Publications
2010. Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage. Foundations of Computer Science (FOCS), 2010 51st Annual IEEE Symposium on. :501-510.
2007. Round Complexity of Authenticated Broadcast with a Dishonest Majority. Foundations of Computer Science, 2007. FOCS '07. 48th Annual IEEE Symposium on. :658-668.
2006. Robust and secure image hashing. Information Forensics and Security, IEEE Transactions on. 1(2):215-230.
2005. Security of feature extraction in image hashing. Acoustics, Speech, and Signal Processing, 2005. Proceedings. (ICASSP '05). IEEE International Conference on. 2:ii/1041-ii/1044Vol.2-ii/1041-ii/1044Vol.2.
2004. Dynamic join-exit amortization and scheduling for time-efficient group key agreement. INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies. 4:2617-2627vol.4-2617-2627vol.4.
2004. Image hashing resilient to geometric and filtering operations. Multimedia Signal Processing, 2004 IEEE 6th Workshop on. :355-358.
2004. Security evaluation for communication-friendly encryption of multimedia. Image Processing, 2004. ICIP '04. 2004 International Conference on. 1:569-572Vol.1-569-572Vol.1.
2003. Toward secure key distribution in truly ad-hoc networks. Applications and the Internet Workshops, 2003. Proceedings. 2003 Symposium on. :342-346.
2002. Communication-friendly encryption of multimedia. Multimedia Signal Processing, 2002 IEEE Workshop on. :292-295.
2002. Scalable secure group communication over IP multicast. Selected Areas in Communications, IEEE Journal on. 20(8):1511-1527.