Publications
Export 16 results:
Author Title Type [ Year] Filters: Keyword is Computer Communication Networks [Clear All Filters]
2012. On the Centrality of Off-Line E-Cash to Concrete Partial Information Games. Security and Cryptography for Networks. :264-280.
2012. Efficient Password Authenticated Key Exchange via Oblivious Transfer. Public Key Cryptography – PKC 2012. :449-466.
2012. Securing Circuits against Constant-Rate Tampering. Advances in Cryptology – CRYPTO 2012. :533-551.
2011. A Canonical Form for Testing Boolean Function Properties. Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques. :460-471.
2011. Heterogeneous Design in Functional DIF. Transactions on High-Performance Embedded Architectures and Compilers IV. :391-408.
2011. Optimal Verification of Operations on Dynamic Sets. Advances in Cryptology – CRYPTO 2011. :91-110.
2011. Secure Efficient Multiparty Computing of Multivariate Polynomials and Applications. Applied Cryptography and Network Security. :130-146.
2010. Optimal Authenticated Data Structures with Multilinear Forms. Pairing-Based Cryptography - Pairing 2010. :246-264.
2009. Efficient Robust Private Set Intersection. Applied Cryptography and Network Security. :125-142.
2008. Algorithms for Location Estimation Based on RSSI Sampling. Algorithmic Aspects of Wireless Sensor Networks. :72-86.
2008. Effective Visualization of File System Access-Control. Visualization for Computer Security. :18-25.
2007. How Smart Homes Learn: The Evolution of the Networked Home and Household. UbiComp 2007: Ubiquitous Computing. :127-144.
2007. Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures. Information and Communications Security. :1-15.