Gene Tsudik

According to our database1, Gene Tsudik authored at least 300 papers between 1987 and 2019.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2014, "For contributions to Internet security and privacy.".

IEEE Fellow

IEEE Fellow 2013, "For contributions to distributed systems security and privacy".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
In Content We Trust: Network-Layer Trust in Content-Centric Networking.
IEEE/ACM Trans. Netw., 2019

Remote Attestation via Self-Measurement.
ACM Trans. Design Autom. Electr. Syst., 2019

Privacy-Aware Caching in Information-Centric Networking.
IEEE Trans. Dependable Sec. Comput., 2019

PDoT: Private DNS-over-TLS with TEE Support.
CoRR, 2019

A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise.
CoRR, 2019

PILOT: Password and PIN Information Leakage from Obfuscated Typing Videos.
CoRR, 2019

MTRA: Multi-Tier randomized remote attestation in IoT networks.
Computers & Security, 2019

Balancing Security and Privacy in Genomic Range Queries.
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019

Advancing remote attestation via computer-aided formal verification of designs and synthesis of executables: opinion.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

VRASED: A Verified Hardware/Software Co-Design for Remote Attestation.
Proceedings of the 28th USENIX Security Symposium, 2019

Towards Systematic Design of Collective Remote Attestation Protocols.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

HEALED: HEaling & Attestation for Low-End Embedded Devices.
Proceedings of the Financial Cryptography and Data Security, 2019

Thermanator: Thermal Residue-Based Post Factum Attacks on Keyboard Data Entry.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices.
IEEE Trans. on CAD of Integrated Circuits and Systems, 2018

Formally Verified Hardware/Software Co-Design for Remote Attestation.
CoRR, 2018

Thermanator: Thermal Residue-Based Post Factum Attacks On Keyboard Password Entry.
CoRR, 2018

KRB-CCN: Lightweight Authentication & Access Control for Private Content-Centric Networks.
CoRR, 2018

Security and Privacy Analysis of National Science Foundation Future Internet Architectures.
IEEE Communications Surveys and Tutorials, 2018

Initializing trust in smart devices via presence attestation.
Computer Communications, 2018

US-AID: Unattended Scalable Attestation of IoT Devices.
Proceedings of the 37th IEEE Symposium on Reliable Distributed Systems, 2018

Content-Centric and Named-Data Networking Security: The Good, The Bad and The Rest.
Proceedings of the 2018 IEEE International Symposium on Local and Metropolitan Area Networks, 2018

Remote attestation of IoT devices via SMARM: Shuffled measurements against roving malware.
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018

SILK-TV: Secret Information Leakage from Keystroke Timing Videos.
Proceedings of the Computer Security, 2018

Reconciling remote attestation and safety-critical operation on simple IoT devices.
Proceedings of the 55th Annual Design Automation Conference, 2018

Temporal Consistency of Integrity-Ensuring Computations and Applications to Embedded Systems Security.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

KRB-CCN: Lightweight Authentication and Access Control for Private Content-Centric Networks.
Proceedings of the Applied Cryptography and Network Security, 2018

Assentication: User De-authentication and Lunchtime Attack Mitigation with Seated Posture Biometric.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
Pulse-Response: Exploring Human Body Impedance for Biometric Recognition.
ACM Trans. Priv. Secur., 2017

Genomic Security (Lest We Forget).
IEEE Security & Privacy, 2017

An Exploration of the Effects of Sensory Stimuli on the Completion of Security Tasks.
IEEE Security & Privacy, 2017

Probabilistic and Considerate Attestation of IoT Devices against Roving Malware.
IACR Cryptology ePrint Archive, 2017

Assentication: User Deauthentication and Lunchtime Attack Mitigation with Seated Posture Biometric.
CoRR, 2017

HYDRA: HYbrid Design for Remote Attestation (Using a Formally Verified Microkernel).
CoRR, 2017

ERASMUS: Efficient Remote Attestation via Self- Measurement for Unattended Settings.
CoRR, 2017

Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks.
CoRR, 2017

Can We Make a Cake and Eat it Too? A Discussion of ICN Security and Privacy.
Computer Communication Review, 2017

Authentication using pulse-response biometrics.
Commun. ACM, 2017

Private Set Projections & Variants.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

HYDRA: hybrid design for remote attestation (using a formally verified microkernel).
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Ditio: Trustworthy Auditing of Sensor Activities in Mobile & IoT Devices.
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 2017

Namespace Tunnels in Content-Centric Networks.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

Mitigating On-Path Adversaries in Content-Centric Networks.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

Closing the Floodgate with Stateless Content-Centric Networking.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

FUsing Hybrid Remote Attestation with a Formally Verified Microkernel: Lessons Learned.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017

MTRA: Multiple-tier remote attestation in IoT networks.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Presence Attestation: The Missing Link in Dynamic Trust Bootstrapping.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

Security in Personal Genomics: Lest We Forget.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Lightweight Swarm Attestation: A Tale of Two LISA-s.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

When encryption is not enough: privacy attacks in content-centric networking.
Proceedings of the 4th ACM Conference on Information-Centric Networking, 2017

2016
Private Projections & Variants.
IACR Cryptology ePrint Archive, 2016

Bounded Size-Hiding Private Set Intersection.
IACR Cryptology ePrint Archive, 2016

Information-centric Networking and Security (Dagstuhl Seminar 16251).
Dagstuhl Reports, 2016

FADEWICH: Fast Deauthentication over the Wireless Channel.
CoRR, 2016

Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP.
CoRR, 2016

Security and Privacy Analysis of NSF Future Internet Architectures.
CoRR, 2016

C-FLAT: Control-FLow ATtestation for Embedded Systems Software.
CoRR, 2016

Generating Secret Keys from Biometric Body Impedance Measurements.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

(The Futility of) Data Privacy in Content-Centric Networking.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

DARPA: Device Attestation Resilient to Physical Attacks.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Practical accounting in content-centric networking.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Remote attestation for low-end embedded devices: the prover's perspective.
Proceedings of the 53rd Annual Design Automation Conference, 2016

Invited - Things, trouble, trust: on building trust in IoT systems.
Proceedings of the 53rd Annual Design Automation Conference, 2016

AC3N: Anonymous communication in Content-Centric Networking.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

Network Names in Content-Centric Networking.
Proceedings of the 3rd ACM Conference on Information-Centric Networking, 2016

Trilateral Large-Scale OSN Account Linkability Study.
Proceedings of the 2016 AAAI Fall Symposia, Arlington, Virginia, USA, November 17-19, 2016, 2016

2015
Genomic Privacy (Dagstuhl Seminar 15431).
Dagstuhl Reports, 2015

Practical Accounting in Content-Centric Networking (extended version).
CoRR, 2015

BEAD: Best Effort Autonomous Deletion in Content-Centric Networking.
CoRR, 2015

Living in a PIT-less World: A Case Against Stateful Forwarding in Content-Centric Networking.
CoRR, 2015

Interest-Based Access Control for Content Centric Networks (extended version).
CoRR, 2015

To NACK or not to NACK? Negative Acknowledgments in Information-Centric Networking.
CoRR, 2015

Trilateral Large-Scale OSN Account Linkability Study.
CoRR, 2015

Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare?
IEEE Computer, 2015

UnLinked: Private Proximity-based Off-line OSN Interaction.
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 2015

Secure Fragmentation for Content-Centric Networks.
Proceedings of the 14th IEEE International Symposium on Network Computing and Applications, 2015

SEDA: Scalable Embedded Device Attestation.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking.
Proceedings of the Applied Cryptography and Network Security, 2015

Interest-Based Access Control for Content Centric Networks.
Proceedings of the 2nd International Conference on Information-Centric Networking, 2015

2014
Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints.
IEEE Trans. Information Forensics and Security, 2014

