Robust Image Watermarking with the Randlet Transform
by
M. Malkin, and
Ramarathnam Venkatesan
In Allerton 2005
Comparison of Texts Streams in the Presence of Mild Adversaries
by
M. Malkin, and
Ramarathnam Venkatesan
In Australian Information Security Workshop 2005
The Randlet Transform: Applications to Universal Perceptual Hashing and Image Identification
by
M. Malkin, and
Ramarathnam Venkatesan
In Allerton 2004
Sliding-window self-healing key distribution
by
S. Miner More,
M. Malkin,
J. Staddon, and
D. Balfanz
In the 2003 ACM Workshop on Survivable and Self-Regenerative
Systems
Self-Healing Key Distribution with Revocation
by
J. Staddon,
S. Miner More,
M. Franklin,
D. Balfanz,
M. Malkin, and
D. Dean
In proceedings of the 2002 IEEE Symposium on Security and Privacy
Building Intrusion Tolerant Applications
by
T. Wu,
M. Malkin, and
D. Boneh
In proceedings of the 8th USENIX Security Symposium, pp. 79--91, 1999.
Full paper: PostScript,
PDF.
Experimenting with Shared Generation of RSA Keys
by
M. Malkin,
T. Wu, and
D. Boneh
In proceedings of the Internet Society's 1999 Symposium on Network and
Distributed System Security (SNDSS), pp. 43--56.
Full paper: PostScript.