Emergent Properties & Security: The Complexity of Security as a Science, Nate Husted and Steven Myers, (Accepted & To Appear) Proceedings of the New Paradigms of Security Workshop, Victoria, BC, Canada, Sept, 2014.
ANONIZE: A Large-Scale Anonymous Survey System, Steven Myers, Rafael Pass, abhi Shelat and Susan Waters, Proceedings of The IEEE Symposium on Security and Privacy (OAKLAND), pp. 375-389 2014
A Link-Graph Based Approach to Forum Spam, Youngsang Shin, Steven Myers, Minaxi Gupta and Pedja Radivojac, (Accepted/To Appear) in the Journal of Security and Communication Networks.
*Black-Box Construction of a more than non-malleable CCA1 encryption scheme from plaintext awareness, Steven Myers, mona Sergi and abhi shelat, Journal of Computer Security, Vol 21, No. 5, Pages 721-748, 2013
GPU and CPU Parallelization of Honest-but-Curious Secure Two-Party Computation, Nate Husted, Steven Myers, abhi Shelat and Paul Grubbs, Proceedings of the 2013 Annual Computer Security Applications Conference (ACSAC), Editor Charles Payne Jr, Pages 169-178, 2013.
*Black-Box Proof of Knowledge of Plaintext and Multiparty Computation with Low Communication Overhead, Steven Myers, Mona Sergi, Abhi Shelat, Proceedings of 10th Annual Theory Of Cryptography Conference, IACR, Pages 397-417, 2013
*Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness, Steven Myers, Mona Sergi, Abhi Shelat, Proceedings of Security and Cryptography for Networks – 8th International Conference, SCN 2012, Pages 149-165.
Why Mobile-to-Mobile Wireless Malware Won’t Cause a Storm, Nathaniel Husted and Steven Myers, Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats 2011 (LEET ’11)
The Nuts and Bolts of a Forum Spam Automator, Youngsang Shin, Minaxi Gupt and Steven Myers, Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats 2011 (LEET ’11)
Prevalence and Mitigation of Forum Spamming, Youngsang Shin, Minaxi Gupta and Steven Myers, Proceedings of Infocom 2011.Pages, 2309 – 2317, 2011
Mobile Location Tracking in Metro Areas: Malnets and Others, Nathaniel Husted and Steven Myers, Proceedings of the ACM Conference on Communications and Computer Security (CCS) 2010, pp. 85-96, 2010
Structure-based kernels for the prediction of catalytic residues and their involvement in human inherited disease, Fuxiao Xin, Steven Myers, Yong Fuga Li, David N. Cooper, Sean D. Mooney and Predrag Radivojac, Bioinformatics, Vol 26, Num 16, pp. 1975-1982, Oxford Journals, Oxford University Press. 2010
Saving Energy on WiFi with Required IPSec. Youngsang Shin, Steven Myers and Minaxi Gupta, Appeared at SecureComm 2010.
Secure Cloud Computing with Brokered Trust Sensor Networks, Apu Kapadia, Steven Myers, XiaoFeng Wang, and Geoffrey Fox, IEEE Proceedings of the International Symposium on Collaborative Technologies and Systems, Pp 581-592, IEEE Press, May 2010.
*Bit Encryption is Complete for CCA2 Security, Steven Myers and abhi shelat, IEEE Proceedings of the Foundations of Computer Science, October, 2009. Pp 607-616
A Case Study on Asprox Infection Dynamics, Youngsang Shin, Steven Myers, Minaxi Gupta, Proceedings of GI International Conference on Detection of Intrusions and Malware & Vulnerability (DIMVA), July 2009. Pp 1-20 (A.R. 29.5%)
A Study of the Performance of SSL on PDAs , Youngsang Shin, Minaxi Gupta, Steven Myers, Proceedings of IEEE INFOCOM Global Internet Symposium (GI), April 2009. Pp. 1-6
WiFi Networks and Malware Epidemiology, Hao Hu, Steven Myers, Vittoria Colizza, Alessandro Vespignani, Proceedings of the National Academy of Sciences, vol. 106, no. 5, 1318-1323 (2009)
*Delayed Password Disclosure, Markus Jakobsson and Steven Myers, International Journal of Applied Cryptography Vol 1. No 1., pp. 47-59, Inderscience Publishers, 2008
Practice and Prevention of Home-Router Mid-Stream Injection Attacks, Steven A. Myers and Sid Stamm. Proceedings of the 1st Annual APWG eCrime Researcher’s Summit. pp1-14, October 15-16, 2008., Atlanta, GA, USA.
