Publications
2010. Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage. Foundations of Computer Science (FOCS), 2010 51st Annual IEEE Symposium on. :501-510.
2005. Software process improvement in small organizations: a case study. Software, IEEE. 22(6):68-75.
2007. Round Complexity of Authenticated Broadcast with a Dishonest Majority. Foundations of Computer Science, 2007. FOCS '07. 48th Annual IEEE Symposium on. :658-668.
2010. A new framework for efficient password-based authenticated key exchange. Proceedings of the 17th ACM conference on Computer and communications security. :516-525.
2003. Toward secure key distribution in truly ad-hoc networks. Applications and the Internet Workshops, 2003. Proceedings. 2003 Symposium on. :342-346.
2004. Dynamic join-exit amortization and scheduling for time-efficient group key agreement. INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies. 4:2617-2627vol.4-2617-2627vol.4.
2007. Unicity Distance of Robust Image Hashing. Information Forensics and Security, IEEE Transactions on. 2(3):462-467.
2004. Image hashing resilient to geometric and filtering operations. Multimedia Signal Processing, 2004 IEEE 6th Workshop on. :355-358.