Fighting Authorship Linkability with Crowdsourcing.
CoRR, 2014

Are 140 Characters Enough? A Large-Scale Linkability Study of Tweets.
CoRR, 2014

User Errors in the Performance of Security Critical Tasks in the Context of Adversarial Noise.
CoRR, 2014

Elements of Trust in Named-Data Networking.
CoRR, 2014

Secure Fragmentation for Content-Centric Networks.
CoRR, 2014

Optimizing bi-directional low-latency communication in named data networking.
Computer Communication Review, 2014

Network-Layer Trust in Named-Data Networking.
Computer Communication Review, 2014

Stylometric Linkability of Tweets.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Secure Sensing over Named Data Networking.
Proceedings of the 2014 IEEE 13th International Symposium on Network Computing and Applications, 2014

A minimalist approach to Remote Attestation.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

Challenges in Remote Attestation of Low-End Embedded Devices.
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, 2014

2013
United We Stand: Intrusion Resilience in Mobile Unattended WSNs.
IEEE Trans. Mob. Comput., 2013

Can Jannie verify? Usability of display-equipped RFID tags for security purposes.
Journal of Computer Security, 2013

Genomic Privacy (Dagstuhl Seminar 13412).
Dagstuhl Reports, 2013

Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data Networking
CoRR, 2013

The Chills and Thrills of Whole Genome Sequencing.
CoRR, 2013

Covert Ephemeral Communication in Named Data Networking.
CoRR, 2013

Secure genomic testing with size- and position-hiding private substring matching.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

Cache Privacy in Named-Data Networking.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

Privacy-Preserving Matching of Community-Contributed Content.
Proceedings of the Computer Security - ESORICS 2013, 2013

2012
Self-healing in unattended wireless sensor networks.
TOSN, 2012

Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber-physical convergence.
Pervasive and Mobile Computing, 2012

Reducing RFID reader load with the meet-in-the-middle strategy.
Journal of Communications and Networks, 2012

Harvesting SSL Certificate Data to Identify Web-Fraud.
I. J. Network Security, 2012

Systematic Treatment of Remote Attestation.
IACR Cryptology ePrint Archive, 2012

On the performance of certain Private Set Intersection protocols. (And some remarks on the recent paper by Huang et al. in NDSS'12).
IACR Cryptology ePrint Archive, 2012

Tweeting with Hummingbird: Privacy in Large-Scale Micro-Blogging OSNs.
IEEE Data Eng. Bull., 2012

Privacy-Oriented Cryptography (Dagstuhl Seminar 12381).
Dagstuhl Reports, 2012

Securing Instrumented Environments over Content-Centric Networking: the Case of Lighting Control
CoRR, 2012

DoS and DDoS in Named-Data Networking
CoRR, 2012

Genodroid: are privacy-preserving genomic tests ready for prime time?
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012

Experimenting with Fast Private Set Intersection.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Exploring Linkability of User Reviews.
Proceedings of the Computer Security - ESORICS 2012, 2012

Fast and Private Computation of Cardinality of Set Intersection and Union.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

Private Computation of Spatial and Temporal Power Consumption with Smart Meters.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Flexible Robust Group Key Agreement.
IEEE Trans. Parallel Distrib. Syst., 2011

ALARM: Anonymous Location-Aided Routing in Suspicious MANETs.
IEEE Trans. Mob. Comput., 2011

Intrusion-resilient integrity in data-centric unattended WSNs.
Pervasive and Mobile Computing, 2011

Privacy-Preserving Location-Based On-Demand Routing in MANETs.
IEEE Journal on Selected Areas in Communications, 2011

Privacy-Preserving Cloud Database Querying.
J. Internet Serv. Inf. Secur., 2011

User-aided reader revocation in PKI-based RFID systems.
Journal of Computer Security, 2011

Enhancing Data Privacy in the Cloud.
IACR Cryptology ePrint Archive, 2011

Hummingbird: Privacy at the time of Twitter.
IACR Cryptology ePrint Archive, 2011

Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information.
IACR Cryptology ePrint Archive, 2011

