Publications
2009. Dynamic Provable Data Possession. CCS '09 Proceedings of the 16th ACM Conference on Computer and Communications Security . :213-222.
2009. Efficient and secure authenticated key exchange using weak passwords. Journal of the ACM (JACM). 57(1):3:1–3:39-3:1–3:39.
2008. Authenticated Hash Tables. CCS '08 Proceedings of the 15th ACM Conference on Computer and Communications Security . :437-448.
2008. Authenticated out-of-band communication over social links. Proceedings of the first workshop on Online social networks. :61-66.
2003. Joint security robustness enhancement for quantization embedding. Image Processing, 2003. ICIP 2003. Proceedings. 2003 International Conference on. 2:II-483-6vol.3-II-483-6vol.3.
2003. A secure PLAN. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews. 33(3):413-426.
2002. A secure PLAN (extended version). DARPA Active NEtworks Conference and Exposition, 2002. Proceedings. :224-237.
1999. Attacks on digital watermarks. Signals, Systems, and Computers, 1999. Conference Record of the Thirty-Third Asilomar Conference on. 2:1508-1512vol.2-1508-1512vol.2.
1998. A secure active network environment architecture: realization in SwitchWare. IEEE Network. 12(3):37-45.