


default search action
BibTeX records: Stephen A. Weis
@article{DBLP:journals/iacr/LewiKMW19,
author = {Kevin Lewi and
Wonho Kim and
Ilya Maykov and
Stephen A. Weis},
title = {Securing Update Propagation with Homomorphic Hashing},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {227},
year = {2019},
url = {https://eprint.iacr.org/2019/227},
timestamp = {Tue, 20 Dec 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/iacr/LewiKMW19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LewiRWLXY18,
author = {Kevin Lewi and
Callen Rain and
Stephen A. Weis and
Yueting Lee and
Haozhi Xiong and
Benjamin Yang},
title = {Scaling Backend Authentication at Facebook},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {413},
year = {2018},
url = {https://eprint.iacr.org/2018/413},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/LewiRWLXY18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ChenetteLWW16,
author = {Nathan Chenette and
Kevin Lewi and
Stephen A. Weis and
David J. Wu},
editor = {Thomas Peyrin},
title = {Practical Order-Revealing Encryption with Limited Leakage},
booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {9783},
pages = {474--493},
publisher = {Springer},
year = {2016},
url = {https://doi.org/10.1007/978-3-662-52993-5\_24},
doi = {10.1007/978-3-662-52993-5\_24},
timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/fse/ChenetteLWW16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenetteLWW15,
author = {Nathan Chenette and
Kevin Lewi and
Stephen A. Weis and
David J. Wu},
title = {Practical Order-Revealing Encryption with Limited Leakage},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {1125},
year = {2015},
url = {http://eprint.iacr.org/2015/1125},
timestamp = {Sun, 11 Sep 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/ChenetteLWW15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/JuelsW09,
author = {Ari Juels and
Stephen A. Weis},
title = {Defining strong privacy for {RFID}},
journal = {{ACM} Trans. Inf. Syst. Secur.},
volume = {13},
number = {1},
pages = {7:1--7:23},
year = {2009},
url = {https://doi.org/10.1145/1609956.1609963},
doi = {10.1145/1609956.1609963},
timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/tissec/JuelsW09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/MungamuruW08,
author = {Bob Mungamuru and
Stephen A. Weis},
editor = {Gene Tsudik},
title = {Competition and Fraud in Online Advertising Markets},
booktitle = {Financial Cryptography and Data Security, 12th International Conference,
{FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected
Papers},
series = {Lecture Notes in Computer Science},
volume = {5143},
pages = {187--191},
publisher = {Springer},
year = {2008},
url = {https://doi.org/10.1007/978-3-540-85230-8\_16},
doi = {10.1007/978-3-540-85230-8\_16},
timestamp = {Tue, 20 Dec 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/fc/MungamuruW08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/JuelsW07,
author = {Ari Juels and
Stephen A. Weis},
title = {Defining Strong Privacy for {RFID}},
booktitle = {Fifth Annual {IEEE} International Conference on Pervasive Computing
and Communications - Workshops (PerCom Workshops 2007), 19-23 March
2007, White Plains, New York, {USA}},
pages = {342--347},
publisher = {{IEEE} Computer Society},
year = {2007},
url = {https://doi.org/10.1109/PERCOMW.2007.37},
doi = {10.1109/PERCOMW.2007.37},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/percom/JuelsW07.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ndltd/Weis06,
author = {Stephen A. Weis},
title = {New foundations for efficient authentication, commutative cryptography,
and private disjointness testing},
school = {Massachusetts Institute of Technology, Cambridge, MA, {USA}},
year = {2006},
url = {https://hdl.handle.net/1721.1/37842},
timestamp = {Wed, 04 May 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/phd/ndltd/Weis06.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Weis06,
author = {Stephen A. Weis},
title = {Privacy Enhancing Technologies},
journal = {{IEEE} Secur. Priv.},
volume = {4},
number = {5},
pages = {59--59},
year = {2006},
url = {https://doi.org/10.1109/MSP.2006.130},
doi = {10.1109/MSP.2006.130},
timestamp = {Sun, 15 Mar 2020 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ieeesp/Weis06.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/HohenbergerW06,
