Publications
2003. Anti-collusion fingerprinting for multimedia. Signal Processing, IEEE Transactions on. 51(4):1069-1087.
2008. Authenticated out-of-band communication over social links. Proceedings of the first workshop on Online social networks. :61-66.
2003. Bootstrapping security associations for routing in mobile ad-hoc networks. IEEE Global Telecommunications Conference, 2003. GLOBECOM '03. 3:1511-1515vol.3-1511-1515vol.3.
2004. Collusion-resistant fingerprinting for multimedia. Signal Processing Magazine, IEEE. 21(2):15-27.
2004. Copilot - a coprocessor-based kernel runtime integrity monitor. Proceedings of the 13th conference on USENIX Security Symposium - Volume 13. :13-13.
2003. Deno: a decentralized, peer-to-peer object-replication system for weakly connected environments. Computers, IEEE Transactions on. 52(7):943-959.
2011. Dynamic Enforcement of Knowledge-Based Security Policies. Computer Security Foundations Symposium (CSF), 2011 IEEE 24th. :114-128.
2010. Dynamically checking ownership policies in concurrent c/c++ programs. Proceedings of the 37th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages. :457-470.
2008. Efficient Integrity Checking of Untrusted Network Storage. StorageSS '08 Proceedings of the 4th ACM International Workshop on Storage Security and Survivability . :43-54.
2002. Experiences with capsule-based active networking. DARPA Active NEtworks Conference and Exposition, 2002. Proceedings. :16-24.
2007. Filtering spam with behavioral blacklisting. Proceedings of the 14th ACM conference on Computer and communications security. :342-351.
2005. Improving collusion resistance of error correcting code based multimedia fingerprinting. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/1029-ii/1032Vol.2-ii/1029-ii/1032Vol.2.
2002. Interacting with identification technology: can it make us more secure? CHI '02 extended abstracts on Human factors in computing systems. :564-565.
2006. Joint coding and embedding techniques for MultimediaFingerprinting. Information Forensics and Security, IEEE Transactions on. 1(2):231-247.
2003. Joint security and robustness enhancement for quantization based data embedding. Circuits and Systems for Video Technology, IEEE Transactions on. 13(8):831-841.
2002. Maintaining software with a security perspective. Software Maintenance, 2002. Proceedings. International Conference on. :194-203.
2011. Motivation for Participation in Online Neighborhood Watch Communities: An Empirical Study Involving Invitation Letters. Privacy, Security, Risk and Trust (PASSAT), 2011 IEEE Third International Conference on and 2011 IEEE Third International Confernece on Social Computing (SocialCom). :760-765.
2005. A pairwise key predistribution scheme for wireless sensor networks. ACM Trans. Inf. Syst. Secur.. 8(2):228-258.
2001. Practical programmable packets. IEEE INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. 1:41-50vol.1-41-50vol.1.
2003. Resistance of orthogonal Gaussian fingerprints to collusion attacks. Multimedia and Expo, 2003. ICME '03. Proceedings. 2003 International Conference on. 1:I-617-20vol.1-I-617-20vol.1.
1998. Safety and security of programmable network infrastructures. IEEE Communications Magazine. 36(10):84-92.
2010. Sectored Random Projections for Cancelable Iris Biometrics. 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). :1838-1841.