Fast and Private Computation of Set Intersection Cardinality.
IACR Cryptology ePrint Archive, 2011

ANDaNA: Anonymous Named Data Networking Application
CoRR, 2011

Exploring Linkablility of Community Reviewing
CoRR, 2011

Countering Gattaca: Efficient and Secure Testing of Fully-Sequenced Human Genomes
CoRR, 2011

Message from the workshop chairs.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Group Distance Bounding Protocols - (Short Paper).
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

Usability of Display-Equipped RFID Tags for Security Purposes.
Proceedings of the Computer Security - ESORICS 2011, 2011

2010
Security and privacy in emerging wireless networks.
IEEE Wireless Commun., 2010

Privacy-Preserving Sharing of Sensitive Information.
IEEE Security & Privacy, 2010

Secure Code Update for Embedded Devices via Proofs of Secure Erasure.
IACR Cryptology ePrint Archive, 2010

Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model.
IACR Cryptology ePrint Archive, 2010

(If) Size Matters: Size-Hiding Private Set Intersection.
IACR Cryptology ePrint Archive, 2010

GDB: Group Distance Bounding Protocols
CoRR, 2010

Securing Mobile Unattended WSNs against a Mobile Adversary.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

Taming Big Brother Ambitions: More Privacy for Secret Handshakes.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

Some Security Topics with Possible Applications for Pairing-Based Cryptography.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010

Towards Plugging Privacy Leaks in the Domain Name System.
Proceedings of the IEEE Tenth International Conference on Peer-to-Peer Computing, 2010

Intrusion-Resilience in Mobile Unattended WSNs.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

IRRES: Intrusion-Resilient Remote Email Storage.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

Groupthink: usability of secure group association for wireless devices.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Practical Private Set Intersection Protocols with Linear Complexity.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Affiliation-Hiding Key Exchange with Untrusted Group Authorities.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs.
IEEE Trans. Parallel Distrib. Syst., 2009

Efficient and provably secure aggregation of encrypted data in wireless sensor networks.
TOSN, 2009

A new approach to secure logging.
TOS, 2009

Universally Composable RFID Identification and Authentication Protocols.
ACM Trans. Inf. Syst. Secur., 2009

Data Security in Unattended Wireless Sensor Networks.
IEEE Trans. Computers, 2009

A comparative study of secure device pairing methods.
Pervasive and Mobile Computing, 2009

New adversary and new threats: security in unattended sensor networks.
IEEE Network, 2009

Leak-free mediated group signatures.
Journal of Computer Security, 2009

Secure pairing of interface constrained devices.
IJSN, 2009

Using audio in secure device pairing.
IJSN, 2009

Privacy-preserving revocation checking.
Int. J. Inf. Sec., 2009

Remarks on ''Analysis of one popular group signature scheme'' in Asiacrypt 2006.
IJACT, 2009

Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems.
IACR Cryptology ePrint Archive, 2009

Practical Private Set Intersection Protocols with Linear Computational and Bandwidth Complexity.
IACR Cryptology ePrint Archive, 2009

Towards Plugging Privacy Leaks in Domain Name System
CoRR, 2009

Harvesting SSL Certificate Data to Mitigate Web-Fraud
CoRR, 2009

Privacy-Preserving Querying in Sensor Networks
CoRR, 2009

Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks.
Ad Hoc Networks, 2009

SRDP: Secure route discovery for dynamic source routing in MANETs.
Ad Hoc Networks, 2009

Collaborative authentication in unattended WSNs.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Serial hook-ups: a comparative usability study of secure device pairing methods.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Privacy-Preserving Policy-Based Information Transfer.
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009

Caveat Emptor: A Comparative Study of Secure Device Pairing Methods.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

Logging key assurance indicators in business processes.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Editorial.
ACM Trans. Inf. Syst. Secur., 2008

Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary.
IACR Cryptology ePrint Archive, 2008

DISH: Distributed Self-Healing in Unattended Sensor Networks.
IACR Cryptology ePrint Archive, 2008

Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks.
IACR Cryptology ePrint Archive, 2008

Scalable and Efficient Provable Data Possession.
IACR Cryptology ePrint Archive, 2008

RFID security and privacy: long-term research or short-term tinkering?
Proceedings of the First ACM Conference on Wireless Network Security, 2008

DISH: Distributed Self-Healing.
Proceedings of the Stabilization, 2008

POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks.
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008

Catch Me (If You Can): Data Survival in Unattended Sensor Networks.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

HAPADEP: Human-Assisted Pure Audio Device Pairing.
Proceedings of the Information Security, 11th International Conference, 2008

PRISM: Privacy-friendly routing in suspicious MANETs (and VANETs).
Proceedings of the 16th annual IEEE International Conference on Network Protocols, 2008

Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange.
Proceedings of the Topics in Cryptology, 2008

Confronting a mobile adversary in unattended sensor networks.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

Security and privacy in unattended sensor networks.
Proceedings of the AINTEC '08, 2008

2007
Equipping smart devices with public key signatures.
ACM Trans. Internet Techn., 2007

Correction to "Exploring Mesh and Tree-Based Multicast Routing Protocols for MANETs".
IEEE Trans. Mob. Comput., 2007

BEDA: Button-Enabled Device Pairing.
IACR Cryptology ePrint Archive, 2007

HAPADEP: Human Asisted Pure Audio Device Pairing.
IACR Cryptology ePrint Archive, 2007

Forward-Secure Sequential Aggregate Authentication.
IACR Cryptology ePrint Archive, 2007

Threshold cryptography in P2P and MANETs: The case of access control.
Computer Networks, 2007

Extended Abstract: Forward-Secure Sequential Aggregate Authentication.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Privacy-Preserving Revocation Checking with Modified CRLs.
Proceedings of the Public Key Infrastructure, 2007

Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement.
Proceedings of the Topics in Cryptology, 2007

Robust group key agreement using short broadcasts.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Authentication and integrity in outsourced databases.
TOS, 2006

Exploring Mesh and Tree-Based Multicast Routing Protocols for MANETs.
IEEE Trans. Mob. Comput., 2006

A Family of Dunces: Trivial RFID Identification and Authentication Protocols.
IACR Cryptology ePrint Archive, 2006

Simple and Flexible Private Revocation Checking.
IACR Cryptology ePrint Archive, 2006

On Security of Sovereign Joins.
IACR Cryptology ePrint Archive, 2006

Secure acknowledgment aggregation and multisignatures with limited robustness.
Computer Networks, 2006

A Flexible Framework for Secret Handshakes.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

Simple and Flexible Revocation Checking with Privacy.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

YA-TRAP: Yet Another Trivial RFID Authentication Protocol.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

A Technical Approach to Net Neutrality.
Proceedings of the 5th ACM Workshop on Hot Topics in Networks, 2006

Aggregation Queries in the Database-As-a-Service Model.
Proceedings of the Data and Applications Security XX, 2006

Authentication of Outsourced Databases Using Signature Aggregation and Chaining.
Proceedings of the Database Systems for Advanced Applications, 2006

Authentication for Paranoids: Multi-party Secret Handshakes.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Secure Spread: An Integrated Architecture for Secure Group Communication.
IEEE Trans. Dependable Sec. Comput., 2005

A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks.
J. Inf. Sci. Eng., 2005

Flexible Framework for Secret Handshakes (Multi-Party Anonymous and Un-observable Authentication).
IACR Cryptology ePrint Archive, 2005

Revisiting Oblivious Signature-Based Envelopes.
IACR Cryptology ePrint Archive, 2005

DSAC: An Approach to Ensure Integrity of Outsourced Databases using Signature Aggregation and Chaining.
IACR Cryptology ePrint Archive, 2005

Loud and Clear: Human-Verifiable Authentication Based on Audio.
IACR Cryptology ePrint Archive, 2005

Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes.
IACR Cryptology ePrint Archive, 2005