author = {Susan Hohenberger and
Stephen A. Weis},
editor = {George Danezis and
Philippe Golle},
title = {Honest-Verifier Private Disjointness Testing Without Random Oracles},
booktitle = {Privacy Enhancing Technologies, 6th International Workshop, {PET}
2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers},
series = {Lecture Notes in Computer Science},
volume = {4258},
pages = {277--294},
publisher = {Springer},
year = {2006},
url = {https://doi.org/10.1007/11957454\_16},
doi = {10.1007/11957454\_16},
timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/pet/HohenbergerW06.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JuelsW06,
author = {Ari Juels and
Stephen A. Weis},
title = {Defining Strong Privacy for {RFID}},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {137},
year = {2006},
url = {http://eprint.iacr.org/2006/137},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/JuelsW06.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Weiss05,
author = {Stephen A. Weis},
title = {Crypto 2004},
journal = {{IEEE} Secur. Priv.},
volume = {3},
number = {2},
pages = {11--13},
year = {2005},
url = {https://doi.org/10.1109/MSP.2005.39},
doi = {10.1109/MSP.2005.39},
timestamp = {Wed, 21 Dec 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ieeesp/Weiss05.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/JuelsW05,
author = {Ari Juels and
Stephen A. Weis},
editor = {Victor Shoup},
title = {Authenticating Pervasive Devices with Human Protocols},
booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
Cryptology Conference, Santa Barbara, California, USA, August 14-18,
2005, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {3621},
pages = {293--308},
publisher = {Springer},
year = {2005},
url = {https://doi.org/10.1007/11535218\_18},
doi = {10.1007/11535218\_18},
timestamp = {Tue, 14 May 2019 10:00:48 +0200},
biburl = {https://dblp.org/rec/conf/crypto/JuelsW05.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/Weis05,
author = {Stephen A. Weis},
title = {Security Parallels between People and Pervasive Devices},
booktitle = {3rd {IEEE} Conference on Pervasive Computing and Communications Workshops
(PerCom 2005 Workshops), 8-12 March 2005, Kauai Island, HI, {USA}},
pages = {105--109},
publisher = {{IEEE} Computer Society},
year = {2005},
url = {https://doi.org/10.1109/PERCOMW.2005.72},
doi = {10.1109/PERCOMW.2005.72},
timestamp = {Fri, 24 Mar 2023 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/percom/Weis05.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Weis04,
author = {Stephen A. Weis},
title = {{RFID} Privacy Workshop: Concerns, Consensus, and Questions},
journal = {{IEEE} Secur. Priv.},
volume = {2},
number = {2},
pages = {48--50},
year = {2004},
url = {https://doi.org/10.1109/MSECP.2004.1281245},
doi = {10.1109/MSECP.2004.1281245},
timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ieeesp/Weis04.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/WeisSRE03,
author = {Stephen A. Weis and
Sanjay E. Sarma and
Ronald L. Rivest and
Daniel W. Engels},
editor = {Dieter Hutter and
G{\"{u}}nter M{\"{u}}ller and
Werner Stephan and
Markus Ullmann},
title = {Security and Privacy Aspects of Low-Cost Radio Frequency Identification
Systems},
booktitle = {Security in Pervasive Computing, First International Conference, Boppard,
Germany, March 12-14, 2003, Revised Papers},
series = {Lecture Notes in Computer Science},
volume = {2802},
pages = {201--212},
publisher = {Springer},
year = {2003},
url = {https://doi.org/10.1007/978-3-540-39881-3\_18},
doi = {10.1007/978-3-540-39881-3\_18},
timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/spc/WeisSRE03.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/SarmaWE02,
author = {Sanjay E. Sarma and
Stephen A. Weis and
Daniel W. Engels},
editor = {Burton S. Kaliski Jr. and
{\c{C}}etin Kaya Ko{\c{c}} and
Christof Paar},
title = {{RFID} Systems and Security and Privacy Implications},
booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
series = {Lecture Notes in Computer Science},
volume = {2523},
pages = {454--469},
publisher = {Springer},
year = {2002},
url = {https://doi.org/10.1007/3-540-36400-5\_33},
doi = {10.1007/3-540-36400-5\_33},
timestamp = {Sun, 02 Oct 2022 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/ches/SarmaWE02.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID













