
Xueyuan Zhao
Iddo Bentov
Lorenz Breidenbach
Ari Juels
2019
conf/ccs
PIEs: Public Incompressible Encodings for Decentralized Storage.
Ethan Cecchetti
Ben Fisch
Ian Miers
Ari Juels
2019
conf/ccs
Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware.
Iddo Bentov
Yan Ji
Fan Zhang
Lorenz Breidenbach
Philip Daian
Ari Juels
2019
conf/ccs
CHURP: Dynamic-Committee Proactive Secret Sharing.
Sai Krishna Deepak Maram
Fan Zhang
Lun Wang
Andrew Low
Yupeng Zhang
Ari Juels
Dawn Song
2019
conf/ccs
Multisketches: Practical Secure Sketches Using Off-the-Shelf Biometric Matching Algorithms.
Rahul Chatterjee
M. Sadegh Riazi
Tanmoy Chowdhury
Emanuela Marasco
Farinaz Koushanfar
Ari Juels
2019
conf/eurosp
Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts.
Raymond Cheng
Fan Zhang
Jernej Kos
Warren He
Nicholas Hynes
Noah M. Johnson
Ari Juels
Andrew Miller
Dawn Song
2018
conf/uss
DelegaTEE: Brokered Delegation Using Trusted Execution Environments.
Sinisa Matetic
Moritz Schneider
Andrew Miller
Ari Juels
Srdjan Capkun
2018
conf/uss
Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts.
Lorenz Breidenbach
Philip Daian
Florian Tramèr
Ari Juels
2017
conf/ccs
Solidus: Confidential Distributed Ledger Transactions via PVORM.
Ethan Cecchetti
Fan Zhang
Yan Ji
Ahmed E. Kosba
Ari Juels
Elaine Shi
2017
conf/uss
REM: Resource-Efficient Mining for Blockchains.
Fan Zhang
Ittay Eyal
Robert Escriva
Ari Juels
Robbert van Renesse
2017
conf/uss
ROTE: Rollback Protection for Trusted Execution.
Sinisa Matetic
Mansoor Ahmed
Kari Kostiainen
Aritra Dhar
David M. Sommer
Arthur Gervais
Ari Juels
Srdjan Capkun
2017
conf/crypto
A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing.
Joanne Woodage
Rahul Chatterjee
Yevgeniy Dodis
Ari Juels
Thomas Ristenpart
2017
conf/fc
(Short Paper) PieceWork: Generalized Outsourcing Control for Proofs of Work.
Philip Daian
Ittay Eyal
Ari Juels
Emin Gün Sirer
2017
conf/eurosp
Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge.
Florian Tramèr
Fan Zhang
Huang Lin
Jean-Pierre Hubaux
Ari Juels
Elaine Shi
2017
conf/eurosp
FairTest: Discovering Unwarranted Associations in Data-Driven Applications.
Florian Tramèr
Vaggelis Atlidakis
Roxana Geambasu
Daniel J. Hsu
Jean-Pierre Hubaux
Mathias Humbert
Ari Juels
Huang Lin
2016
conf/ccs
Town Crier: An Authenticated Data Feed for Smart Contracts.
Fan Zhang
Ethan Cecchetti
Kyle Croman
Ari Juels
Elaine Shi
2016
conf/ccs
The Ring of Gyges: Investigating the Future of Criminal Smart Contracts.
Ari Juels
Ahmed E. Kosba
Elaine Shi
2016
conf/uss
Stealing Machine Learning Models via Prediction APIs.
Florian Tramèr
Fan Zhang
Ari Juels
Michael K. Reiter
Thomas Ristenpart
2016
conf/fc
On Scaling Decentralized Blockchains - (A Position Paper).
Kyle Croman
Christian Decker
Ittay Eyal
Adem Efe Gencer
Ari Juels
Ahmed E. Kosba
Andrew Miller
Prateek Saxena
Elaine Shi
Emin Gün Sirer
Dawn Song
Roger Wattenhofer
2016
conf/sp
pASSWORD tYPOS and How to Correct Them Securely.
