default search action
Gene Tsudik
Person information
- affiliation: University of California, Irvine, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j90]Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Norrathep Rattanavipanon, Gene Tsudik:
Toward Remotely Verifiable Software Integrity in Resource-Constrained IoT Devices. IEEE Commun. Mag. 62(7): 58-64 (2024) - [c225]Xavier Carpent, Seoyeon Hwang, Gene Tsudik:
Element Distinctness and Bounded Input Size in Private Set Intersection and Related Protocols. ACNS (1) 2024: 26-57 - [c224]Piet De Vaere, Felix Stöger, Adrian Perrig, Gene Tsudik:
The SA4P Framework: Sensing and Actuation as a Privilege. AsiaCCS 2024 - [c223]Gene Tsudik:
Staving off the IoT Armageddon. CCS 2024: 2-3 - [c222]Giovanni Di Crescenzo, Elina van Kempen, Gene Tsudik:
Robust Secure Aggregation for Co-located IoT Devices with Corruption Localization. CSCML 2024: 45-63 - [c221]Mauro Conti, Marin Duroyon, Gabriele Orazi, Gene Tsudik:
Acoustic Side-Channel Attacks on a Computer Mouse. DIMVA 2024: 44-63 - [c220]Seoyeon Hwang, Stanislaw Jarecki, Zane Karl, Elina van Kempen, Gene Tsudik:
PsfIVA: Privacy-Preserving Identity Verification Methods for Accountless Users via Private List Intersection and Variants. ESORICS (3) 2024: 362-382 - [c219]Renascence Tarafder Prapty, Sashidhar Jakkamsetti, Gene Tsudik:
KESIC: Kerberos Extensions for Smart, IoT and CPS Devices. ICCCN 2024: 1-9 - [c218]Yuxin (Myles) Liu, Zhihao Yao, Mingyi Chen, Ardalan Amiri Sani, Sharad Agarwal, Gene Tsudik:
ProvCam: A Camera Module with Self-Contained TCB for Producing Verifiable Videos. MobiCom 2024: 588-602 - [e14]Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis:
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part I. Lecture Notes in Computer Science 14344, Springer 2024, ISBN 978-3-031-50593-5 [contents] - [e13]Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis:
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part II. Lecture Notes in Computer Science 14345, Springer 2024, ISBN 978-3-031-51475-3 [contents] - [e12]Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis:
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part III. Lecture Notes in Computer Science 14346, Springer 2024, ISBN 978-3-031-51478-4 [contents] - [e11]Gene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis:
Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part IV. Lecture Notes in Computer Science 14347, Springer 2024, ISBN 978-3-031-51481-4 [contents] - [i99]Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Norrathep Rattanavipanon, Gene Tsudik:
Towards Remotely Verifiable Software Integrity in Resource-Constrained IoT Devices. CoRR abs/2401.04308 (2024) - [i98]Renascence Tarafder Prapty, Sashidhar Jakkamsetti, Gene Tsudik:
KESIC: Kerberos Extensions for Smart, IoT and CPS Devices. CoRR abs/2407.04880 (2024) - 2023
- [j89]Carl E. Landwehr, Michael K. Reiter, Laurie A. Williams, Gene Tsudik, Trent Jaeger, Tadayoshi Kohno, Apu Kapadia:
Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription. IEEE Secur. Priv. 21(2): 32-42 (2023) - [j88]Matteo Cardaioli, Mauro Conti, Gabriele Orazi, Pier Paolo Tricomi, Gene Tsudik:
BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication. Pervasive Mob. Comput. 92: 101801 (2023) - [j87]Seoyeon Hwang, Ercan Ozturk, Gene Tsudik:
Balancing Security and Privacy in Genomic Range Queries. ACM Trans. Priv. Secur. 26(3): 23:1-23:28 (2023) - [c217]Sashidhar Jakkamsetti, Youngil Kim, Gene Tsudik:
Caveat (IoT) Emptor: Towards Transparency of IoT Device Presence. CCS 2023: 1347-1361 - [c216]Sashidhar Jakkamsetti, Youngil Kim, Andrew Searles, Gene Tsudik:
Poster: Control-Flow Integrity in Low-end Embedded Devices. CCS 2023: 3618-3620 - [c215]Ivan De Oliveira Nunes, Seoyeon Hwang, Sashidhar Jakkamsetti, Norrathep Rattanavipanon, Gene Tsudik:
$\mathcal{P}\text{ARseL}$: Towards a Verified Root-of-Trust Over seL4. ICCAD 2023: 1-9 - [c214]Scott Jordan, Yoshimichi Nakatsuka, Ercan Ozturk, Andrew Paverd, Gene Tsudik:
VICEROY: GDPR-/CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests. NDSS 2023 - [c213]Andrew Searles, Yoshimichi Nakatsuka, Ercan Ozturk, Andrew Paverd, Gene Tsudik, Ai Enkoji:
An Empirical Study & Evaluation of Modern CAPTCHAs. USENIX Security Symposium 2023: 3081-3097 - [e10]Joseph K. Liu, Yang Xiang, Surya Nepal, Gene Tsudik:
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, ASIA CCS 2023, Melbourne, VIC, Australia, July 10-14, 2023. ACM 2023 [contents] - [i97]Andrew Searles, Yoshimichi Nakatsuka, Ercan Ozturk, Andrew Paverd, Gene Tsudik, Ai Enkoji:
An Empirical Study & Evaluation of Modern CAPTCHAs. CoRR abs/2307.12108 (2023) - [i96]Ivan De Oliveira Nunes, Seoyeon Hwang, Sashidhar Jakkamsetti, Norrathep Rattanavipanon, Gene Tsudik:
PARseL: Towards a Verified Root-of-Trust over seL4. CoRR abs/2308.11921 (2023) - [i95]Sashidhar Jakkamsetti, Youngil Kim, Gene Tsudik:
Caveat (IoT) Emptor: Towards Transparency of IoT Device Presence (Full Version). CoRR abs/2309.03574 (2023) - [i94]Andrew Searles, Renascence Tarafder Prapty, Gene Tsudik:
Dazed & Confused: A Large-Scale Real-World User Study of reCAPTCHAv2. CoRR abs/2311.10911 (2023) - [i93]Devris Isler, Seoyeon Hwang, Yoshimichi Nakatsuka, Nikolaos Laoutaris, Gene Tsudik:
Puppy: A Publicly Verifiable Watermarking Protocol. CoRR abs/2312.09125 (2023) - 2022
- [c212]Kiran S. Balagani, Matteo Cardaioli, Stefano Cecconello, Mauro Conti, Gene Tsudik:
We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack on ATM PIN Pads. ESORICS (1) 2022: 633-652 - [c211]Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Youngil Kim, Gene Tsudik:
CASU: Compromise Avoidance via Secure Update for Low-End Embedded Systems. ICCAD 2022: 146:1-146:9 - [c210]Yuxin (Myles) Liu, Yoshimichi Nakatsuka, Ardalan Amiri Sani, Sharad Agarwal, Gene Tsudik:
Vronicle: verifiable provenance for videos from mobile devices. MobiSys 2022: 196-208 - [c209]Yuxin (Myles) Liu, Yoshimichi Nakatsuka, Ardalan Amiri Sani, Sharad Agarwal, Gene Tsudik:
Vronicle: verifiable provenance for videos from mobile devices. MobiSys 2022: 565-566 - [c208]Yuxin (Myles) Liu, Yoshimichi Nakatsuka, Ardalan Amiri Sani, Sharad Agarwal, Gene Tsudik:
Vronicle: verifiable provenance for videos from mobile devices. MobiSys 2022: 628-629 - [c207]Matteo Cardaioli, Mauro Conti, Pier Paolo Tricomi, Gene Tsudik:
Privacy-Friendly De-authentication with BLUFADE: Blurred Face Detection. PerCom 2022: 197-206 - [c206]Ivan De Oliveira Nunes, Seoyeon Hwang, Sashidhar Jakkamsetti, Gene Tsudik:
Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSA. SP 2022: 2413-2429 - [c205]Esmerald Aliaj, Ivan De Oliveira Nunes, Gene Tsudik:
GAROTA: Generalized Active Root-Of-Trust Architecture (for Tiny Embedded Devices). USENIX Security Symposium 2022: 2243-2260 - [c204]Lukas Petzi, Ala Eddine Ben Yahya, Alexandra Dmitrienko, Gene Tsudik, Thomas Prantl, Samuel Kounev:
SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier. USENIX Security Symposium 2022: 3485-3501 - [c203]David Koisser, Patrick Jauernig, Gene Tsudik, Ahmad-Reza Sadeghi:
V'CER: Efficient Certificate Validation in Constrained Networks. USENIX Security Symposium 2022: 4491-4508 - [c202]David Shur, Giovanni Di Crescenzo, Qinqing Zhang, Ta Chen, Rajesh Krishnan, Yow-Jian Lin, Zahir Patni, Scott Alexander, Gene Tsudik:
SEDIMENT: An IoT-device-centric Methodology for Scalable 5G Network Security. WCNC 2022: 49-54 - [i92]David Koisser, Patrick Jauernig, Gene Tsudik, Ahmad-Reza Sadeghi:
V'CER: Efficient Certificate Validation in Constrained Networks. CoRR abs/2205.01973 (2022) - [i91]Ivan De Oliveira Nunes, Seoyeon Hwang, Sashidhar Jakkamsetti, Gene Tsudik:
Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSA. CoRR abs/2205.02963 (2022) - [i90]Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Youngil Kim, Gene Tsudik:
CASU: Compromise Avoidance via Secure Update for Low-end Embedded Systems. CoRR abs/2209.00813 (2022) - [i89]Tyler Kaczmarek, Ercan Ozturk, Pier Paolo Tricomi, Gene Tsudik:
Thermal (and Hybrid Thermal/Audio) Side-Channel Attacks on Keyboard Input. CoRR abs/2210.02234 (2022) - 2021
- [j86]Yoshimichi Nakatsuka, Andrew Paverd, Gene Tsudik:
PDoT: Private DNS-over-TLS with TEE Support. DTRAP 2(1): 3:1-3:22 (2021) - [c201]Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Norrathep Rattanavipanon, Gene Tsudik:
