Private Access to Outsourced Storage:
Oblivious RAM Simulation with Efficient Worst-Case Access Overhead,
with M. Goodrich, M. Mitzenmacher and R. Tamassia in CCSW 2011:
ACM Cloud Computing Security Workshop at CCS (pdf).
Authentication of Search Results:
Efficient Verification of Web-Content Searching Through Authenticated Web Crawlers,
with M. Goodrich, D. Nguyen, C. Papamanthou, R. Tamassia, N. Triandopoulos and C. Lopes in PVLDB 2012: Research Track for Very Large Data Bases (pdf) (Journal).
Authenticating Email Search Result, with H. Reynolds and R. Tamassia
STM 2012 International Workshop on Security and Trust Management at ESORICS.
My Honors project at Melbourne University was in Constraint Programming and I was lucky to be advised by Peter Stuckey:
Propagation via Lazy Clause Generation,
with P. Stuckey and M. Codish in Constraints 2009:
Constraints Journal, Volume 14 (Journal).
Propagation = Lazy Clause Generation (Best Student Paper Award),
with P. Stuckey and M. Codish in CP 2007: Principles and Practice of Constraint Programming (pdf).
Modelling for Lazy Clause Generation,
with P. Stuckey in CATS 2008: Computing: the Australasian Theory Symposium (pdf).
In 2006 I was an RA in Aaron Harwood’s peer-to-peer group:
Mean Field Models of Message Throughput in Dynamic Peer-to-Peer Systems,
with A. Harwood (pdf).