Publications
2006. Analyzing the HB and HB+ protocols in the “large error” case. IACR ePrint report. 326:2006-2006.
2004. Secure routing in ad hoc networks. Workshop on Security of ad hoc and Sensor Networks: Proceedings of the 2 nd ACM workshop on Security of ad hoc and sensor networks.
2007. Review of "Probability and Computing: Randomized Algorithms and Probabilitic Analysis by Michael Mitzenmacher and Eli Upfal", Cambridge University Press, 2005. SIGACT News. 38(3):20-22.
2009. On black-box constructions of predicate encryption from trapdoor permutations. Advances in Cryptology–ASIACRYPT 2009. :197-213.
2001. Efficient password-authenticated key exchange using human-memorable passwords. Advances in Cryptology—EUROCRYPT 2001. :475-494.
2003. Efficient and non-malleable proofs of plaintext knowledge and applications. Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques. :211-228.
2000. On the efficiency of local decoding procedures for error-correcting codes. Proceedings of the thirty-second annual ACM symposium on Theory of computing. :80-86.
2001. Gathering knowledge for a question answering system from heterogeneous information sources. Proceedings of the workshop on Human Language Technology and Knowledge Management - Volume 2001. :9:1–9:8-9:1–9:8.
2007. Universally composable multi-party computation using tamper-proof hardware. Advances in Cryptology-EUROCRYPT 2007. :115-128.
2007. Efficient cryptographic protocols based on the hardness of learning parity with noise. Proceedings of the 11th IMA international conference on Cryptography and coding. :1-15.
2003. Forward secrecy in password-only key exchange protocols. Proceedings of the 3rd international conference on Security in communication networks. :29-44.
2006. Algorithms for non-uniform size data placement on parallel disks. Journal of Algorithms. 60(2):144-167.
2006. CAM04-6: Single-Path Routing of Time-varying Traffic. Global Telecommunications Conference, 2006. GLOBECOM '06. IEEE. :1-6.
2006. Relay Placement for Higher Order Connectivity in Wireless Sensor Networks. INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings. :1-12.
2002. Video analysis applications for pervasive environments. 1st International Conference on Mobile and Ubiquitous Multimedia. :48-55.
2005. Distributed performance testing using statistical modeling. Proceedings of the 1st international workshop on Advances in model-based testing. :1-7.
1996. An empirical exploration of code evolution. International Workshop on Empirical Studies of Software Maintenance.
2005. Geometric algorithms for containment analysis of rotational parts. Computer-Aided Design. 37(2):213-230.
2007. Thumbspace: Generalized one-handed input for touchscreen-based mobile devices. Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction. :324-338.
2008. One-handed touchscreen input for legacy applications. Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems. :1399-1408.
1993. Speech versus mouse commands for word processing: an empirical evaluation. International Journal of Man-Machine Studies. 39(4):667-687.
2006. Morphology Induction from Limited Noisy Data Using Approximate String Matching. Proceedings of the Eighth Meeting of the ACL Special Interest Group in Computational Phonology (SIGPHON 2006). :60-68.