On the TOCTOU Problem in Remote Attestation. CCS 2021: 2921-2936 - [c200]Srdjan Capkun, Ercan Ozturk, Gene Tsudik, Karl Wüst:
ROSEN: RObust and SElective Non-repudiation (for TLS). CCSW 2021: 97-109 - [c199]Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Gene Tsudik:
DIALED: Data Integrity Attestation for Low-end Embedded Devices. DAC 2021: 313-318 - [c198]Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Gene Tsudik:
Tiny-CFA: Minimalistic Control-Flow Attestation Using Verified Proofs of Execution. DATE 2021: 641-646 - [c197]Ivan De Oliveira Nunes, Xuhua Ding, Gene Tsudik:
On the Root of Trust Identification Problem. IPSN 2021: 315-327 - [c196]Yoshimichi Nakatsuka, Ercan Ozturk, Andrew Paverd, Gene Tsudik:
CACTI: Captcha Avoidance via Client-side TEE Integration. USENIX Security Symposium 2021: 2561-2578 - [c195]Mahmoud Ammar, Bruno Crispo, Ivan De Oliveira Nunes, Gene Tsudik:
Delegated attestation: scalable remote attestation of commodity CPS by blending proofs of execution with software attestation. WISEC 2021: 37-47 - [i88]Esmerald Aliaj, Ivan De Oliveira Nunes, Gene Tsudik:
GAROTA: Generalized Active Root-Of-Trust Architecture. CoRR abs/2102.07014 (2021) - [i87]Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Gene Tsudik:
DIALED: Data Integrity Attestation for Low-end Embedded Devices. CoRR abs/2103.12928 (2021) - [i86]Scott Jordan, Yoshimichi Nakatsuka, Ercan Ozturk, Andrew Paverd, Gene Tsudik:
VICEROY: GDPR-/CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests. CoRR abs/2105.06942 (2021) - [i85]Yuxin (Myles) Liu, Yoshimichi Nakatsuka, Ardalan Amiri Sani, Sharad Agarwal, Gene Tsudik:
Vronicle: A System for Producing Videos with Verifiable Provenance. CoRR abs/2109.12712 (2021) - 2020
- [c194]Gene Tsudik:
Proofs or Remote Execution and Mitigation of TOCTOU Attacks. AsiaCCS 2020: 2-3 - [c193]Frederik Armknecht, Paul Walther, Gene Tsudik, Martin Beck, Thorsten Strufe:
ProMACs: Progressive and Resynchronizing MACs for Continuous Efficient Authentication of Message Streams. CCS 2020: 211-223 - [c192]Mauro Conti, Pier Paolo Tricomi, Gene Tsudik:
DE-auth of the Blue! Transparent De-authentication Using Bluetooth Low Energy Beacon. ESORICS (1) 2020: 277-294 - [c191]Bruce Berg, Tyler Kaczmarek, Alfred Kobsa, Gene Tsudik:
Exploring Effects of Auditory Stimuli on CAPTCHA Performance. Financial Cryptography Workshops 2020: 149-165 - [c190]Mahmoud Ammar, Bruno Crispo, Gene Tsudik:
SIMPLE: A Remote Attestation Approach for Resource-constrained IoT devices. ICCPS 2020: 247-258 - [c189]Alberto Compagno, Mauro Conti, Eleonora Losiouk, Gene Tsudik, Sebastiano Valle:
A Proactive Cache Privacy Attack on NDN. NOMS 2020: 1-7 - [c188]Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik:
APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise. USENIX Security Symposium 2020: 771-788 - [i84]Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Norrathep Rattanavipanon, Gene Tsudik:
On the TOCTOU Problem in Remote Attestation. CoRR abs/2005.03873 (2020) - [i83]Yoshimichi Nakatsuka, Ercan Ozturk, Andrew Paverd, Gene Tsudik:
CACTI: Captcha Avoidance via Client-side TEE Integration. CoRR abs/2007.10397 (2020) - [i82]Ivan De Oliveira Nunes, Xuhua Ding, Gene Tsudik:
On the Root of Trust Identification Problem. CoRR abs/2010.13858 (2020) - [i81]Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Gene Tsudik:
Tiny-CFA: A Minimalistic Approach for Control-Flow Attestation Using Verified Proofs of Execution. CoRR abs/2011.07400 (2020)
2010 – 2019
- 2019
- [j85]Hailun Tan, Gene Tsudik, Sanjay K. Jha:
MTRA: Multi-Tier randomized remote attestation in IoT networks. Comput. Secur. 81: 78-93 (2019) - [j84]Kiran S. Balagani, Matteo Cardaioli, Mauro Conti, Paolo Gasti, Martin Georgiev, Tristan Gurtler, Daniele Lain, Charissa Miller, Kendall Molas, Nikita Samarin, Eugen Saraci, Gene Tsudik, Lynn Wu:
PILOT: Password and PIN information leakage from obfuscated typing videos. J. Comput. Secur. 27(4): 405-425 (2019) - [j83]Gergely Ács, Mauro Conti, Paolo Gasti, Cesar Ghali, Gene Tsudik, Christopher A. Wood:
Privacy-Aware Caching in Information-Centric Networking. IEEE Trans. Dependable Secur. Comput. 16(2): 313-328 (2019) - [j82]Stefano Cecconello, Alberto Compagno, Mauro Conti, Daniele Lain, Gene Tsudik:
Skype & Type: Keyboard Eavesdropping in Voice-over-IP. ACM Trans. Priv. Secur. 22(4): 24:1-24:34 (2019) - [j81]Xavier Carpent, Norrathep Rattanavipanon, Gene Tsudik:
Remote Attestation via Self-Measurement. ACM Trans. Design Autom. Electr. Syst. 24(1): 11:1-11:15 (2019) - [j80]Cesar Ghali, Gene Tsudik, Ersin Uzun:
In Content We Trust: Network-Layer Trust in Content-Centric Networking. IEEE/ACM Trans. Netw. 27(5): 1787-1800 (2019) - [c187]Yoshimichi Nakatsuka, Andrew Paverd, Gene Tsudik:
PDoT: private DNS-over-TLS with TEE support. ACSAC 2019: 489-499 - [c186]Tyler Kaczmarek, Ercan Ozturk, Gene Tsudik:
Thermanator: Thermal Residue-Based Post Factum Attacks on Keyboard Data Entry. AsiaCCS 2019: 586-593 - [c185]Ahmad Ibrahim, Ahmad-Reza Sadeghi, Gene Tsudik:
HEALED: HEaling & Attestation for Low-End Embedded Devices. Financial Cryptography 2019: 627-645 - [c184]Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik:
PURE: Using Verified Remote Attestation to Obtain Proofs of Update, Reset and Erasure in low-End Embedded Systems. ICCAD 2019: 1-8 - [c183]Ivan De Oliveira Nunes, Ghada Dessouky, Ahmad Ibrahim, Norrathep Rattanavipanon, Ahmad-Reza Sadeghi, Gene Tsudik:
Towards Systematic Design of Collective Remote Attestation Protocols. ICDCS 2019: 1188-1198 - [c182]Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Michael Steiner, Gene Tsudik:
VRASED: A Verified Hardware/Software Co-Design for Remote Attestation. USENIX Security Symposium 2019: 1429-1446 - [c181]Karim Eldefrawy, Gene Tsudik:
Advancing remote attestation via computer-aided formal verification of designs and synthesis of executables: opinion. WiSec 2019: 45-48 - [c180]Xuhua Ding, Ercan Ozturk, Gene Tsudik:
Balancing Security and Privacy in Genomic Range Queries. WPES@CCS 2019: 106-110 - [i80]Kiran S. Balagani, Matteo Cardaioli, Mauro Conti, Paolo Gasti, Martin Georgiev, Tristan Gurtler, Daniele Lain, Charissa Miller, Kendall Molas, Nikita Samarin, Eugen Saraci, Gene Tsudik, Lynn Wu:
PILOT: Password and PIN Information Leakage from Obfuscated Typing Videos. CoRR abs/1904.00188 (2019) - [i79]Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik:
A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise. CoRR abs/1908.02444 (2019) - [i78]Yoshimichi Nakatsuka, Andrew Paverd, Gene Tsudik:
PDoT: Private DNS-over-TLS with TEE Support. CoRR abs/1909.11601 (2019) - 2018
- [j79]Xuhua Ding, Gene Tsudik:
Initializing trust in smart devices via presence attestation. Comput. Commun. 131: 35-38 (2018) - [j78]Moreno Ambrosin, Alberto Compagno, Mauro Conti, Cesar Ghali, Gene Tsudik:
Security and Privacy Analysis of National Science Foundation Future Internet Architectures. IEEE Commun. Surv. Tutorials 20(2): 1418-1442 (2018) - [j77]N. Asokan, Thomas Nyman, Norrathep Rattanavipanon, Ahmad-Reza Sadeghi, Gene Tsudik:
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 37(11): 2290-2300 (2018) - [c179]Ivan Oliveira Nunes, Gene Tsudik:
KRB-CCN: Lightweight Authentication and Access Control for Private Content-Centric Networks. ACNS 2018: 598-615 - [c178]Tyler Kaczmarek, Ercan Ozturk, Gene Tsudik:
Assentication: User De-authentication and Lunchtime Attack Mitigation with Seated Posture Biometric. ACNS 2018: 616-633 - [c177]Xavier Carpent, Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik:
Temporal Consistency of Integrity-Ensuring Computations and Applications to Embedded Systems Security. AsiaCCS 2018: 313-327 - [c176]Xavier Carpent, Karim Eldefrawy, Norrathep Rattanavipanon, Ahmad-Reza Sadeghi, Gene Tsudik:
Reconciling remote attestation and safety-critical operation on simple IoT devices. DAC 2018: 90:1-90:6 - [c175]Xavier Carpent, Gene Tsudik, Norrathep Rattanavipanon:
ERASMUS: Efficient remote attestation via self-measurement for unattended settings. DATE 2018: 1191-1194 - [c174]Kiran S. Balagani, Mauro Conti, Paolo Gasti, Martin Georgiev, Tristan Gurtler, Daniele Lain, Charissa Miller, Kendall Molas, Nikita Samarin, Eugen Saraci, Gene Tsudik, Lynn Wu:
SILK-TV: Secret Information Leakage from Keystroke Timing Videos. ESORICS (1) 2018: 263-280 - [c173]Xavier Carpent, Norrathep Rattanavipanon, Gene Tsudik:
Remote attestation of IoT devices via SMARM: Shuffled measurements against roving malware. HOST 2018: 9-16 - [c172]Paul Walther, Stefan Köpsell, Frederik Armknecht, Gene Tsudik, Thorsten Strufe:
Chains and Whips - An approach to lighweight MACs. Krypto-Tag 2018 - [c171]Paolo Gasti, Gene Tsudik:
Content-Centric and Named-Data Networking Security: The Good, The Bad and The Rest. LANMAN 2018: 1-6 - [c170]Ahmad Ibrahim, Ahmad-Reza Sadeghi, Gene Tsudik:
US-AID: Unattended Scalable Attestation of IoT Devices. SRDS 2018: 21-30 - [i77]Ivan Oliveira Nunes, Gene Tsudik:
KRB-CCN: Lightweight Authentication & Access Control for Private Content-Centric Networks. CoRR abs/1804.03820 (2018) - [i76]Tyler Kaczmarek, Ercan Ozturk, Gene Tsudik:
Thermanator: Thermal Residue-Based Post Factum Attacks On Keyboard Password Entry. CoRR abs/1806.10189 (2018) - [i75]N. Asokan, Thomas Nyman, Norrathep Rattanavipanon, Ahmad-Reza Sadeghi, Gene Tsudik:
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices. CoRR abs/1807.05002 (2018) - [i74]Karim Eldefrawy, Ivan Oliveira Nunes, Norrathep Rattanavipanon, Michael Steiner, Gene Tsudik:
Formally Verified Hardware/Software Co-Design for Remote Attestation. CoRR abs/1811.00175 (2018) - 2017
- [j76]Ivan Martinovic, Kasper Bonne Rasmussen, Marc Roeschlin, Gene Tsudik:
Authentication using pulse-response biometrics. Commun. ACM 60(2): 108-115 (2017) - [j75]Edith C. H. Ngai, Börje Ohlman, Gene Tsudik, Ersin Uzun, Matthias Wählisch, Christopher A. Wood:
Can We Make a Cake and Eat it Too? A Discussion of ICN Security and Privacy. Comput. Commun. Rev. 47(1): 49-54 (2017) - [j74]Tatiana Bradley, Xuhua Ding, Gene Tsudik:
Genomic Security (Lest We Forget). IEEE Secur. Priv. 15(5): 38-46 (2017) - [j73]Bruce Berg, Tyler Kaczmarek, Alfred Kobsa, Gene Tsudik:
An Exploration of the Effects of Sensory Stimuli on the Completion of Security Tasks. IEEE Secur. Priv. 15(6): 52-60 (2017) - [j72]Ivan Martinovic, Kasper Bonne Rasmussen, Marc Roeschlin, Gene Tsudik:
Pulse-Response: Exploring Human Body Impedance for Biometric Recognition. ACM Trans. Priv. Secur. 20(2): 6:1-6:31 (2017) - [c169]Cesar Ghali, Gene Tsudik, Christopher A. Wood:
When encryption is not enough: privacy attacks in content-centric networking. ICN 2017: 1-10 - [c168]Bruce Berg, Tyler Kaczmarek, Alfred Kobsa, Gene Tsudik:
Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks. ACNS 2017: 124-144 - [c167]Gene Tsudik:
Security in Personal Genomics: Lest We Forget. AsiaCCS 2017: 5 - [c166]Xavier Carpent, Karim El Defrawy, Norrathep Rattanavipanon, Gene Tsudik:
Lightweight Swarm Attestation: A Tale of Two LISA-s. AsiaCCS 2017: 86-100 - [c165]Zhangkai Zhang, Xuhua Ding, Gene Tsudik, Jinhua Cui, Zhoujun Li:
Presence Attestation: The Missing Link in Dynamic Trust Bootstrapping. CCS 2017: 89-102 - [c164]Alberto Compagno, Mauro Conti, Daniele Lain, Gene Tsudik:
Don't Skype & Type!: Acoustic Eavesdropping in Voice-Over-IP. AsiaCCS 2017: 703-715 - [c163]Hailun Tan, Gene Tsudik, Sanjay Jha:
MTRA: Multiple-tier remote attestation in IoT networks. CNS 2017: 1-9 - [c162]Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik:
FUsing Hybrid Remote Attestation with a Formally Verified Microkernel: Lessons Learned. DSN Workshops 2017: 141-144 - [c161]Cesar Ghali, Gene Tsudik, Ersin Uzun, Christopher A. Wood:
Closing the Floodgate with Stateless Content-Centric Networking. ICCCN 2017: 1-10 - [c160]Mauro Conti, Giulio Lovisotto, Ivan Martinovic, Gene Tsudik:
FADEWICH: Fast Deauthentication Over the Wireless Channel. ICDCS 2017: 2294-2301 - [c159]Cesar Ghali, Gene Tsudik, Christopher A. Wood:
Mitigating On-Path Adversaries in Content-Centric Networks. LCN 2017: 27-34 - [c158]Ivan Oliveira Nunes, Gene Tsudik, Christopher A. Wood:
Namespace Tunnels in Content-Centric Networks. LCN 2017: 35-42 - [c157]Saeed Mirzamohammadi, Justin A. Chen, Ardalan Amiri Sani, Sharad Mehrotra, Gene Tsudik:
Ditio: Trustworthy Auditing of Sensor Activities in Mobile & IoT Devices. SenSys 2017: 28:1-28:14 - [c156]Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik:
HYDRA: hybrid design for remote attestation (using a formally verified microkernel). WISEC 2017: 99-110 - [c155]Xavier Carpent, Sky Faber, Tomas Sander, Gene Tsudik:
Private Set Projections & Variants. WPES@CCS 2017: 87-98 - [i73]Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik:
HYDRA: HYbrid Design for Remote Attestation (Using a Formally Verified Microkernel). CoRR abs/1703.02688 (2017) - [i72]Bruce Berg, Tyler Kaczmarek, Alfred Kobsa, Gene Tsudik:
Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks. CoRR abs/1706.00056 (2017) - [i71]Xavier Carpent, Norrathep Rattanavipanon, Gene Tsudik:
ERASMUS: Efficient Remote Attestation via Self- Measurement for Unattended Settings. CoRR abs/1707.09043 (2017) - [i70]Tyler Kaczmarek, Ercan Ozturk, Gene Tsudik:
Assentication: User Deauthentication and Lunchtime Attack Mitigation with Seated Posture Biometric. CoRR abs/1708.03978 (2017) - [i69]Xavier Carpent, Norrathep Rattanavipanon, Gene Tsudik:
Probabilistic and Considerate Attestation of IoT Devices against Roving Malware. IACR Cryptol. ePrint Arch. 2017: 1216 (2017) - 2016
- [c154]Mishari Almishari, Ekin Oguz, Gene Tsudik:
Trilateral Large-Scale OSN Account Linkability Study. AAAI Fall Symposia 2016 - [c153]Cesar Ghali, Gene Tsudik, Christopher A. Wood:
Network Names in Content-Centric Networking. ICN 2016: 132-141 - [c152]Gene Tsudik, Ersin Uzun, Christopher A. Wood:
AC3N: Anonymous communication in Content-Centric Networking. CCNC 2016: 988-991 - [c151]Tigist Abera, N. Asokan, Lucas Davi, Jan-Erik Ekberg, Thomas Nyman, Andrew Paverd, Ahmad-Reza Sadeghi, Gene Tsudik:
C-FLAT: Control-Flow Attestation for Embedded Systems Software. CCS 2016: 743-754 - [c150]Ferdinand Brasser, Kasper Bonne Rasmussen, Ahmad-Reza Sadeghi, Gene Tsudik:
Remote attestation for low-end embedded devices: the prover's perspective. DAC 2016: 91:1-91:6 - [c149]Tigist Abera, N. Asokan, Lucas Davi, Farinaz Koushanfar, Andrew Paverd, Ahmad-Reza Sadeghi, Gene Tsudik:
Invited - Things, trouble, trust: on building trust in IoT systems. DAC 2016: 121:1-121:6 - [c148]Cesar Ghali, Gene Tsudik, Christopher A. Wood:
BEAD: Best effort autonomous deletion in content-centric networking. Networking 2016: 180-188 - [c147]Cesar Ghali, Gene Tsudik, Christopher A. Wood, Edmund Yeh:
Practical accounting in content-centric networking. NOMS 2016: 436-444 - [c146]Tatiana Bradley, Sky Faber, Gene Tsudik:
Bounded Size-Hiding Private Set Intersection. SCN 2016: 449-467 - [c145]Ahmad Ibrahim, Ahmad-Reza Sadeghi, Gene Tsudik, Shaza Zeitouni:
DARPA: Device Attestation Resilient to Physical Attacks. WISEC 2016: 171-182 - [c144]Marc Roeschlin, Ivo Sluganovic, Ivan Martinovic, Gene Tsudik, Kasper Bonne Rasmussen:
Generating Secret Keys from Biometric Body Impedance Measurements. WPES@CCS 2016: 59-69 - [c143]Cesar Ghali, Gene Tsudik, Christopher A. Wood:
(The Futility of) Data Privacy in Content-Centric Networking. WPES@CCS 2016: 143-152 - [i68]Tigist Abera, N. Asokan, Lucas Davi, Jan-Erik Ekberg, Thomas Nyman, Andrew Paverd, Ahmad-Reza Sadeghi, Gene Tsudik:
C-FLAT: Control-FLow ATtestation for Embedded Systems Software. CoRR abs/1605.07763 (2016) - [i67]Alberto Compagno, Mauro Conti, Daniele Lain, Gene Tsudik:
Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP. CoRR abs/1609.09359 (2016) - [i66]Moreno Ambrosin, Alberto Compagno, Mauro Conti, Cesar Ghali, Gene Tsudik:
Security and Privacy Analysis of NSF Future Internet Architectures. CoRR abs/1610.00355 (2016) - [i65]Mauro Conti, Giulio Lovisotto, Ivan Martinovic, Gene Tsudik:
FADEWICH: Fast Deauthentication over the Wireless Channel. CoRR abs/1612.08593 (2016) - [i64]Edith C. H. Ngai, Börje Ohlman, Gene Tsudik, Ersin Uzun:
Information-centric Networking and Security (Dagstuhl Seminar 16251). Dagstuhl Reports 6(6): 49-61 (2016) - [i63]Tatiana Bradley, Sky Faber, Gene Tsudik:
Bounded Size-Hiding Private Set Intersection. IACR Cryptol. ePrint Arch. 2016: 657 (2016) - [i62]Xavier Carpent, Sky Faber, Tomas Sander, Gene Tsudik:
Private Projections & Variants. IACR Cryptol. ePrint Arch. 2016: 1144 (2016) - 2015
