Mira.jpg

Publications

Note: My maiden name is Mira Meyerovich.  By convention, all authors in are listed in alphabetical order.

 

  1. Tolga Acar, Mira Belenkiy, Alptekin Kupcu. Single Password Authentication, in Computer Networks 2013, Elsevier, June 2013.
  2. Tolga Acar, Mira Belenkiy, Mihir Bellare, and David Cash, Cryptographic Agility and its Relation to Circular Encryption, in EUROCRYPT 2010, Springer Verlag, May 2010 
  3. Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, and Hovav Shacham, Randomizable Proofs and Delegatable Anonymous Credentials, in CRYPTO 2009, Springer Verlag, August 2009 
  4. Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, and Anna Lysyanskaya, Compact E-Cash and Simulatable VRFs, in Pairing 2009, Springer Verlag, August 2009 
  5. Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, and Anna Lysyanskaya, P-signatures and Noninteractive Anonymous Credentials, in Theory of Cryptography Conference 2008, Springer Verlag, February 2008 
  6. Mira Belenkiy, Melissa Chase, C. Christopher Erway, John Jannotti, Alptekin Kupcu, and Anna Lysyanskaya, Incentivizing Outsourced Computation, in NetEcon 2008, Association for Computing Machinery, Inc., 2008 
  7. Jan Camenisch, Anna Lysyanskaya, and Mira Meyerovich, Endorsed E-Cash, in IEEE Symposium on Security and Privacy, IEEE Computer Society, June 2007 
  8. Mira Belenkiy, Melissa Chase, C. Christopher Erway, John Jannotti, Alptekin Kupcu, Anna Lysyanskaya, and Eric Rachlin, Making P2P Accountable Without Losing Privacy, in Workshop on Privacy in Electronic Society, Association for Computing Machinery, Inc., 2007 
  9. Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, and Mira Meyerovich, How to Win the Clonewars: Efficient Periodic n-Times Anonymous Authentication, in ACM CCS, Association for Computing Machinery, Inc., October 2006 
  10. Anna Lysyanskaya and Mira Meyerovich, Provably Secure Steganography with Imperfect Sampling, in Public Key Cryptography, Springer Verlag, 2006.
  11. Case Study: Windows XP.  Lucas Ballard, Mira Meyerovich.  Operating Systems, 3rd Edition. Deitel, Deitel and Choffnes.  Prentice Hall, 2003.  Chapter 21, pp 1033—1112. 

 

Patents

  1. Tolga Acar, Mira Belenkiy, Henry Jerez, Alptekin Kupcu.  Securing Passwords Against Dictionary Attacks.  Filed 2010.
  2. Tolga Acar, Mira Belenkiy, Carl Ellison.  Distributed Key Management.  Filed 2009.
  3. Tolga Acar, Mira Belenkiy, Josh Benaloh, Carl M Ellison, Niels Thomas Ferguson, Duy Lan Nguyen.  Managing Group Keys.  Filed 2009.