Brief announcement: a flexible framework for secret handshakes.
Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, 2005

SRDP: Securing Route Discovery in DSR.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

E.cient Aggregation of encrypted data in Wireless Sensor Networks.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

Efficient Node Admission for Short-lived Mobile Ad Hoc Networks.
Proceedings of the 13th IEEE International Conference on Network Protocols (ICNP 2005), 2005

Sanitizable Signatures.
Proceedings of the Computer Security, 2005

DSAC: integrity for outsourced databases with signature aggregation and chaining.
Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31, 2005

2004
Secure Group Communication Using Robust Contributory Key Agreement.
IEEE Trans. Parallel Distrib. Syst., 2004

Fine-grained control of security capabilities.
ACM Trans. Internet Techn., 2004

Tree-based group key agreement.
ACM Trans. Inf. Syst. Secur., 2004

On the performance of group key agreement protocols.
ACM Trans. Inf. Syst. Secur., 2004

Group Key Agreement Efficient in Communication.
IEEE Trans. Computers, 2004

An architecture for key management in hierarchical mobile ad-hoc networks.
Journal of Communications and Networks, 2004

Signature Bouquets: Immutability for Aggregated/Condensed Signatures.
IACR Cryptology ePrint Archive, 2004

Secret Handshakes from CA-Oblivious Encryption.
IACR Cryptology ePrint Archive, 2004

A Privacy-Preserving Index for Range Queries.
Proceedings of the (e)Proceedings of the Thirtieth International Conference on Very Large Data Bases, VLDB 2004, Toronto, Canada, August 31, 2004

A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004

Brief announcement: secret handshakes from CA-oblivious encryption.
Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, 2004

Identity-Based Access Control for Ad Hoc Groups.
Proceedings of the Information Security and Cryptology, 2004

Leak-Free Group Signatures with Immediate Revocation.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

Access control in ad hoc groups.
Proceedings of the International Workshop on Hot Topics in Peer-to-Peer Systems, 2004

A Framework for Efficient Storage Security in RDBMS.
Proceedings of the Advances in Database Technology, 2004

2003
Accumulating Composites and Improved Group Signing.
IACR Cryptology ePrint Archive, 2003

How to construct optimal one-time signatures.
Computer Networks, 2003

Secure group key management for storage area networks.
IEEE Communications Magazine, 2003

Admission control in Peer-to-Peer: design and performance evaluation.
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003

Admission Control in Peer Groups.
Proceedings of the 2nd IEEE International Symposium on Network Computing and Applications (NCA 2003), 2003

On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control.
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003), 2003

Scaling Secure Group Communication Systems: Beyond Peer-to-Peer.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

Simple Identity-Based Cryptography with Mediated RSA.
Proceedings of the Topics in Cryptology, 2003

2002
Secure Group Services for Storage Area Networks.
Proceedings of the First International IEEE Security in Storage Workshop, 2002

Weak Forward Security in Mediated RSA.
Proceedings of the Security in Communication Networks, Third International Conference, 2002

Experimenting with Server-Aided Signatures.
Proceedings of the Network and Distributed System Security Symposium, 2002

Quasi-Efficient Revocation in Group Signatures.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

2001
Flooding for Reliable Multicast in Multi-Hop Ad Hoc Networks.
Wireless Networks, 2001

Quasi-Efficient Revocation of Group Signatures.
IACR Cryptology ePrint Archive, 2001

A Method for Fast Revocation of Public Key Certificates and Security Capabilities.
Proceedings of the 10th USENIX Security Symposium, 2001

Communication-Efficient Group Key Agreement.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

An Integrated Solution for Secure Group Communication in Wide-Area Networks.
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001

Pushing the Limits of Multicast in Ad Hoc Networks.
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001

Exploring Robustness in Group Key Agreement.
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001

2000
Key Agreement in Dynamic Peer Groups.
IEEE Trans. Parallel Distrib. Syst., 2000

Design, implementation, and deployment of the iKP secure electronic payment system.
IEEE Journal on Selected Areas in Communications, 2000