- [j71]Erman Ayday, Emiliano De Cristofaro, Jean-Pierre Hubaux, Gene Tsudik:
Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare? Computer 48(2): 58-66 (2015) - [c142]Cesar Ghali, Marc A. Schlosberg, Gene Tsudik, Christopher A. Wood:
Interest-Based Access Control for Content Centric Networks. ICN 2015: 147-156 - [c141]Alberto Compagno, Mauro Conti, Paolo Gasti, Luigi Vincenzo Mancini, Gene Tsudik:
Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking. ACNS 2015: 243-262 - [c140]N. Asokan, Ferdinand Brasser, Ahmad Ibrahim, Ahmad-Reza Sadeghi, Matthias Schunter, Gene Tsudik, Christian Wachsmann:
SEDA: Scalable Embedded Device Attestation. CCS 2015: 964-975 - [c139]Cesar Ghali, Ashok Narayanan, David Oran, Gene Tsudik, Christopher A. Wood:
Secure Fragmentation for Content-Centric Networks. NCA 2015: 47-56 - [c138]Sky Faber, Ronald Petrlic, Gene Tsudik:
UnLinked: Private Proximity-based Off-line OSN Interaction. WPES@CCS 2015: 121-131 - [i61]Alberto Compagno, Mauro Conti, Cesar Ghali, Gene Tsudik:
To NACK or not to NACK? Negative Acknowledgments in Information-Centric Networking. CoRR abs/1503.02123 (2015) - [i60]Cesar Ghali, Marc A. Schlosberg, Gene Tsudik, Christopher A. Wood:
Interest-Based Access Control for Content Centric Networks (extended version). CoRR abs/1505.06258 (2015) - [i59]Mishari Almishari, Ekin Oguz, Gene Tsudik:
Trilateral Large-Scale OSN Account Linkability Study. CoRR abs/1510.00783 (2015) - [i58]Cesar Ghali, Gene Tsudik, Christopher A. Wood, Edmund Yeh:
Practical Accounting in Content-Centric Networking (extended version). CoRR abs/1510.01852 (2015) - [i57]Cesar Ghali, Gene Tsudik, Christopher A. Wood:
BEAD: Best Effort Autonomous Deletion in Content-Centric Networking. CoRR abs/1512.07311 (2015) - [i56]Cesar Ghali, Gene Tsudik, Ersin Uzun, Christopher A. Wood:
Living in a PIT-less World: A Case Against Stateful Forwarding in Content-Centric Networking. CoRR abs/1512.07755 (2015) - [i55]Jean-Pierre Hubaux, Stefan Katzenbeisser, Bradley A. Malin, Gene Tsudik:
Genomic Privacy (Dagstuhl Seminar 15431). Dagstuhl Reports 5(10): 50-65 (2015) - 2014
- [j70]Mishari Al Mishari, Paolo Gasti, Naveen Nathan, Gene Tsudik:
Optimizing bi-directional low-latency communication in named data networking. Comput. Commun. Rev. 44(1): 13-19 (2014) - [j69]Cesar Ghali, Gene Tsudik, Ersin Uzun:
Network-Layer Trust in Named-Data Networking. Comput. Commun. Rev. 44(5): 12-19 (2014) - [j68]Syed Taha Ali, Vijay Sivaraman, Diethelm Ostry, Gene Tsudik, Sanjay K. Jha:
Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints. IEEE Trans. Inf. Forensics Secur. 9(12): 2193-2204 (2014) - [c137]Gene Tsudik:
Challenges in Remote Attestation of Low-End Embedded Devices. TrustED@CCS 2014: 1 - [c136]Moreno Ambrosin, Mauro Conti, Paolo Gasti, Gene Tsudik:
Covert ephemeral communication in named data networking. AsiaCCS 2014: 15-26 - [c135]Mishari Almishari, Ekin Oguz, Gene Tsudik:
Fighting authorship linkability with crowdsourcing. COSN 2014: 69-82 - [c134]Aurélien Francillon, Quan Nguyen, Kasper Bonne Rasmussen, Gene Tsudik:
A minimalist approach to Remote Attestation. DATE 2014: 1-6 - [c133]Jeff Burke, Paolo Gasti, Naveen Nathan, Gene Tsudik:
Secure Sensing over Named Data Networking. NCA 2014: 175-180 - [c132]Kasper Bonne Rasmussen, Marc Roeschlin, Ivan Martinovic, Gene Tsudik:
Authentication Using Pulse-Response Biometrics. NDSS 2014 - [c131]Mishari Al Mishari, Dali Kaafar, Ekin Oguz, Gene Tsudik:
Stylometric Linkability of Tweets. WPES 2014: 205-208 - [i54]Cesar Ghali, Gene Tsudik, Ersin Uzun:
Elements of Trust in Named-Data Networking. CoRR abs/1402.3332 (2014) - [i53]Cesar Ghali, Ashok Narayanan, David Oran, Gene Tsudik:
Secure Fragmentation for Content-Centric Networks. CoRR abs/1405.2861 (2014) - [i52]Mishari Al Mishari, Ekin Oguz, Gene Tsudik:
Fighting Authorship Linkability with Crowdsourcing. CoRR abs/1405.4918 (2014) - [i51]Mishari Al Mishari, Dali Kaafar, Gene Tsudik, Ekin Oguz:
Are 140 Characters Enough? A Large-Scale Linkability Study of Tweets. CoRR abs/1406.2746 (2014) - [i50]Tyler Kaczmarek, Alfred Kobsa, Robert Sy, Gene Tsudik:
User Errors in the Performance of Security Critical Tasks in the Context of Adversarial Noise. CoRR abs/1406.3002 (2014) - 2013
- [j67]Alfred Kobsa, Rishab Nithyanand, Gene Tsudik, Ersin Uzun:
Can Jannie verify? Usability of display-equipped RFID tags for security purposes. J. Comput. Secur. 21(3): 347-370 (2013) - [j66]Roberto Di Pietro, Gabriele Oligeri, Claudio Soriente, Gene Tsudik:
United We Stand: Intrusion Resilience in Mobile Unattended WSNs. IEEE Trans. Mob. Comput. 12(7): 1456-1468 (2013) - [c130]Mishari Al Mishari, Paolo Gasti, Gene Tsudik, Ekin Oguz:
Privacy-Preserving Matching of Community-Contributed Content. ESORICS 2013: 443-462 - [c129]Paolo Gasti, Gene Tsudik, Ersin Uzun, Lixia Zhang:
DoS and DDoS in Named Data Networking. ICCCN 2013: 1-7 - [c128]Gergely Ács, Mauro Conti, Paolo Gasti, Cesar Ghali, Gene Tsudik:
Cache Privacy in Named-Data Networking. ICDCS 2013: 41-51 - [c127]Alberto Compagno, Mauro Conti, Paolo Gasti, Gene Tsudik:
Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking. LCN 2013: 630-638 - [c126]Emiliano De Cristofaro, Sky Faber, Gene Tsudik:
Secure genomic testing with size- and position-hiding private substring matching. WPES 2013: 107-118 - [i49]Alberto Compagno, Mauro Conti, Paolo Gasti, Gene Tsudik:
Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data Networking. CoRR abs/1303.4823 (2013) - [i48]Erman Ayday, Emiliano De Cristofaro, Jean-Pierre Hubaux, Gene Tsudik:
The Chills and Thrills of Whole Genome Sequencing. CoRR abs/1306.1264 (2013) - [i47]Moreno Ambrosin, Mauro Conti, Paolo Gasti, Gene Tsudik:
Covert Ephemeral Communication in Named Data Networking. CoRR abs/1311.2517 (2013) - [i46]Kay Hamacher, Jean-Pierre Hubaux, Gene Tsudik:
Genomic Privacy (Dagstuhl Seminar 13412). Dagstuhl Reports 3(10): 25-35 (2013) - 2012
- [j65]Emiliano De Cristofaro, Claudio Soriente, Gene Tsudik, Andrew Williams:
Tweeting with Hummingbird: Privacy in Large-Scale Micro-Blogging OSNs. IEEE Data Eng. Bull. 35(4): 93-100 (2012) - [j64]Mishari Al Mishari, Emiliano De Cristofaro, Karim M. El Defrawy, Gene Tsudik:
Harvesting SSL Certificate Data to Identify Web-Fraud. Int. J. Netw. Secur. 14(6): 324-338 (2012) - [j63]Jung Hee Cheon, Jeongdae Hong, Gene Tsudik:
Reducing RFID reader load with the meet-in-the-middle strategy. J. Commun. Networks 14(1): 10-14 (2012) - [j62]Marco Conti, Sajal K. Das, Chatschik Bisdikian, Mohan Kumar, Lionel M. Ni, Andrea Passarella, George Roussos, Gerhard Tröster, Gene Tsudik, Franco Zambonelli:
Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber-physical convergence. Pervasive Mob. Comput. 8(1): 2-21 (2012) - [j61]Roberto Di Pietro, Di Ma, Claudio Soriente, Gene Tsudik:
Self-healing in unattended wireless sensor networks. ACM Trans. Sens. Networks 9(1): 7:1-7:21 (2012) - [c125]Zekeriya Erkin, Gene Tsudik:
Private Computation of Spatial and Temporal Power Consumption with Smart Meters. ACNS 2012: 561-577 - [c124]Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik:
Fast and Private Computation of Cardinality of Set Intersection and Union. CANS 2012: 218-231 - [c123]Mishari Al Mishari, Gene Tsudik:
Exploring Linkability of User Reviews. ESORICS 2012: 307-324 - [c122]Steve DiBenedetto, Paolo Gasti, Gene Tsudik, Ersin Uzun:
ANDaNA: Anonymous Named Data Networking Application. NDSS 2012 - [c121]Karim Eldefrawy, Gene Tsudik, Aurélien Francillon, Daniele Perito:
SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust. NDSS 2012 - [c120]Emiliano De Cristofaro, Claudio Soriente, Gene Tsudik, Andrew Williams:
Hummingbird: Privacy at the Time of Twitter. IEEE Symposium on Security and Privacy 2012: 285-299 - [c119]Emiliano De Cristofaro, Gene Tsudik:
Experimenting with Fast Private Set Intersection. TRUST 2012: 55-73 - [c118]Emiliano De Cristofaro, Sky Faber, Paolo Gasti, Gene Tsudik:
Genodroid: are privacy-preserving genomic tests ready for prime time? WPES 2012: 97-108 - [i45]Mishari Al Mishari, Paolo Gasti, Naveen Nathan, Gene Tsudik:
Optimizing Bi-directional Low-Latency Communication in Named Data Networking. CoRR abs/1207.7085 (2012) - [i44]Paolo Gasti, Gene Tsudik, Ersin Uzun, Lixia Zhang:
DoS and DDoS in Named-Data Networking. CoRR abs/1208.0952 (2012) - [i43]Jeff Burke, Paolo Gasti, Naveen Nathan, Gene Tsudik:
Securing Instrumented Environments over Content-Centric Networking: the Case of Lighting Control. CoRR abs/1208.1336 (2012) - [i42]Jan Camenisch, Mark Manulis, Gene Tsudik, Rebecca N. Wright:
Privacy-Oriented Cryptography (Dagstuhl Seminar 12381). Dagstuhl Reports 2(9): 165-183 (2012) - [i41]Emiliano De Cristofaro, Gene Tsudik:
On the performance of certain Private Set Intersection protocols. (And some remarks on the recent paper by Huang et al. in NDSS'12). IACR Cryptol. ePrint Arch. 2012: 54 (2012) - [i40]Aurélien Francillon, Quan Nguyen, Kasper Bonne Rasmussen, Gene Tsudik:
Systematic Treatment of Remote Attestation. IACR Cryptol. ePrint Arch. 2012: 713 (2012) - 2011
- [j60]Rishab Nithyanand, Gene Tsudik, Ersin Uzun:
User-aided reader revocation in PKI-based RFID systems. J. Comput. Secur. 19(6): 1147-1172 (2011) - [j59]Yanbin Lu, Gene Tsudik:
Privacy-Preserving Cloud Database Querying. J. Internet Serv. Inf. Secur. 1(4): 5-25 (2011) - [j58]Karim M. El Defrawy, Gene Tsudik:
Privacy-Preserving Location-Based On-Demand Routing in MANETs. IEEE J. Sel. Areas Commun. 29(10): 1926-1934 (2011) - [j57]Roberto Di Pietro, Claudio Soriente, Angelo Spognardi, Gene Tsudik:
Intrusion-resilient integrity in data-centric unattended WSNs. Pervasive Mob. Comput. 7(4): 495-508 (2011) - [j56]Karim M. El Defrawy, Gene Tsudik:
ALARM: Anonymous Location-Aided Routing in Suspicious MANETs. IEEE Trans. Mob. Comput. 10(9): 1345-1358 (2011) - [j55]Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Flexible Robust Group Key Agreement. IEEE Trans. Parallel Distributed Syst. 22(5): 879-886 (2011) - [c117]Pierre Baldi, Roberta Baronio, Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik:
Countering GATTACA: efficient and secure testing of fully-sequenced human genomes. CCS 2011: 691-702 - [c116]Alfred Kobsa, Rishab Nithyanand, Gene Tsudik, Ersin Uzun:
Usability of Display-Equipped RFID Tags for Security Purposes. ESORICS 2011: 434-451 - [c115]Yanbin Lu, Gene Tsudik:
Enhancing Data Privacy in the Cloud. IFIPTM 2011: 117-132 - [c114]Giuseppe Ateniese, Emiliano De Cristofaro, Gene Tsudik:
(If) Size Matters: Size-Hiding Private Set Intersection. Public Key Cryptography 2011: 156-173 - [c113]Emiliano De Cristofaro, Yanbin Lu, Gene Tsudik:
Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information. TRUST 2011: 239-253 - [c112]Srdjan Capkun, Karim M. El Defrawy, Gene Tsudik:
Group Distance Bounding Protocols - (Short Paper). TRUST 2011: 302-312 - [c111]Sajal K. Das, Guevara Noubir, Refik Molva, Gene Tsudik, Nan Zhang:
Message from the workshop chairs. WOWMOM 2011: 1-4 - [e9]Javier López, Gene Tsudik:
Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings. Lecture Notes in Computer Science 6715, 2011, ISBN 978-3-642-21553-7 [contents] - [e8]Dongdai Lin, Gene Tsudik, Xiaoyun Wang:
Cryptology and Network Security - 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011. Proceedings. Lecture Notes in Computer Science 7092, Springer 2011, ISBN 978-3-642-25512-0 [contents] - [e7]Mike Burmester, Gene Tsudik, Spyros S. Magliveras, Ivana Ilic:
Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6531, Springer 2011, ISBN 978-3-642-18177-1 [contents] - [e6]Dieter Gollmann, Dirk Westhoff, Gene Tsudik, N. Asokan:
Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011. ACM 2011, ISBN 978-1-4503-0692-8 [contents] - [i39]Pierre Baldi, Roberta Baronio, Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik:
Countering Gattaca: Efficient and Secure Testing of Fully-Sequenced Human Genomes. CoRR abs/1110.2478 (2011) - [i38]Mishari Al Mishari, Gene Tsudik:
Exploring Linkablility of Community Reviewing. CoRR abs/1111.0338 (2011) - [i37]Steve DiBenedetto, Paolo Gasti, Gene Tsudik, Ersin Uzun:
ANDaNA: Anonymous Named Data Networking Application. CoRR abs/1112.2205 (2011) - [i36]Emiliano De Cristofaro, Yanbin Lu, Gene Tsudik:
Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information. IACR Cryptol. ePrint Arch. 2011: 113 (2011) - [i35]Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik:
Fast and Private Computation of Set Intersection Cardinality. IACR Cryptol. ePrint Arch. 2011: 141 (2011) - [i34]Yanbin Lu, Gene Tsudik:
Enhancing Data Privacy in the Cloud. IACR Cryptol. ePrint Arch. 2011: 158 (2011) - [i33]Emiliano De Cristofaro, Claudio Soriente, Gene Tsudik, Andrew Williams:
Hummingbird: Privacy at the time of Twitter. IACR Cryptol. ePrint Arch. 2011: 640 (2011) - 2010
- [j54]Salvatore J. Stolfo, Gene Tsudik:
Privacy-Preserving Sharing of Sensitive Information. IEEE Secur. Priv. 8(4): 16-17 (2010) - [j53]Di Ma, Gene Tsudik:
Security and privacy in emerging wireless networks. IEEE Wirel. Commun. 17(5): 12-21 (2010) - [c110]Mark Manulis, Bertram Poettering, Gene Tsudik:
Affiliation-Hiding Key Exchange with Untrusted Group Authorities. ACNS 2010: 402-419 - [c109]Emiliano De Cristofaro, Jihye Kim, Gene Tsudik:
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model. ASIACRYPT 2010: 213-231 - [c108]Rishab Nithyanand, Gene Tsudik, Ersin Uzun:
Readers Behaving Badly - Reader Revocation in PKI-Based RFID Systems. ESORICS 2010: 19-36 - [c107]Daniele Perito, Gene Tsudik:
Secure Code Update for Embedded Devices via Proofs of Secure Erasure. ESORICS 2010: 643-662 - [c106]Emiliano De Cristofaro, Gene Tsudik:
Practical Private Set Intersection Protocols with Linear Complexity. Financial Cryptography 2010: 143-159 - [c105]Rishab Nithyanand, Nitesh Saxena, Gene Tsudik, Ersin Uzun:
Groupthink: usability of secure group association for wireless devices. UbiComp 2010: 331-340 - [c104]Di Ma, Gene Tsudik:
IRRES: Intrusion-Resilient Remote Email Storage. ICDCS Workshops 2010: 72-76 - [c103]Roberto Di Pietro, Gabriele Oligeri, Claudio Soriente, Gene Tsudik:
Intrusion-Resilience in Mobile Unattended WSNs. INFOCOM 2010: 2303-2311 - [c102]Yanbin Lu, Gene Tsudik:
Towards Plugging Privacy Leaks in the Domain Name System. Peer-to-Peer Computing 2010: 1-10 - [c101]Gene Tsudik:
Some Security Topics with Possible Applications for Pairing-Based Cryptography. Pairing 2010: 40 - [c100]Mark Manulis, Bertram Poettering, Gene Tsudik:
Taming Big Brother Ambitions: More Privacy for Secret Handshakes. Privacy Enhancing Technologies 2010: 149-165 - [c99]Roberto Di Pietro, Gabriele Oligeri, Claudio Soriente, Gene Tsudik:
Securing Mobile Unattended WSNs against a Mobile Adversary. SRDS 2010: 11-20 - [i32]Karim M. El Defrawy, Srdjan Capkun, Gene Tsudik:
GDB: Group Distance Bounding Protocols. CoRR abs/1011.5295 (2010) - [i31]Daniele Perito, Gene Tsudik:
Secure Code Update for Embedded Devices via Proofs of Secure Erasure. IACR Cryptol. ePrint Arch. 2010: 217 (2010) - [i30]Giuseppe Ateniese, Emiliano De Cristofaro, Gene Tsudik:
(If) Size Matters: Size-Hiding Private Set Intersection. IACR Cryptol. ePrint Arch. 2010: 220 (2010) - [i29]Emiliano De Cristofaro, Jihye Kim, Gene Tsudik:
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model. IACR Cryptol. ePrint Arch. 2010: 469 (2010)
2000 – 2009
- 2009
- [j52]Jihye Kim, Gene Tsudik:
SRDP: Secure route discovery for dynamic source routing in MANETs. Ad Hoc Networks 7(6): 1097-1109 (2009) - [j51]Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik:
Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks. Ad Hoc Networks 7(8): 1463-1475 (2009) - [j50]Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik:
Remarks on ''Analysis of one popular group signature scheme'' in Asiacrypt 2006. Int. J. Appl. Cryptogr. 1(4): 320-322 (2009) - [j49]Maithili Narasimha, John Solis, Gene Tsudik:
Privacy-preserving revocation checking. Int. J. Inf. Sec. 8(1): 61-75 (2009) - [j48]Claudio Soriente, Gene Tsudik, Ersin Uzun:
Secure pairing of interface constrained devices. Int. J. Secur. Networks 4(1/2): 17-26 (2009) - [j47]Michael T. Goodrich, Michael Sirivianos, John Solis, Claudio Soriente, Gene Tsudik, Ersin Uzun:
Using audio in secure device pairing. Int. J. Secur. Networks 4(1/2): 57-68 (2009) - [j46]Xuhua Ding, Gene Tsudik, Shouhuai Xu:
Leak-free mediated group signatures. J. Comput. Secur. 17(4): 489-514 (2009) - [j45]Di Ma, Claudio Soriente, Gene Tsudik:
New adversary and new threats: security in unattended sensor networks. IEEE Netw. 23(2): 43-48 (2009) - [j44]Arun Kumar, Nitesh Saxena, Gene Tsudik, Ersin Uzun:
