| 1 | 2006 | PKC | pc |
| 2 | 2003 | Crypto | pc |
| 3 | 2002 | Asiacrypt | pc |
| 4 | 2000 | Crypto | pc |
| year | title | booktitle | pages | |
|---|---|---|---|---|
| 1 | 2004 | Private Inference Control | eprint | online |
| 2 | 2003 | Randomness Re-use in Multi-recipient Encryption Schemeas | pkc | 85-99 |
| 3 | 2001 | Efficient Traitor Tracing Algorithms using List Decoding | eprint | online |
| 4 | 2001 | Efficient Traitor Tracing Algorithms Using List Decoding | asiacrypt | 175-192 |
| 5 | 2000 | Long-Lived Broadcast Encryption | crypto | 333-352 |
| 6 | 2000 | Combinatorial Properties of Frameproof and Traceability Codes | eprint | online |
| 7 | 2000 | Graph-Based Authentication of Digital Streams | eprint | online |
| 8 | 1999 | Efficient Methods for Integrating Traceability and Broadcast Encryption | crypto | 372-387 |
| 9 | 1998 | Combinatorial Bounds for Broadcast Encryption | eurocrypt | 512-526 |
Coauthors of Jessica Staddon |