Rahul Chatterjee
Anish Athayle
Devdatta Akhawe
Ari Juels
Thomas Ristenpart
2015
conf/ccs
Falcon Codes: Fast, Authenticated LT Codes (Or: Making Rapid Tornadoes Unstoppable).
Ari Juels
James Kelley
Roberto Tamassia
Nikos Triandopoulos
2015
conf/uss
The Pythia PRF Service.
Adam Everspaugh
Rahul Chatterjee
Samuel Scott
Ari Juels
Thomas Ristenpart
2015
conf/sp
GenoGuard: Protecting Genomic Data against Brute-Force Attacks.
Zhicong Huang
Erman Ayday
Jacques Fellay
Jean-Pierre Hubaux
Ari Juels
2015
conf/sp
Cracking-Resistant Password Vaults Using Natural Language Encoders.
Rahul Chatterjee
Joseph Bonneau
Ari Juels
Thomas Ristenpart
2015
conf/eurocrypt
A Formal Treatment of Backdoored Pseudorandom Generators.
Yevgeniy Dodis
Chaya Ganesh
Alexander Golovnev
Ari Juels
Thomas Ristenpart
2014
conf/ccs
Cross-Tenant Side-Channel Attacks in PaaS Clouds.
Yinqian Zhang
Ari Juels
Michael K. Reiter
Thomas Ristenpart
2014
conf/ccs
An Epidemiological Study of Malware Encounters in a Large Enterprise.
Ting-Fang Yen
Victor Heorhiadi
Alina Oprea
Michael K. Reiter
Ari Juels
2014
conf/sp
Permacoin: Repurposing Bitcoin Work for Data Preservation.
Andrew Miller
Ari Juels
Elaine Shi
Bryan Parno
Jonathan Katz
2014
conf/eurocrypt
Honey Encryption: Security Beyond the Brute-Force Bound.
Ari Juels
Thomas Ristenpart
2013
journals/joc
FlipIt: The Game of "Stealthy Takeover".
Marten van Dijk
Ari Juels
Alina Oprea
Ronald L. Rivest
2013
conf/ccs
Fifth ACM cloud computing security workshop (CCSW 2013).
Ari Juels
Bryan Parno
2013
conf/ccs
Heart-to-heart (H2H): authentication for implanted medical devices.
Masoud Rostami
Ari Juels
Farinaz Koushanfar
2013
conf/ccs
Honeywords: making password-cracking detectable.
Ari Juels
Ronald L. Rivest
2013
conf/ndss
Tailing RFID Tags for Clone Detection.
Davide Zanetti
Srdjan Capkun
Ari Juels
2013
conf/acsac
Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks.
Ting-Fang Yen
Alina Oprea
Kaan Onarlioglu
Todd Leetham
William K. Robertson
Ari Juels
Engin Kirda
2012
conf/ccs
Hourglass schemes: how to prove that cloud files are encrypted.
Marten van Dijk
Ari Juels
Alina Oprea
Ronald L. Rivest
Emil Stefanov
Nikos Triandopoulos
2012
conf/ccs
Cross-VM side channels and their use to extract private keys.
Yinqian Zhang
Ari Juels
Michael K. Reiter
Thomas Ristenpart
2012
conf/acsac
Iris: a scalable cloud file system with efficient integrity checks.
Emil Stefanov
Marten van Dijk
Ari Juels
Alina Oprea
2011
conf/ccs
How to tell if your cloud files are vulnerable to drive crashes.
Kevin D. Bowers
Marten van Dijk
Ari Juels
Alina Oprea
Ronald L. Rivest
2011
conf/sp
HomeAlone: Co-residency Detection in the Cloud via Side-Channel Analysis.
Yinqian Zhang
Ari Juels
Alina Oprea
Michael K. Reiter
2010
conf/uss
On the Impossibility of Cryptography Alone for Privacy-Preserving Cloud Computing.