A comparative study of secure device pairing methods. Pervasive Mob. Comput. 5(6): 734-749 (2009) - [j43]Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik:
Data Security in Unattended Wireless Sensor Networks. IEEE Trans. Computers 58(11): 1500-1511 (2009) - [j42]Mike Burmester, Tri Van Le, Breno de Medeiros, Gene Tsudik:
Universally Composable RFID Identification and Authentication Protocols. ACM Trans. Inf. Syst. Secur. 12(4): 21:1-21:33 (2009) - [j41]Di Ma, Gene Tsudik:
A new approach to secure logging. ACM Trans. Storage 5(1): 2:1-2:21 (2009) - [j40]Claude Castelluccia, Aldar C.-F. Chan, Einar Mykletun, Gene Tsudik:
Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Trans. Sens. Networks 5(3): 20:1-20:36 (2009) - [j39]Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi:
Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs. IEEE Trans. Parallel Distributed Syst. 20(2): 158-170 (2009) - [c98]Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin:
Logging key assurance indicators in business processes. AsiaCCS 2009: 364-367 - [c97]Karim M. El Defrawy, John Solis, Gene Tsudik:
Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks. COMPSAC (1) 2009: 271-279 - [c96]Emiliano De Cristofaro, Xuhua Ding, Gene Tsudik:
Privacy-Preserving Querying in Sensor Networks. ICCCN 2009: 1-6 - [c95]Arun Kumar, Nitesh Saxena, Gene Tsudik, Ersin Uzun:
Caveat Emptor: A Comparative Study of Secure Device Pairing Methods. PerCom 2009: 1-10 - [c94]Emiliano De Cristofaro, Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Privacy-Preserving Policy-Based Information Transfer. Privacy Enhancing Technologies 2009: 164-184 - [c93]Alfred Kobsa, Rahim Sonawalla, Gene Tsudik, Ersin Uzun, Yang Wang:
Serial hook-ups: a comparative usability study of secure device pairing methods. SOUPS 2009 - [c92]Roberto Di Pietro, Claudio Soriente, Angelo Spognardi, Gene Tsudik:
Collaborative authentication in unattended WSNs. WISEC 2009: 237-244 - [e5]Stanislaw Jarecki, Gene Tsudik:
Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings. Lecture Notes in Computer Science 5443, Springer 2009, ISBN 978-3-642-00467-4 [contents] - [i28]Emiliano De Cristofaro, Xuhua Ding, Gene Tsudik:
Privacy-Preserving Querying in Sensor Networks. CoRR abs/0905.2158 (2009) - [i27]Mishari Al Mishari, Emiliano De Cristofaro, Karim M. El Defrawy, Gene Tsudik:
Harvesting SSL Certificate Data to Mitigate Web-Fraud. CoRR abs/0909.3688 (2009) - [i26]Yanbin Lu, Gene Tsudik:
Towards Plugging Privacy Leaks in Domain Name System. CoRR abs/0910.2472 (2009) - [i25]Jung Hee Cheon, Jeongdae Hong, Gene Tsudik:
Reducing RFID Reader Load with the Meet-in-the-Middle Strategy. IACR Cryptol. ePrint Arch. 2009: 92 (2009) - [i24]Rishab Nithyanand, Gene Tsudik, Ersin Uzun:
Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems. IACR Cryptol. ePrint Arch. 2009: 465 (2009) - [i23]Emiliano De Cristofaro, Gene Tsudik:
Practical Private Set Intersection Protocols with Linear Computational and Bandwidth Complexity. IACR Cryptol. ePrint Arch. 2009: 491 (2009) - 2008
- [j38]Gene Tsudik:
Editorial. ACM Trans. Inf. Syst. Secur. 11(3): 11:1 (2008) - [c91]Gene Tsudik:
Security and privacy in unattended sensor networks. AINTEC 2008: 7 - [c90]Gene Tsudik:
Confronting a mobile adversary in unattended sensor networks. AsiaCCS 2008: 1 - [c89]Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange. CT-RSA 2008: 352-369 - [c88]Di Ma, Gene Tsudik:
A New Approach to Secure Logging. DBSec 2008: 48-63 - [c87]Jihye Kim, Gene Tsudik:
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks. ICISC 2008: 66-83 - [c86]Karim M. El Defrawy, Gene Tsudik:
PRISM: Privacy-friendly routing in suspicious MANETs (and VANETs). ICNP 2008: 258-267 - [c85]Claudio Soriente, Gene Tsudik, Ersin Uzun:
HAPADEP: Human-Assisted Pure Audio Device Pairing. ISC 2008: 385-400 - [c84]Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik:
Catch Me (If You Can): Data Survival in Unattended Sensor Networks. PerCom 2008: 185-194 - [c83]Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, Gene Tsudik:
Scalable and efficient provable data possession. SecureComm 2008: 9 - [c82]Roberto Di Pietro, Di Ma, Claudio Soriente, Gene Tsudik:
POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks. SRDS 2008: 185-194 - [c81]Di Ma, Gene Tsudik:
DISH: Distributed Self-Healing. SSS 2008: 47-62 - [c80]Gene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, Melanie R. Rieback:
RFID security and privacy: long-term research or short-term tinkering? WISEC 2008: 160 - [e4]Gene Tsudik:
Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers. Lecture Notes in Computer Science 5143, Springer 2008, ISBN 978-3-540-85229-2 [contents] - [i22]Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, Gene Tsudik:
Scalable and Efficient Provable Data Possession. IACR Cryptol. ePrint Arch. 2008: 114 (2008) - [i21]Di Ma, Gene Tsudik:
DISH: Distributed Self-Healing in Unattended Sensor Networks. IACR Cryptol. ePrint Arch. 2008: 158 (2008) - [i20]Di Ma, Gene Tsudik:
A New Approach to Secure Logging. IACR Cryptol. ePrint Arch. 2008: 185 (2008) - [i19]Jihye Kim, Gene Tsudik:
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks. IACR Cryptol. ePrint Arch. 2008: 282 (2008) - [i18]Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik:
Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary. IACR Cryptol. ePrint Arch. 2008: 293 (2008) - 2007
- [j37]Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi:
Threshold cryptography in P2P and MANETs: The case of access control. Comput. Networks 51(12): 3632-3649 (2007) - [j36]Kumar Viswanath, Katia Obraczka, Gene Tsudik:
Correction to "Exploring Mesh and Tree-Based Multicast Routing Protocols for MANETs". IEEE Trans. Mob. Comput. 6(2): 237 (2007) - [j35]Xuhua Ding, Daniele Mazzocchi, Gene Tsudik:
Equipping smart devices with public key signatures. ACM Trans. Internet Techn. 7(1): 3 (2007) - [c79]Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Robust group key agreement using short broadcasts. CCS 2007: 411-420 - [c78]Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement. CT-RSA 2007: 287-308 - [c77]Maithili Narasimha, Gene Tsudik:
Privacy-Preserving Revocation Checking with Modified CRLs. EuroPKI 2007: 18-33 - [c76]Karim M. El Defrawy, Gene Tsudik:
ALARM: Anonymous Location-Aided Routing in Suspicious MANETs. ICNP 2007: 304-313 - [c75]Karim El Defrawy, Magda El Zarki, Gene Tsudik:
Incentive-based cooperative and secure inter-personal networking. MobiOpp@MobiSys 2007: 57-61 - [c74]Gene Tsudik:
A Family of Dunces: Trivial RFID Identification and Authentication Protocols. Privacy Enhancing Technologies 2007: 45-61 - [c73]Di Ma, Gene Tsudik:
Extended Abstract: Forward-Secure Sequential Aggregate Authentication. S&P 2007: 86-91 - [i17]Di Ma, Gene Tsudik:
Forward-Secure Sequential Aggregate Authentication. IACR Cryptol. ePrint Arch. 2007: 52 (2007) - [i16]Claudio Soriente, Gene Tsudik, Ersin Uzun:
HAPADEP: Human Asisted Pure Audio Device Pairing. IACR Cryptol. ePrint Arch. 2007: 93 (2007) - [i15]Claudio Soriente, Gene Tsudik, Ersin Uzun:
BEDA: Button-Enabled Device Pairing. IACR Cryptol. ePrint Arch. 2007: 246 (2007) - 2006
- [j34]Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Secure acknowledgment aggregation and multisignatures with limited robustness. Comput. Networks 50(10): 1639-1652 (2006) - [j33]Kumar Viswanath, Katia Obraczka, Gene Tsudik:
Exploring Mesh and Tree-Based Multicast Routing Protocols for MANETs. IEEE Trans. Mob. Comput. 5(1): 28-42 (2006) - [j32]Einar Mykletun, Maithili Narasimha, Gene Tsudik:
Authentication and integrity in outsourced databases. ACM Trans. Storage 2(2): 107-138 (2006) - [c72]Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
Authentication for Paranoids: Multi-party Secret Handshakes. ACNS 2006: 325-339 - [c71]Claude Castelluccia, Einar Mykletun, Gene Tsudik:
Improving secure server performance by re-balancing SSL/TLS handshakes. AsiaCCS 2006: 26-34 - [c70]Maithili Narasimha, Gene Tsudik:
Authentication of Outsourced Databases Using Signature Aggregation and Chaining. DASFAA 2006: 420-436 - [c69]Einar Mykletun, Gene Tsudik:
Aggregation Queries in the Database-As-a-Service Model. DBSec 2006: 89-103 - [c68]Samad Nasserian, Gene Tsudik:
