About

https://scholar.google.com/citations?hl=en&user=uf0D-uoAAAAJ

Interests

Google Presence

Ari Juels
Ari Juels
AJ. Ari Juels Professor, Computer Science Jacobs Technion-Cornell Institute ... Blockchains, cryptocurrency, and smart contracts: Today's cryptocurrencies ..."
Information for Ari Juels :: Hacking, Distributed
Information for Ari Juels :: Hacking, Distributed
Ari Juels is a Professor at the Jacobs Technion-Cornell Institute at Cornell Tech in NYC and Co-Director of IC3. He was previously Chief Scientist of RSA, The ..."
IC3 - The Initiative For Cryptocurrencies & Contracts
IC3 - The Initiative For Cryptocurrencies & Contracts
by Ethan Cecchetti, Ian Miers, and Ari Juels on August 06, 2018 at 06:00 PM ... Chepicap: Blockchain classes at top universities like Wharton and Cornell are all ..."
Ari Juels (@AriJuels) | Twitter
Ari Juels (@AriJuels) | Twitter
The latest Tweets from Ari Juels (@AriJuels). Professor at ... Long-awaited IC3 Town Crier service launched today on the Ethereum public blockchain!"
Ari Juels on Twitter:
Ari Juels on Twitter: "Happy to chat off-chain about blockchain ...
Happy to chat off-chain about blockchain teaching / research. Perhaps @thatcherbell can connect us via email. 10:34 AM - 3 Mar 2017. 2 Likes; Paris Fintech ..."
Ari Juels: Bug Bounties and Exploit-Resistant Smart Contracts | Meetup
Ari Juels: Bug Bounties and Exploit-Resistant Smart Contracts | Meetup
8 mars 2018 - Our presenter will be Ari Juels, professor at (Jacobs Technion. ... we explore smart contracts, programs that execute on blockchains. Because ..."
Cornell Tech - Ari Juels
Cornell Tech - Ari Juels
Ari Juels is a professor at the Jacobs Technion-Cornell Institute at Cornell Tech and Computer Science faculty member at Cornell University. He was previously ..."
Monday's Keynote – Ari Juels – NDSS Symposium
Monday's Keynote – Ari Juels – NDSS Symposium
I'll also explore blockchain applications of trusted execution environments ... Ari Juels is a Professor at Cornell Tech (Jacobs Institute) in New York City, and ..."
Fan Zhang
Fan Zhang
Ari Juels, my research interest is in blockchains, trusted hardware, system security and applied cryptography. I'm particularly interested in understanding and ..."

Projects

Papers

2018
Security alerting system with dynamic buffer size adaption
Security alerting system with dynamic buffer size adaption
A Juels, N Triandopoulos, KD Bowers
US Patent App. 15/901,254
0
2018
2018
Security alerting system with network blockade policy based on alert transmission activity
Security alerting system with network blockade policy based on alert transmission activity
A Juels, N Triandopoulos, KD Bowers
US Patent App. 13/922,724
0
2018
2018
Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts
Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts
L Breidenbach, IC Cornell Tech, P Daian, F Tramer, A Juels
27th {USENIX} Security Symposium ({USENIX} Security 18)
4
2018
2018
0
2018
2018
Eraser: Your Data Won't Be Back
Eraser: Your Data Won't Be Back
K Onarlioglu, W Robertson, E Kirda
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 153-166
0
2018
2018
Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution
Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contract Execution
R Cheng, F Zhang, J Kos, W He, N Hynes, N Johnson, A Juels, A Miller, ...
arXiv preprint arXiv:1804.05141
15
2018
2018
Security alerting system with dynamic buffer size adaptation
Security alerting system with dynamic buffer size adaptation
A Juels, N Triandopoulos, KD Bowers
US Patent 9,935,770
0
2018
2018
Authentication methods and apparatus using base points on an elliptic curve and other techniques
Authentication methods and apparatus using base points on an elliptic curve and other techniques
DV Bailey, JG Brainard, A Juels, BS Kaliski Jr
US Patent 9,923,718
13
2018
2018
0
2018
2018
Forward secure one-time authentication tokens with embedded time hints
Forward secure one-time authentication tokens with embedded time hints
N Triandopoulos, A Juels, J Brainard
US Patent 9,871,785
0
2018
2018
DelegaTEE: Brokered Delegation Using Trusted Execution Environments
DelegaTEE: Brokered Delegation Using Trusted Execution Environments
S Matetic, M Schneider, A Miller, A Juels, S Capkun
27th {USENIX} Security Symposium ({USENIX} Security 18)
1
2018
2018
Paralysis Proofs: Safe Access-Structure Updates for Cryptocurrencies and More
Paralysis Proofs: Safe Access-Structure Updates for Cryptocurrencies and More
F Zhang, P Daian, I Bentov, A Juels
Cryptology ePrint Archive, Report 2018/096
0
2018
2017
Methods and apparatus for generating chaff passwords for use in a password-hardening system
Methods and apparatus for generating chaff passwords for use in a password-hardening system
N Triandopoulos, K Bowers, A Juels, R Rivest, G Luo
US Patent 9,843,574
0
2017
2017
Authenticated data feed for blockchains
Authenticated data feed for blockchains
F Zhang, E Cecchetti, K Croman, A Juels, R Shi
US Patent App. 15/615,216
3
2017
2017
Solidus: Confidential distributed ledger transactions via PVORM
Solidus: Confidential distributed ledger transactions via PVORM
E Cecchetti, F Zhang, Y Ji, A Kosba, A Juels, E Shi
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …
15
2017
2017
Wireless wearable authenticators using attachment to confirm user possession
Wireless wearable authenticators using attachment to confirm user possession
KD Bowers, A Juels, R Rivest
US Patent 9,740,844
0
2017
2017
A new distribution-sensitive secure sketch and popularity-proportional hashing
A new distribution-sensitive secure sketch and popularity-proportional hashing
J Woodage, R Chatterjee, Y Dodis, A Juels, T Ristenpart
Annual International Cryptology Conference, 682-710
4
2017
2017
REM: Resource-Efficient Mining for Blockchains.
REM: Resource-Efficient Mining for Blockchains.
F Zhang, I Eyal, R Escriva, A Juels, R Van Renesse
IACR Cryptology ePrint Archive 2017, 179
30
2017
2017
Rethinking security in the era of cloud computing
Rethinking security in the era of cloud computing
J Aikat, A Akella, JS Chase, A Juels, M Reiter, T Ristenpart, V Sekar, ...
IEEE Security & Privacy
18
2017
2017
Determining risk of malware infection in enterprise hosts
Determining risk of malware infection in enterprise hosts
AM Oprea, TF Yen, V Heorhiadi, MK Reiter, A Juels
US Patent 9,674,210
0
2017
Read more

Google Trends (past one year)

25.4
Learn about Google Trends

Academic Achievement

Twitter Influence

0/100
Learn about weight

Recent Tweets

Popular People

Alexander Zaidelson
Alexander Zaidelson Entrepreneur @ BEAM
Rosario Gennaro
Rosario Gennaro Scholar @ CUNY | Center For Algorithms And Interactive Scientific Software (CAISS) | MIT | City College Of New York | IBM T.J.Watson Research Center
Oded Goldreich
Oded Goldreich Scholar @ The Weizmann Institute Of Science
Aviv Zohar
Aviv Zohar Scholar @ Hebrew University
Browse all people