Applied Cryptography, secure multi-party computation, especially in the cloud setting
Network Security
Access control problem in general, and password authentication
Publications
Third-Party Private DFA Evaluation on Encrypted Files in the Cloud, Lei Wei and Michael Reiter, to appear in 17th European Symposium on Research in Computer Security (ESORICS), 2012.
Bounded Vector Signatures and their Applications, Lei Wei, Scott Coull and Michael Reiter, in Proceedings of 6th ACM Symposium on Information, Computer and Communications Security, 2011.(pdf)
Summary-Invisible Networking: Techniques and Defenses, Lei Wei, Michael Reiter and Ketan Mayer-Patel, in Proceedings of 13th Information Security Conference (ISC), 2010.(pdf)