Revisiting Oblivious Signature-Based Envelopes. Financial Cryptography 2006: 221-235 - [c67]Xiaowei Yang, Gene Tsudik, Xin Liu:
A Technical Approach to Net Neutrality. HotNets 2006 - [c66]Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, Ersin Uzun:
Loud and Clear: Human-Verifiable Authentication Based on Audio. ICDCS 2006: 10 - [c65]Gene Tsudik:
YA-TRAP: Yet Another Trivial RFID Authentication Protocol. PerCom Workshops 2006: 640-643 - [c64]Gene Tsudik, Shouhuai Xu:
A Flexible Framework for Secret Handshakes. Privacy Enhancing Technologies 2006: 295-315 - [c63]John Solis, Gene Tsudik:
Simple and Flexible Revocation Checking with Privacy. Privacy Enhancing Technologies 2006: 351-367 - [e3]Ari Juels, Gene Tsudik, Shouhuai Xu, Moti Yung:
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006. ACM 2006, ISBN 1-59593-548-7 [contents] - [i14]Gene Tsudik:
A Family of Dunces: Trivial RFID Identification and Authentication Protocols. IACR Cryptol. ePrint Arch. 2006: 15 (2006) - [i13]John Solis, Gene Tsudik:
Simple and Flexible Private Revocation Checking. IACR Cryptol. ePrint Arch. 2006: 66 (2006) - [i12]Einar Mykletun, Gene Tsudik:
On Security of Sovereign Joins. IACR Cryptol. ePrint Arch. 2006: 380 (2006) - [i11]Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik:
Remarks on "Analysis of One Popular Group Signature Scheme" in Asiacrypt 2006. IACR Cryptol. ePrint Arch. 2006: 464 (2006) - 2005
- [j31]Kyung Hyune Rhee, Young-Ho Park, Gene Tsudik:
A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks. J. Inf. Sci. Eng. 21(2): 415-428 (2005) - [j30]Yair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton, Gene Tsudik:
Secure Spread: An Integrated Architecture for Secure Group Communication. IEEE Trans. Dependable Secur. Comput. 2(3): 248-261 (2005) - [c62]Maithili Narasimha, Gene Tsudik:
DSAC: integrity for outsourced databases with signature aggregation and chaining. CIKM 2005: 235-236 - [c61]Giuseppe Ateniese, Daniel H. Chou, Breno de Medeiros, Gene Tsudik:
Sanitizable Signatures. ESORICS 2005: 159-177 - [c60]Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi:
Efficient Node Admission for Short-lived Mobile Ad Hoc Networks. ICNP 2005: 269-278 - [c59]Claude Castelluccia, Einar Mykletun, Gene Tsudik:
E.cient Aggregation of encrypted data in Wireless Sensor Networks. MobiQuitous 2005: 109-117 - [c58]Jihye Kim, Gene Tsudik:
SRDP: Securing Route Discovery in DSR. MobiQuitous 2005: 247-260 - [c57]Gene Tsudik, Shouhuai Xu:
Brief announcement: a flexible framework for secret handshakes. PODC 2005: 39 - [e2]Refik Molva, Gene Tsudik, Dirk Westhoff:
Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3813, Springer 2005, ISBN 3-540-30912-8 [contents] - [i10]Gene Tsudik, Shouhuai Xu:
Flexible Framework for Secret Handshakes (Multi-Party Anonymous and Un-observable Authentication). IACR Cryptol. ePrint Arch. 2005: 34 (2005) - [i9]Claude Castelluccia, Einar Mykletun, Gene Tsudik:
Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes. IACR Cryptol. ePrint Arch. 2005: 37 (2005) - [i8]Samad Nasserian, Gene Tsudik:
Revisiting Oblivious Signature-Based Envelopes. IACR Cryptol. ePrint Arch. 2005: 283 (2005) - [i7]Maithili Narasimha, Gene Tsudik:
DSAC: An Approach to Ensure Integrity of Outsourced Databases using Signature Aggregation and Chaining. IACR Cryptol. ePrint Arch. 2005: 297 (2005) - [i6]Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, Ersin Uzun:
Loud and Clear: Human-Verifiable Authentication Based on Audio. IACR Cryptol. ePrint Arch. 2005: 428 (2005) - 2004
- [j29]Kyung Hyune Rhee, Youngho Park, Gene Tsudik:
An architecture for key management in hierarchical mobile ad-hoc networks. J. Commun. Networks 6(2): 156-162 (2004) - [j28]Yongdae Kim, Adrian Perrig, Gene Tsudik:
Group Key Agreement Efficient in Communication. IEEE Trans. Computers 53(7): 905-921 (2004) - [j27]Yongdae Kim, Adrian Perrig, Gene Tsudik:
Tree-based group key agreement. ACM Trans. Inf. Syst. Secur. 7(1): 60-96 (2004) - [j26]Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene Tsudik:
On the performance of group key agreement protocols. ACM Trans. Inf. Syst. Secur. 7(3): 457-488 (2004) - [j25]Dan Boneh, Xuhua Ding, Gene Tsudik:
Fine-grained control of security capabilities. ACM Trans. Internet Techn. 4(1): 60-82 (2004) - [j24]Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Gene Tsudik:
Secure Group Communication Using Robust Contributory Key Agreement. IEEE Trans. Parallel Distributed Syst. 15(5): 468-480 (2004) - [c56]Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik:
Secret Handshakes from CA-Oblivious Encryption. ASIACRYPT 2004: 293-307 - [c55]Balakrishna R. Iyer, Sharad Mehrotra, Einar Mykletun, Gene Tsudik, Yonghua Wu:
A Framework for Efficient Storage Security in RDBMS. EDBT 2004: 147-164 - [c54]Einar Mykletun, Maithili Narasimha, Gene Tsudik:
Signature Bouquets: Immutability for Aggregated/Condensed Signatures. ESORICS 2004: 160-176 - [c53]Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi:
Access control in ad hoc groups. HOT-P2P 2004: 2-7 - [c52]Xuhua Ding, Gene Tsudik, Shouhuai Xu:
Leak-Free Group Signatures with Immediate Revocation. ICDCS 2004: 608-615 - [c51]Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi:
Identity-Based Access Control for Ad Hoc Groups. ICISC 2004: 362-379 - [c50]Einar Mykletun, Maithili Narasimha, Gene Tsudik:
Authentication and Integrity in Outsourced Databases. NDSS 2004 - [c49]Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik:
Brief announcement: secret handshakes from CA-oblivious encryption. PODC 2004: 394 - [c48]Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik:
A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation. SCN 2004: 193-207 - [c47]Bijit Hore, Sharad Mehrotra, Gene Tsudik:
A Privacy-Preserving Index for Range Queries. VLDB 2004: 720-731 - [i5]Einar Mykletun, Maithili Narasimha, Gene Tsudik:
Signature Bouquets: Immutability for Aggregated/Condensed Signatures. IACR Cryptol. ePrint Arch. 2004: 91 (2004) - [i4]Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik:
Secret Handshakes from CA-Oblivious Encryption. IACR Cryptol. ePrint Arch. 2004: 133 (2004) - 2003
- [j23]Yongdae Kim, Fabio Maino, Maithili Narasimha, Kyung Hyune Rhee, Gene Tsudik:
Secure group key management for storage area networks. IEEE Commun. Mag. 41(8): 92-99 (2003) - [j22]Kemal Bicakci, Gene Tsudik, Brian Tung:
How to construct optimal one-time signatures. Comput. Networks 43(3): 339-349 (2003) - [c46]Gene Tsudik, Shouhuai Xu:
Accumulating Composites and Improved Group Signing. ASIACRYPT 2003: 269-286 - [c45]Xuhua Ding, Gene Tsudik:
Simple Identity-Based Cryptography with Mediated RSA. CT-RSA 2003: 193-210 - [c44]Yair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton, Gene Tsudik:
Scaling Secure Group Communication Systems: Beyond Peer-to-Peer. DISCEX (1) 2003: 226-237 - [c43]Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi:
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control. ICNP 2003: 336- - [c42]Yongdae Kim, Daniele Mazzocchi, Gene Tsudik:
Admission Control in Peer Groups. NCA 2003: 131-139 - [c41]Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi:
Admission control in Peer-to-Peer: design and performance evaluation. SASN 2003: 104-113 - [i3]Gene Tsudik, Shouhuai Xu:
Accumulating Composites and Improved Group Signing. IACR Cryptol. ePrint Arch. 2003: 112 (2003) - 2002
- [c40]Giuseppe Ateniese, Dawn Xiaodong Song, Gene Tsudik:
Quasi-Efficient Revocation in Group Signatures. Financial Cryptography 2002: 183-197 - [c39]Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene Tsudik:
On the Performance of Group Key Agreement Protocols. ICDCS 2002: 463-464 - [c38]Xuhua Ding, Daniele Mazzocchi, Gene Tsudik:
Experimenting with Server-Aided Signatures. NDSS 2002 - [c37]Gene Tsudik:
Weak Forward Security in Mediated RSA. SCN 2002: 45-54 - [c36]Yongdae Kim, Maithili Narasimha, Fabio Maino, Gene Tsudik:
Secure Group Services for Storage Area Networks. IEEE Security in Storage Workshop 2002: 80-93 - [i2]Yongdae Kim, Adrian Perrig, Gene Tsudik:
Tree-based Group Key Agreement. IACR Cryptol. ePrint Arch. 2002: 9 (2002) - 2001
- [j21]Katia Obraczka, Kumar Viswanath, Gene Tsudik:
Flooding for Reliable Multicast in Multi-Hop Ad Hoc Networks. Wirel. Networks 7(6): 627-634 (2001) - [c35]Yair Amir, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Yongdae Kim, Gene Tsudik:
