Security and privacy aspects of low-cost radio frequency identification systems SA Weis, SE Sarma, RL Rivest, DW Engels Security in Pervasive Computing: First International Conference, Boppard …, 2004 | 2309 | 2004 |
RFID systems and security and privacy implications SE Sarma, SA Weis, DW Engels International workshop on cryptographic hardware and embedded systems, 454-469, 2002 | 1226 | 2002 |
Authenticating pervasive devices with human protocols A Juels, SA Weis Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005 | 978 | 2005 |
Security and privacy in radio-frequency identification devices SA Weis Massachusetts Institute of Technology, 2003 | 654 | 2003 |
Defining strong privacy for RFID A Juels, SA Weis ACM Transactions on Information and System Security (TISSEC) 13 (1), 1-23, 2009 | 611 | 2009 |
RFID (radio frequency identification): Principles and applications SA Weis System 2 (3), 1-23, 2007 | 253 | 2007 |
Practical order-revealing encryption with limited leakage N Chenette, K Lewi, SA Weis, DJ Wu Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum …, 2016 | 215 | 2016 |
Online advertising fraud N Daswani, C Mysen, V Rao, S Weis, K Gharachorloo, S Ghosemajumder Crimeware: understanding new attacks and defenses 40 (2), 1-28, 2008 | 93 | 2008 |
Honest-verifier private disjointness testing without random oracles S Hohenberger, SA Weis Privacy Enhancing Technologies: 6th International Workshop, PET 2006 …, 2006 | 87 | 2006 |
Security parallels between people and pervasive devices SA Weis Third IEEE International Conference on Pervasive Computing and …, 2005 | 79 | 2005 |
PseudoID: Enhancing privacy in federated login A Dey, S Weis Hot topics in privacy enhancing technologies, 95-107, 2010 | 74 | 2010 |
Software cryptoprocessor O Horovitz, SA Weis, CA Waldspurger, S Rihan US Patent 9,164,924, 2015 | 60 | 2015 |
Security and privacy aspects of low-cost radio frequency identification systems D Engels, R Rivest, S Sarma, S Weis First international conference on security in pervasive computing, SPC, 13-15, 2003 | 56 | 2003 |
New foundations for efficient authentication, commutative cryptography, and private disjointness testing SA Weis Massachusetts Institute of Technology, 2006 | 47 | 2006 |
Rfid privacy workshop: Concerns, consensus, and questions SA Weis IEEE Security & Privacy 2 (02), 48-50, 2004 | 40 | 2004 |
Image-based key exchange SA Weis, TE McCoy, AD Hintz, IP Wade US Patent 8,855,300, 2014 | 39 | 2014 |
Method and system for providing secure system execution on hardware supporting secure application execution O Horovitz, SA Weis, S Rihan, CA Waldspurger US Patent 9,983,894, 2018 | 38 | 2018 |
Should ad networks bother fighting click fraud?(yes, they should.) B Mungamuru, S Weis, H Garcia-Molina Technical Report 2008-24, Stanford InfoLab, 2008 | 26 | 2008 |
Competition and fraud in online advertising markets B Mungamuru, S Weis International Conference on Financial Cryptography and Data Security, 187-191, 2008 | 23 | 2008 |
Protecting data in-use from firmware and physical attacks S Weis Black Hat, 2014 | 21 | 2014 |