BibTeX records: Stephen A. Weis

download as .bib file

@article{DBLP:journals/iacr/LewiKMW19,
  author       = {Kevin Lewi and
                  Wonho Kim and
                  Ilya Maykov and
                  Stephen A. Weis},
  title        = {Securing Update Propagation with Homomorphic Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {227},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/227},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/LewiKMW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewiRWLXY18,
  author       = {Kevin Lewi and
                  Callen Rain and
                  Stephen A. Weis and
                  Yueting Lee and
                  Haozhi Xiong and
                  Benjamin Yang},
  title        = {Scaling Backend Authentication at Facebook},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {413},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/413},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LewiRWLXY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ChenetteLWW16,
  author       = {Nathan Chenette and
                  Kevin Lewi and
                  Stephen A. Weis and
                  David J. Wu},
  editor       = {Thomas Peyrin},
  title        = {Practical Order-Revealing Encryption with Limited Leakage},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {474--493},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_24},
  doi          = {10.1007/978-3-662-52993-5\_24},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ChenetteLWW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenetteLWW15,
  author       = {Nathan Chenette and
                  Kevin Lewi and
                  Stephen A. Weis and
                  David J. Wu},
  title        = {Practical Order-Revealing Encryption with Limited Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1125},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1125},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenetteLWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/JuelsW09,
  author       = {Ari Juels and
                  Stephen A. Weis},
  title        = {Defining strong privacy for {RFID}},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {1},
  pages        = {7:1--7:23},
  year         = {2009},
  url          = {https://doi.org/10.1145/1609956.1609963},
  doi          = {10.1145/1609956.1609963},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/JuelsW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MungamuruW08,
  author       = {Bob Mungamuru and
                  Stephen A. Weis},
  editor       = {Gene Tsudik},
  title        = {Competition and Fraud in Online Advertising Markets},
  booktitle    = {Financial Cryptography and Data Security, 12th International Conference,
                  {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5143},
  pages        = {187--191},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85230-8\_16},
  doi          = {10.1007/978-3-540-85230-8\_16},
  timestamp    = {Tue, 20 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/MungamuruW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/JuelsW07,
  author       = {Ari Juels and
                  Stephen A. Weis},
  title        = {Defining Strong Privacy for {RFID}},
  booktitle    = {Fifth Annual {IEEE} International Conference on Pervasive Computing
                  and Communications - Workshops (PerCom Workshops 2007), 19-23 March
                  2007, White Plains, New York, {USA}},
  pages        = {342--347},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/PERCOMW.2007.37},
  doi          = {10.1109/PERCOMW.2007.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/JuelsW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ndltd/Weis06,
  author       = {Stephen A. Weis},
  title        = {New foundations for efficient authentication, commutative cryptography,
                  and private disjointness testing},
  school       = {Massachusetts Institute of Technology, Cambridge, MA, {USA}},
  year         = {2006},
  url          = {https://hdl.handle.net/1721.1/37842},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ndltd/Weis06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Weis06,
  author       = {Stephen A. Weis},
  title        = {Privacy Enhancing Technologies},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {4},
  number       = {5},
  pages        = {59--59},
  year         = {2006},
  url          = {https://doi.org/10.1109/MSP.2006.130},
  doi          = {10.1109/MSP.2006.130},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Weis06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/HohenbergerW06,
  author       = {Susan Hohenberger and
                  Stephen A. Weis},
  editor       = {George Danezis and
                  Philippe Golle},
  title        = {Honest-Verifier Private Disjointness Testing Without Random Oracles},
  booktitle    = {Privacy Enhancing Technologies, 6th International Workshop, {PET}
                  2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4258},
  pages        = {277--294},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11957454\_16},
  doi          = {10.1007/11957454\_16},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/HohenbergerW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JuelsW06,
  author       = {Ari Juels and
                  Stephen A. Weis},
  title        = {Defining Strong Privacy for {RFID}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {137},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/137},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JuelsW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Weiss05,
  author       = {Stephen A. Weis},
  title        = {Crypto 2004},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {3},
  number       = {2},
  pages        = {11--13},
  year         = {2005},
  url          = {https://doi.org/10.1109/MSP.2005.39},
  doi          = {10.1109/MSP.2005.39},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Weiss05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JuelsW05,
  author       = {Ari Juels and
                  Stephen A. Weis},
  editor       = {Victor Shoup},
  title        = {Authenticating Pervasive Devices with Human Protocols},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 14-18,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3621},
  pages        = {293--308},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535218\_18},
  doi          = {10.1007/11535218\_18},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/JuelsW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/Weis05,
  author       = {Stephen A. Weis},
  title        = {Security Parallels between People and Pervasive Devices},
  booktitle    = {3rd {IEEE} Conference on Pervasive Computing and Communications Workshops
                  (PerCom 2005 Workshops), 8-12 March 2005, Kauai Island, HI, {USA}},
  pages        = {105--109},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/PERCOMW.2005.72},
  doi          = {10.1109/PERCOMW.2005.72},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/Weis05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Weis04,
  author       = {Stephen A. Weis},
  title        = {{RFID} Privacy Workshop: Concerns, Consensus, and Questions},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {2},
  number       = {2},
  pages        = {48--50},
  year         = {2004},
  url          = {https://doi.org/10.1109/MSECP.2004.1281245},
  doi          = {10.1109/MSECP.2004.1281245},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Weis04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/WeisSRE03,
  author       = {Stephen A. Weis and
                  Sanjay E. Sarma and
                  Ronald L. Rivest and
                  Daniel W. Engels},
  editor       = {Dieter Hutter and
                  G{\"{u}}nter M{\"{u}}ller and
                  Werner Stephan and
                  Markus Ullmann},
  title        = {Security and Privacy Aspects of Low-Cost Radio Frequency Identification
                  Systems},
  booktitle    = {Security in Pervasive Computing, First International Conference, Boppard,
                  Germany, March 12-14, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2802},
  pages        = {201--212},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39881-3\_18},
  doi          = {10.1007/978-3-540-39881-3\_18},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spc/WeisSRE03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SarmaWE02,
  author       = {Sanjay E. Sarma and
                  Stephen A. Weis and
                  Daniel W. Engels},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {{RFID} Systems and Security and Privacy Implications},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {454--469},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_33},
  doi          = {10.1007/3-540-36400-5\_33},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/SarmaWE02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}