Publications
2001. Gathering knowledge for a question answering system from heterogeneous information sources. Proceedings of the workshop on Human Language Technology and Knowledge Management - Volume 2001. :9:1–9:8-9:1–9:8.
2009. Smooth projective hashing and password-based authenticated key exchange from lattices. Advances in Cryptology–ASIACRYPT 2009. :636-652.
2012. Two-server password-only authenticated key exchange. Journal of Computer and System Sciences. 78(2):651-669.
2006. Characterization of security notions for probabilistic private-key encryption. Journal of Cryptology. 19(1):67-95.
2001. Cryptographic counters and applications to electronic voting. Advances in Cryptology—Eurocrypt 2001. :78-92.
2005. Comparative book review: Cryptography: An Introduction by V. V. Yaschenko (American Mathematical Society, 2002); Cryptanalysis of Number Theoretic Ciphers by S.S. Wagstaff, Jr. (Chapman & Hall/CRC Press, 2003); RSA and Public-Key Cryptography by R. A.. SIGACT News. 36(2):14-19.
2009. Improving the round complexity of VSS in point-to-point networks. Information and Computation. 207(8):889-899.
2011. Impossibility of blind signatures from one-way permutations. Theory of Cryptography. :615-629.
2008. Predicate encryption supporting disjunctions, polynomial equations, and inner products. Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology. :146-162.
2005. Simulation and Secure Computation-Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs. Lecture Notes in Computer Science. 3378:128-149.
2010. Natural language annotations for the Semantic Web. On the Move to Meaningful Internet Systems 2002: CoopIS, DOA, and ODBASE. :1317-1331.
2012. Review of efficient secure two-party protocols: techniques and constructions by Carmit Hazay and Yehuda Lindell. SIGACT News. 43(1):21-23.
2006. Relay Placement for Higher Order Connectivity in Wireless Sensor Networks. INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings. :1-12.
2006. Algorithms for non-uniform size data placement on parallel disks. Journal of Algorithms. 60(2):144-167.
2006. CAM04-6: Single-Path Routing of Time-varying Traffic. Global Telecommunications Conference, 2006. GLOBECOM '06. IEEE. :1-6.
2002. Video analysis applications for pervasive environments. 1st International Conference on Mobile and Ubiquitous Multimedia. :48-55.
2005. Distributed performance testing using statistical modeling. Proceedings of the 1st international workshop on Advances in model-based testing. :1-7.
1996. An empirical exploration of code evolution. International Workshop on Empirical Studies of Software Maintenance.
2005. Geometric algorithms for containment analysis of rotational parts. Computer-Aided Design. 37(2):213-230.
2008. One-handed touchscreen input for legacy applications. Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems. :1399-1408.
2007. Thumbspace: Generalized one-handed input for touchscreen-based mobile devices. Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction. :324-338.
1993. Speech versus mouse commands for word processing: an empirical evaluation. International Journal of Man-Machine Studies. 39(4):667-687.
2006. Adaptive Transformation-based Learning for Improving Dictionary Tagging. Proceedings of the 11th Conference on European Chapter of the Association for Computational Linguistics. :257-264.