*Seed Incompressible Functions, Shai Halevi, Steven Myers and Charles Rackoff, Proceedings of the 5th Annual Theory of Cryptography Conference (TCC 2008), pp. 19-36, TCC 2008, New York, USA, March 19-21, 2008. LNCS 4948.
*Delayed Password Disclosure, Markus Jakobsson and Steven Myers , Proceedings of the workshop on Digital Identity Management 2007, Pages 17-26, ACM Press.
*Delayed Password Disclosure, Markus Jakobsson and Steven Myers, ACM SIGACT News Vol 38. Issue 3, Spet 2007, ACM Press. New York, New York, USA.
*Towards a Separation of Semantic and CCA Security for Public-Key Encryption, Yael Gernter, Tal Malkin, Steven Myers, Proceedings of the 4th Annual Theory of Cryptography Conference, LNCS, February, 2007, Pages 20. (Full version available at http://eprint.iacr.org/2006/447, pages 80) (A. R. 26%)
IPSec: Performance Analysis and Enhancements, Craig A. Shue, Minaxi Gupta, Steven Myers, Proceedings of the 2007 IEEE International Conference on Communications (ICC 2007), June 2007, pp 1527-1532, IEEE Press, (A.R. 39%)
*Simple Permutations Mix Well, Shlomo Hoory, Avner Magen, Steven Myers and Charles Rackoff, Theoretical Computer Science, Vol. 348, Iss. 2-3, pp. 251-261, 2005
*A Chat at the Old Phishin’ Hole, Richard Clayton, Drew Dean, Markus Jakobsson, Steven Myers, Stuart G. Stubblebine and Michael Szydlo, 9th International Conference of Financial Cryptography and Data Security (FC05), LNCS 3570, Page 88, 2005
Helping the Phish Detect the Lure, Steven Myers, 9th International Conference of Financial Cryptography and Data Security (FC05), LNCS 3570, Page 90, 2005
*Simple Permutations Mix Well, Shlomo Hoory, Avner Magen, Steven Myers and Charles Rackoff, Proceedings of the International Colloquium on Automata, Languages and Programming, LNCS 3142, pages 770-781, Springer, 2004.
Black-Box Composition Does Not Imply Adaptive Security for Permutations, Steven Myers, Proceedings of Advances in Cryptology-EUROCRYPT 2004.
Efficient Amplification of the Security of Weak Pseudo-Random Function Generators, Steven Myers, Journal of Cryptology, Vol. 16, Pages 1-24, Springer, 2003.
*Cryptographic Counters and Voting, Jon Katz, Steven Myers and Rafail Ostrovsky, Proceedings of Advances in Cryptology—EUROCRYPT 2001, LNCS 2045, Pages 78-92, Springer, 2001.
Efficient Amplification of the Security of Weak Pseudo-Random Function Generators, Steven Myers, EUROCRYPT 2001, LNCS 2045, Pages:358-372, Springer, 2001.
*Self-Stabilizing Token-Circulation on Anonymous Message Passing Rings, Lisa Higham and Steven Myers Proceedings of the 2nd International Conference on the Principles of Distributed Systems, Pages 115-128, Hermis, 1998
Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft, Editors and Contributors, Markus Jakobsson and Steven Myers, Wiley Press, Pages 700.
Crimeware in Firmware, Vittoria Colizza, Hao Hu, Steven Myers, Sid Stamm, Alex Tsow, and Alex Vespignani, Crimeware: Understanding New Attacks & Defenses, Editors Markus Jakobsson and Zulfikar Ramzan, pages 59, Symantec Press, 2008.
The Internet and the Physical World-Malware Enabled Physical Tracking, Steven Myers and Nathaniel Husted, The Death of the Internet, Editor Markus Jakobsson, pages 205-228, Wiley & Higher Education Press, Information Security Series, 2012.