Publications
1999. Trust me, I'm accountable: trust and accountability online. CHI '99 extended abstracts on Human factors in computing systems. :79-80.
2002. Improving Web-based civic information access: a case study of the 50 US states. 2002 International Symposium on Technology and Society, 2002. (ISTAS'02). :275-282.
2002. Interacting with identification technology: can it make us more secure? CHI '02 extended abstracts on Human factors in computing systems. :564-565.
2002. P5 : a protocol for scalable anonymous communication. 2002 IEEE Symposium on Security and Privacy, 2002. Proceedings. :58-70.
2003. The dangers of mitigating security design flaws: a wireless case study. IEEE Security & Privacy. 1(1):28-36.
2006. Achieving anonymity via clustering. Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems. :153-162.
2006. Shared family calendars: Promoting symmetry and accessibility. ACM Trans. Comput.-Hum. Interact.. 13(3):313-346.
2008. Preserving the privacy of sensitive relationships in graph data. Proceedings of the 1st ACM SIGKDD international conference on Privacy, security, and trust in KDD. :153-171.
2009. Persona: an online social network with user-defined privacy. Proceedings of the ACM SIGCOMM 2009 conference on Data communication. :135-146.
2009. To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. Proceedings of the 18th international conference on World wide web. :531-540.
2010. Sectored Random Projections for Cancelable Iris Biometrics. 2010 IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP). :1838-1841.
2011. Dynamic Enforcement of Knowledge-Based Security Policies. Computer Security Foundations Symposium (CSF), 2011 IEEE 24th. :114-128.