Exploring Robustness in Group Key Agreement. ICDCS 2001: 399-408 - [c34]Katia Obraczka, Gene Tsudik, Kumar Viswanath:
Pushing the Limits of Multicast in Ad Hoc Networks. ICDCS 2001: 719-722 - [c33]Deborah A. Agarwal, Olivier Chevassut, Mary R. Thompson, Gene Tsudik:
An Integrated Solution for Secure Group Communication in Wide-Area Networks. ISCC 2001: 22-28 - [c32]Yongdae Kim, Adrian Perrig, Gene Tsudik:
Communication-Efficient Group Key Agreement. SEC 2001: 229-244 - [c31]Dan Boneh, Xuhua Ding, Gene Tsudik, Chi-Ming Wong:
A Method for Fast Revocation of Public Key Certificates and Security Capabilities. USENIX Security Symposium 2001 - [i1]Giuseppe Ateniese, Dawn Song, Gene Tsudik:
Quasi-Efficient Revocation of Group Signatures. IACR Cryptol. ePrint Arch. 2001: 101 (2001) - 2000
- [j20]Thomas Hardjono, Gene Tsudik:
IP multicast security: Issues and directions. Ann. des Télécommunications 55(7-8): 324-340 (2000) - [j19]Mihir Bellare, Juan A. Garay, Ralf C. Hauser, Amir Herzberg, Hugo Krawczyk, Michael Steiner, Gene Tsudik, Els Van Herreweghen, Michael Waidner:
Design, implementation, and deployment of the iKP secure electronic payment system. IEEE J. Sel. Areas Commun. 18(4): 611-627 (2000) - [j18]Giuseppe Ateniese, Michael Steiner, Gene Tsudik:
New multiparty authentication services and key agreement protocols. IEEE J. Sel. Areas Commun. 18(4): 628-639 (2000) - [j17]Michael Steiner, Gene Tsudik, Michael Waidner:
Key Agreement in Dynamic Peer Groups. IEEE Trans. Parallel Distributed Syst. 11(8): 769-780 (2000) - [c30]Yongdae Kim, Adrian Perrig, Gene Tsudik:
Simple and fault-tolerant key agreement for dynamic collaborative groups. CCS 2000: 235-244 - [c29]Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik:
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. CRYPTO 2000: 255-270 - [c28]Paul F. Syverson, Gene Tsudik, Michael G. Reed, Carl E. Landwehr:
Towards an Analysis of Onion Routing Security. Workshop on Design Issues in Anonymity and Unobservability 2000: 96-114 - [c27]Jonathan Robert Stanton, Yair Amir, Damian Hasse, Giuseppe Ateniese, Yongdae Kim, Cristina Nita-Rotaru, Theo Schlossnagle, John L. Schultz, Gene Tsudik:
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments. ICDCS 2000: 330-343
1990 – 1999
- 1999
- [j16]Giuseppe Ateniese, Amir Herzberg, Hugo Krawczyk, Gene Tsudik:
Untraceable mobility or how to travel incognito. Comput. Networks 31(8): 871-884 (1999) - [j15]Ralf C. Hauser, Tony Przygienda, Gene Tsudik:
Lowering security overhead in link state routing. Comput. Networks 31(8): 885-894 (1999) - [c26]Christopher Ho, Katia Obraczka, Gene Tsudik, Kumar Viswanath:
Flooding for reliable multicast in multi-hop ad hoc networks. DIAL-M 1999: 64-71 - [c25]Giuseppe Ateniese, Gene Tsudik:
Some Open Issues and New Directions in Group Signatures. Financial Cryptography 1999: 196-211 - [c24]Giuseppe Ateniese, Gene Tsudik:
Group Signatures Á la carte. SODA 1999: 848-849 - [e1]Juzar Motiwalla, Gene Tsudik:
CCS '99, Proceedings of the 6th ACM Conference on Computer and Communications Security, Singapore, November 1-4, 1999. ACM 1999, ISBN 1-58113-148-8 [contents] - 1998
- [j14]Refik Molva, Gene Tsudik:
Secret Sets and Applications. Inf. Process. Lett. 65(1): 47-55 (1998) - [c23]Giuseppe Ateniese, Michael Steiner, Gene Tsudik:
Authenticated Group Key Agreement and Friends. CCS 1998: 17-26 - [c22]Ian T. Foster, Carl Kesselman, Gene Tsudik, Steven Tuecke:
A Security Architecture for Computational Grids. CCS 1998: 83-92 - [c21]Matthew K. Franklin, Gene Tsudik:
Secure Group Barter: Multi-party Fair Exchange with Semi-Trusted Neutral Parties. Financial Cryptography 1998: 90-102 - [c20]Michael Steiner, Gene Tsudik, Michael Waidner:
CLIQUES: A New Approach to Group Key Agreement. ICDCS 1998: 380-387 - 1997
- [j13]N. Asokan, Gene Tsudik, Michael Waidner:
Server-Supported Signatures. J. Comput. Secur. 5(1): 91-108 (1997) - [j12]James P. Gray, Ajay D. Kshemkalyani, Stephen M. Matyas, Mohammad Peyravian, Gene Tsudik:
ATM cell encryption and key update synchronization. Telecommun. Syst. 7(4): 391-408 (1997) - [c19]Philippe A. Janson, Gene Tsudik, Moti Yung:
Scalability and Flexibility in Authentication Services: The KryptoKnight Approach. INFOCOM 1997: 725-736 - [c18]Ralf C. Hauser, Tony Przygienda, Gene Tsudik:
Reducing the Cost of Security in Link-State Routing. NDSS 1997: 93-101 - 1996
- [j11]Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen:
Robust and Secure Password and Key Change Method. J. Comput. Secur. 4(1): 97-112 (1996) - [c17]Michael Steiner, Gene Tsudik, Michael Waidner:
Diffie-Hellman Key Distribution Extended to Group Communication. CCS 1996: 31-37 - [c16]N. Asokan, Gene Tsudik, Michael Waidner:
Server-Supported Signatures. ESORICS 1996: 131-143 - [c15]Stefano Zatti, Refik Molva, Angelo Tosi, Gene Tsudik, Helmut Kurth:
Limitations of the Approach of Solving a Network's Security Problem with a Firewall. ESORICS 1996: 144-145 - [c14]Ceki Gülcü, Gene Tsudik:
Mixing Email with Babel. NDSS 1996: 2-16 - 1995
- [j10]Philippe A. Janson, Gene Tsudik:
Secure and minimal protocols for authenticated key distribution. Comput. Commun. 18(9): 645-653 (1995) - [j9]Michael Steiner, Gene Tsudik, Michael Waidner:
Refinement and Extension of Encrypted Key Exchange. ACM SIGOPS Oper. Syst. Rev. 29(3): 22-30 (1995) - [j8]David M. Chess, Benjamin N. Grosof, Colin G. Harrison, David W. Levine, Colin Parris, Gene Tsudik:
Itinerant agents for mobile computing. IEEE Wirel. Commun. 2(5): 34-49 (1995) - [c13]Mihir Bellare, Amir Herzberg, Michael Steiner, Gene Tsudik, Michael Waidner, Ralf C. Hauser, Juan A. Garay:
iKP - A Family of Secure Electronic Payment Protocols. USENIX Workshop on Electronic Commerce 1995 - 1994
- [j7]Refik Molva, Didier Samfat, Gene Tsudik:
Authentication of mobile users. IEEE Netw. 8(2): 26-34 (1994) - [c12]Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen:
Robust and Secure Password and Key Change Method. ESORICS 1994: 107-122 - [c11]Amir Herzberg, Hugo Krawczyk, Gene Tsudik:
On Travelling Incognito. WMCSA 1994: 205-211 - 1993
- [j6]Deborah Estrin, Martha Steenstrup, Gene Tsudik:
A protocol for route establishment and packet forwarding across multidomain internets. IEEE/ACM Trans. Netw. 1(1): 56-70 (1993) - [c10]Gene Tsudik, Els Van Herreweghen:
On Simple and Secure Key Distribution. CCS 1993: 49-57 - [c9]Refik Molva, Gene Tsudik:
Authentication method with impersonal token cards. S&P 1993: 56-65 - [c8]Gene Tsudik, Els Van Herreweghen:
Some Remarks on Protecting Weak Keys and Poorly-Chosen Secrets from Guessing Attacks. SRDS 1993: 136-142 - 1992
- [j5]Gene Tsudik:
Message authentication with one-way hash functions. Comput. Commun. Rev. 22(5): 29-38 (1992) - [c7]Refik Molva, Gene Tsudik, Els Van Herreweghen, Stefano Zatti:
KryptoKnight Authentication and Key Distribution System. ESORICS 1992: 155-174 - [c6]Gene Tsudik:
Policy Enforcement in Stub Autonomous Domains. ESORICS 1992: 229-257 - [c5]Gene Tsudik:
Message Authentication with One-Way Hash Functions. INFOCOM 1992: 2055-2059 - 1991
- [j4]Deborah Estrin, Gene Tsudik:
Secure Control of Transit Internetwork Traffic. Comput. Networks ISDN Syst. 22(5): 363-382 (1991) - 1990
- [c4]Gene Tsudik, Rita C. Summers:
AudES - An Expert System for Security Auditing. IAAI 1990: 221-232
1980 – 1989
- 1989
- [j3]Deborah Estrin, Jeffrey C. Mogul, Gene Tsudik:
Visa protocols for controlling interorganizational datagram flow. IEEE J. Sel. Areas Commun. 7(4): 486-498 (1989) - [j2]Gene Tsudik:
Datagram authentication in internet gateways: implications of fragmentation and dynamic routing. IEEE J. Sel. Areas Commun. 7(4): 499-504 (1989) - [c3]Deborah Estrin, Gene Tsudik:
Secure Policy Enforcement in Internetworks. Distributed Computing And Cryptography 1989: 127-154 - [c2]Deborah Estrin, Gene Tsudik:
Security Issues in Policy Routing. S&P 1989: 183-193 - 1988
- [j1]Gene Tsudik:
Implications of fragmentation dynamic routing for internet datagram authentication. Comput. Commun. Rev. 18(1-2): 22-30 (1988) - 1987
- [c1]Deborah Estrin, Gene Tsudik:
Visa Scheme for Inter-Organization Network Security. S&P 1987: 174-183
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-13 02:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint