Publications
2001. Gathering knowledge for a question answering system from heterogeneous information sources. Proceedings of the workshop on Human Language Technology and Knowledge Management - Volume 2001. :9:1–9:8-9:1–9:8.
2009. Efficient and secure authenticated key exchange using weak passwords. Journal of the ACM (JACM). 57(1):3:1–3:39-3:1–3:39.
2005. Comparative book review: Cryptography: An Introduction by V. V. Yaschenko (American Mathematical Society, 2002); Cryptanalysis of Number Theoretic Ciphers by S.S. Wagstaff, Jr. (Chapman & Hall/CRC Press, 2003); RSA and Public-Key Cryptography by R. A.. SIGACT News. 36(2):14-19.
2005. On constructing universal one-way hash functions from arbitrary one-way functions. Journal of Cryptology.
2008. Predicate encryption supporting disjunctions, polynomial equations, and inner products. Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology. :146-162.
2011. Impossibility of blind signatures from one-way permutations. Theory of Cryptography. :615-629.
2000. A chosen ciphertext attack against several e-mail encryption protocols. Ninth USENIX Security Symposium.
2006. On expected constant-round protocols for Byzantine agreement. Advances in Cryptology-CRYPTO 2006. :445-462.
2010. Natural language annotations for the Semantic Web. On the Move to Meaningful Internet Systems 2002: CoopIS, DOA, and ODBASE. :1317-1331.
2011. Constant-Round Private Function Evaluation with Linear Complexity. Advances in Cryptology–ASIACRYPT 2011. :556-571.
2012. Review of efficient secure two-party protocols: techniques and constructions by Carmit Hazay and Yehuda Lindell. SIGACT News. 43(1):21-23.
2006. Relay Placement for Higher Order Connectivity in Wireless Sensor Networks. INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings. :1-12.
2006. CAM04-6: Single-Path Routing of Time-varying Traffic. Global Telecommunications Conference, 2006. GLOBECOM '06. IEEE. :1-6.
2006. Algorithms for non-uniform size data placement on parallel disks. Journal of Algorithms. 60(2):144-167.
2002. Video analysis applications for pervasive environments. 1st International Conference on Mobile and Ubiquitous Multimedia. :48-55.
2005. Distributed performance testing using statistical modeling. Proceedings of the 1st international workshop on Advances in model-based testing. :1-7.
1996. An empirical exploration of code evolution. International Workshop on Empirical Studies of Software Maintenance.
2005. Geometric algorithms for containment analysis of rotational parts. Computer-Aided Design. 37(2):213-230.
2008. One-handed touchscreen input for legacy applications. Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems. :1399-1408.
2007. Thumbspace: Generalized one-handed input for touchscreen-based mobile devices. Proceedings of the 11th IFIP TC 13 international conference on Human-computer interaction. :324-338.
1993. Speech versus mouse commands for word processing: an empirical evaluation. International Journal of Man-Machine Studies. 39(4):667-687.
2003. Acquisition of Bilingual MTLexicons from OCRed Dictionaries. Proceedings of the Ninth Machine Translation Summit. :208-215.