Marten van Dijk
Ari Juels
2009
conf/ccs
EPC RFID tag security weaknesses and defenses: passport cards, enhanced drivers licenses, and beyond.
Karl Koscher
Ari Juels
Vjekoslav Brajkovic
Tadayoshi Kohno
2009
conf/ccs
HAIL: a high-availability and integrity layer for cloud storage.
Kevin D. Bowers
Ari Juels
Alina Oprea
2009
conf/ccs
Proofs of retrievability: theory and implementation.
Kevin D. Bowers
Ari Juels
Alina Oprea
2009
conf/uss
CCCP: Secure Remote Storage for Computational RFIDs.
Mastooreh Salajegheh
Shane S. Clark
Benjamin Ransford
Kevin Fu
Ari Juels
2009
conf/nspw
Server-side detection of malware infection.
Markus Jakobsson
Ari Juels
2008
conf/uss
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security.
Ari Juels
Ravikanth Pappu
Bryan Parno
2008
conf/wisec
RFID security: in the shoulder and on the loading dock.
Ari Juels
2008
conf/wisec
RFID security and privacy: long-term research or short-term tinkering?
Gene Tsudik
Mike Burmester
Ari Juels
Alfred Kobsa
David Molnar
Roberto Di Pietro
Melanie R. Rieback
2007
conf/ccs
Covert channels in privacy-preserving identification systems.
Daniel V. Bailey
Dan Boneh
Eu-Jin Goh
Ari Juels
2007
conf/ccs
Pors: proofs of retrievability for large files.
Ari Juels
Burton S. Kaliski Jr.
2007
conf/uss
Combating Click Fraud via Premium Clicks.
Ari Juels
Sid Stamm
Markus Jakobsson
2007
conf/fc
Vulnerabilities in First-Generation RFID-enabled Credit Cards.
Thomas S. Heydt-Benjamin
Daniel V. Bailey
Kevin Fu
Ari Juels
Tom O'Hare
2007
conf/asiacrypt
Two-Party Computing with Encrypted Data.
Seung Geol Choi
Ariel Elbaz
Ari Juels
Tal Malkin
Moti Yung
2006
conf/ccs
Fourth-factor authentication: somebody you know.
John G. Brainard
Ari Juels
Ronald L. Rivest
Michael Szydlo
Moti Yung
2006
conf/sp
Cache Cookies for Browser Authentication (Extended Abstract).
Ari Juels
Markus Jakobsson
Tom N. Jagatic
2006
conf/ches
The Outer Limits of RFID Security.
Ari Juels
2005
conf/uss
Security Analysis of a Cryptographically-Enabled RFID Device.
Steve Bono
Matthew Green
Adam Stubblefield
Ari Juels
Aviel D. Rubin
Michael Szydlo
2005
conf/crypto
Authenticating Pervasive Devices with Human Protocols.
Ari Juels
Stephen A. Weis
2004
conf/ccs
Parallel mixing.
Philippe Golle
Ari Juels
2004
conf/ccs
New client puzzle outsourcing techniques for DoS resistance.
Brent Waters
Ari Juels
J. Alex Halderman
Edward W. Felten
2004
conf/uss
RFID: Security and Privacy for Five-Cent Computers.
Ari Juels
2004
conf/ctrsa
Universal Re-encryption for Mixnets.
Philippe Golle
Markus Jakobsson
Ari Juels
Paul F. Syverson
2004
conf/eurocrypt
Dining Cryptographers Revisited.
Philippe Golle
Ari Juels
2003
conf/ccs
The blocker tag: selective blocking of RFID tags for consumer privacy.
Ari Juels
Ronald L. Rivest
Michael Szydlo
2003
conf/uss
A New Two-Server Approach for Authentication with Short Secrets.
John G. Brainard
Ari Juels
Burt Kaliski
Michael Szydlo
2003
conf/fc
Squealing Euros: Privacy Protection in RFID-Enabled Banknotes.
