User profiles for A. Juel

Ari Juels

- Verified email at cornell.edu - Cited by 50371

Anne Juel

- Verified email at manchester.ac.uk - Cited by 2596

RFID privacy: An overview of problems and proposed solutions

SL Garfinkel, A Juels, R Pappu - IEEE Security & Privacy, 2005 - ieeexplore.ieee.org
As organizations aggressively deploy radio frequency identification systems, activists are
increasingly concerned about RFID's potential to invade user privacy. This overview highlights …

RFID security and privacy: A research survey

A Juels - IEEE journal on selected areas in communications, 2006 - ieeexplore.ieee.org
This paper surveys recent technical research on the problems of privacy and security for
radio frequency identification (RFID). RFID tags are small, wireless devices that help identify …

PORs: Proofs of retrievability for large files

A Juels, BS Kaliski Jr - Proceedings of the 14th ACM conference on …, 2007 - dl.acm.org
In this paper, we define and explore proofs of retrievability (PORs). A POR scheme enables
an archive or back-up service (prover) to produce a concise proof that a user (verifier) can …

Arksey and O′ Malleyʼs consultation exercise in scoping reviews: A critical review

…, CB Rossen, R Søndergaard, A Juel - Journal of advanced …, 2022 - Wiley Online Library
Aims To explore how consultation exercises were described in a convenience sample of recent
scoping reviews. Design Critical literature review. Data sources We searched PsycINFO, …

Anion intercalation into graphite drives surface wetting

…, A Elgendy, B Radha, A Keerthi, A Juel… - Journal of the …, 2023 - ACS Publications
The unique layered structure of graphite with its tunable interlayer distance establishes
almost ideal conditions for the accommodation of ions into its structure. The smooth and …

Stealing machine learning models via prediction {APIs}

F Tramèr, F Zhang, A Juels, MK Reiter… - 25th USENIX security …, 2016 - usenix.org
Machine learning (ML) models may be deemed confidential due to their sensitive training
data, commercial value, or use in security applications. Increasingly often, confidential ML …

The blocker tag: Selective blocking of RFID tags for consumer privacy

A Juels, RL Rivest, M Szydlo - Proceedings of the 10th ACM conference …, 2003 - dl.acm.org
We propose the use of "selective blocking" by "blocker tags" as a way of protecting consumers
from unwanted scanning of RFID tags attached to items they may be carrying or wearing.…

Authenticating pervasive devices with human protocols

A Juels, SA Weis - Advances in Cryptology–CRYPTO 2005: 25th Annual …, 2005 - Springer
Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive
computing devices. These devices lack the computational, storage, power, and communication …

Scaling of the turbulence transition threshold in a pipe

B Hof, A Juel, T Mullin - Physical review letters, 2003 - APS
We report the results of an experimental investigation of the transition to turbulence in a
pipe over approximately an order of magnitude range in the Reynolds number Re. A novel …

Proofs of retrievability: Theory and implementation

KD Bowers, A Juels, A Oprea - Proceedings of the 2009 ACM workshop …, 2009 - dl.acm.org
… Our framework improves the previously proposed POR constructions of Juels-Kaliski and
Shacham-… We propose a new variant on the Juels-Kaliski protocol and describe a prototype …