Ari Juels
Ravikanth Pappu
2002
conf/uss
Making Mix Nets Robust for Electronic Voting by Randomized Partial Checking.
Markus Jakobsson
Ari Juels
Ronald L. Rivest
2002
conf/fc
A Two-Server, Sealed-Bid Auction Protocol.
Ari Juels
Michael Szydlo
2002
conf/pkc
RSA Key Generation with Verifiable Randomness.
Ari Juels
Jorge Guajardo
2002
conf/ctrsa
Proprietary Certificates.
Markus Jakobsson
Ari Juels
Phong Q. Nguyen
2002
conf/asiacrypt
Optimistic Mixing for Exit-Polls.
Philippe Golle
Sheng Zhong
Dan Boneh
Markus Jakobsson
Ari Juels
2001
conf/ccs
Error-tolerant password recovery.
Niklas Frykholm
Ari Juels
2001
conf/ctrsa
Targeted Advertising ... And Privacy Too.
Ari Juels
2000
conf/ccs
Funkspiel schemes: an alternative to conventional tamper resistance.
Johan Håstad
Jakob Jonsson
Ari Juels
Moti Yung
2000
conf/asiacrypt
Mix and Match: Secure Function Evaluation via Ciphertexts.
Markus Jakobsson
Ari Juels
2000
conf/asiacrypt
Addition of ElGamal Plaintexts.
Markus Jakobsson
Ari Juels
1999
conf/ccs
A Fuzzy Commitment Scheme.
Ari Juels
Martin Wattenberg
1999
conf/fc
Trustee Tokens: Simple and Practical Anonymous Digital Coin Tracing.
Ari Juels
1999
conf/ndss
Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks.
Ari Juels
John G. Brainard
1998
conf/ccs
A Practical Secure Physical Random Bit Generator.
Markus Jakobsson
Elizabeth A. M. Shriver
Bruce Hillyer
Ari Juels
1998
conf/fc
X-Cash: Executable Digital Cash.
Markus Jakobsson
Ari Juels
1997
conf/crypto
Security of Blind Digital Signatures (Extended Abstract).
Ari Juels
Michael Luby
Rafail Ostrovsky
Coauthors
Adam Everspaugh
(1)
Adam Stubblefield
(1)
Adem Efe Gencer
(1)
Ahmed E. Kosba
(3)
Alexander Frolov
(1)
Alexander Golovnev
(1)
Alfred Kobsa
(1)
Alina Oprea
(9)
Amy Zhao
(1)
Andrés Fábrega
(2)
Andrew Low
(1)
Andrew Miller
(5)
Anish Athayle
(1)
Ari Juels
(96)
Ariah Klages-Mundt
(1)
Ariel Elbaz
(1)
Aritra Dhar
(1)
Arthur Gervais
(1)
Aviel D. Rubin
(1)
Ben Fisch
(1)
Benjamin Ransford
(1)
Brent Waters
(1)
Bruce Hillyer
(1)
Bryan Parno
(3)
Burt Kaliski
(1)
Burton S. Kaliski Jr.
(1)
Charlie Hou
(1)
Chaya Ganesh
(1)
Christian Decker
(1)
Christine Moy
(1)
Dan Boneh
(2)
Dani Vilardell
(1)
Daniel J. Hsu
(1)
Daniel V. Bailey
(2)
David M. Sommer
(1)
David Molnar
(1)
Davide Zanetti
(1)
Dawn Song
(3)
Deepak Maram
(3)
Devdatta Akhawe
(1)
Edward W. Felten
(1)
Elaine Shi
(6)
Elizabeth A. M. Shriver
(1)
Emanuela Marasco
(1)
Emil Stefanov
(2)
Emin Gün Sirer
(2)
Engin Kirda
(1)
Erman Ayday
(1)
Ethan Cecchetti
(3)
Eu-Jin Goh
(1)
Fan Zhang
(11)
Farinaz Koushanfar
(3)
Florian Tramèr
(5)
Gene Tsudik
(1)
Giulia Fanti
(1)
Haaroon Yousaf
(1)
Harjasleen Malvai
(2)
Huang Lin
(2)
Ian Miers
(1)
Iddo Bentov
(3)
Ittay Eyal
(4)
J. Alex Halderman
(1)
Jacques Fellay
(1)
Jakob Jonsson
(1)
James Austgen
(3)
James Kelley
(1)
Jay Yu
(2)
Jean-Pierre Hubaux
(3)
Jernej Kos
(1)
Joanne Woodage
(1)
Johan Håstad
(1)
John G. Brainard
(3)
Jonathan Katz
(1)
Jonathan Pang
(1)
Jorge Guajardo
(1)
Joseph Bonneau
(1)
Kaan Onarlioglu
(1)
Kari Kostiainen
(1)
Karl Koscher
(1)
Kevin D. Bowers
(3)
Kevin Fu
(2)
Kushal Babel
(5)
Kyle Croman
(2)
Lorenz Breidenbach
(3)
Lun Wang
(1)
M. Sadegh Riazi
(1)
Mahimna Kelkar
(8)
Mansoor Ahmed
(1)
Markus Jakobsson
(11)
Marten van Dijk
(5)
Martin Wattenberg
(1)
Masoud Rostami
(1)
Mastooreh Salajegheh
(1)
Mathias Humbert
(1)
Matthew Green
(1)
Melanie R. Rieback
(1)
Michael K. Reiter
(5)
Michael Luby
(1)
Michael Mirkin
(1)
Michael Szydlo
(5)
Mike Burmester
(1)
Mingxun Zhou
(1)
Mojan Javaheripi
(1)
Moritz Schneider
(1)
Moti Yung
(3)
Nerla Jean-Louis
(1)
Nicholas Hynes
(1)
Niklas Frykholm
(1)
Nikos Triandopoulos
(2)
Noah M. Johnson
(1)
Paul F. Syverson
(1)
Phil Daian
(1)
Philip Daian
(6)
Philippe Golle
(4)
Phong Q. Nguyen
(1)
Prateek Saxena
(1)
Rafail Ostrovsky
(1)
Rahul Chatterjee
(5)
Ravikanth Pappu
(2)
Raymond Cheng
(1)
Robbert van Renesse
(1)
Robert Escriva
(1)
Roberto Di Pietro
(1)
Roberto Tamassia
(1)
Roger Wattenhofer
(1)
Ronald L. Rivest
(7)
Roxana Geambasu
(1)
Sai Krishna Deepak Maram
(1)
Samuel Scott
(1)
Sarah Allen
(3)
Sarah Meiklejohn
(1)
Seung Geol Choi
(1)
Shane S. Clark
(1)
Sheng Zhong
(1)
Sid Stamm
(1)
Sinisa Matetic
(2)
Sishan Long
(1)
Soubhik Deb
(1)
Srdjan Capkun
(3)
Sreeram Kannan
(1)
Stephen A. Weis
(1)
Steve Bono
(1)
Steven Goldfeder
(3)
Tadayoshi Kohno
(1)
Tal Malkin
(1)
Tanmoy Chowdhury
(1)
Thomas Ristenpart
(9)
Thomas S. Heydt-Benjamin
(1)
Ting-Fang Yen
(2)
Todd Leetham
(1)
Tom N. Jagatic
(1)
Tom O'Hare
(1)
Tyler Kell
(3)
Tyrone Lobban
(1)
Vaggelis Atlidakis
(1)
Victor Heorhiadi
(1)
Vitalik Buterin
(1)
Vjekoslav Brajkovic
(1)
Warren He
(1)
William K. Robertson
(1)
Xueyuan Zhao
(1)
Yan Ji
(5)
Yevgeniy Dodis
(2)
Yinqian Zhang
(3)
Yunqi Li
(1)
Yupeng Zhang
(1)
Zhicong Huang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to