New multiparty authentication services and key agreement protocols.
IEEE Journal on Selected Areas in Communications, 2000

IP multicast security: Issues and directions.
Annales des Télécommunications, 2000

Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000

Towards an Analysis of Onion Routing Security.
Proceedings of the Designing Privacy Enhancing Technologies, 2000

A Practical and Provably Secure Coalition-Resistant Group Signature Scheme.
Proceedings of the Advances in Cryptology, 2000

Simple and fault-tolerant key agreement for dynamic collaborative groups.
Proceedings of the CCS 2000, 2000

1999
Lowering security overhead in link state routing.
Computer Networks, 1999

Untraceable mobility or how to travel incognito.
Computer Networks, 1999

Group Signatures Á la carte.
Proceedings of the Tenth Annual ACM-SIAM Symposium on Discrete Algorithms, 1999

Some Open Issues and New Directions in Group Signatures.
Proceedings of the Financial Cryptography, 1999

Flooding for reliable multicast in multi-hop ad hoc networks.
Proceedings of the 3rd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIAL-M 1999), 1999

1998
Secret Sets and Applications.
Inf. Process. Lett., 1998

CLIQUES: A New Approach to Group Key Agreement.
Proceedings of the 18th International Conference on Distributed Computing Systems, 1998

Secure Group Barter: Multi-party Fair Exchange with Semi-Trusted Neutral Parties.
Proceedings of the Financial Cryptography, 1998

A Security Architecture for Computational Grids.
Proceedings of the CCS '98, 1998

Authenticated Group Key Agreement and Friends.
Proceedings of the CCS '98, 1998

1997
ATM cell encryption and key update synchronization.
Telecommunication Systems, 1997

Server-Supported Signatures.
Journal of Computer Security, 1997

Reducing the Cost of Security in Link-State Routing.
Proceedings of the Network and Distributed System Security Symposium, 1997

Scalability and Flexibility in Authentication Services: The KryptoKnight Approach.
Proceedings of the Proceedings IEEE INFOCOM '97, 1997

1996
Robust and Secure Password and Key Change Method.
Journal of Computer Security, 1996

Mixing Email with Babel.
Proceedings of the 1996 Symposium on Network and Distributed System Security, 1996

Limitations of the Approach of Solving a Network's Security Problem with a Firewall.
Proceedings of the Computer Security, 1996

Diffie-Hellman Key Distribution Extended to Group Communication.
Proceedings of the CCS '96, 1996

1995
Itinerant agents for mobile computing.
IEEE Personal Commun., 1995

Refinement and Extension of Encrypted Key Exchange.
Operating Systems Review, 1995

Secure and minimal protocols for authenticated key distribution.
Computer Communications, 1995

iKP - A Family of Secure Electronic Payment Protocols.
Proceedings of the First USENIX Workshop on Electronic Commerce, 1995

1994
On Travelling Incognito.
Proceedings of the First Workshop on Mobile Computing Systems and Applications, 1994

1993
A protocol for route establishment and packet forwarding across multidomain internets.
IEEE/ACM Trans. Netw., 1993

Some Remarks on Protecting Weak Keys and Poorly-Chosen Secrets from Guessing Attacks.
Proceedings of the 12th Symposium on Reliable Distributed Systems, 1993

Authentication method with impersonal token cards.
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993

On Simple and Secure Key Distribution.
Proceedings of the CCS '93, 1993

1992
Message authentication with one-way hash functions.
Computer Communication Review, 1992

Policy Enforcement in Stub Autonomous Domains.
Proceedings of the Computer Security, 1992

KryptoKnight Authentication and Key Distribution System.
Proceedings of the Computer Security, 1992

1991
Secure Control of Transit Internetwork Traffic.
Computer Networks and ISDN Systems, 1991

1990
AudES - An Expert System for Security Auditing.
Proceedings of the The Second Conference on Innovative Applications of Artificial Intelligence (IAAI-90), 1990

1989
Datagram authentication in internet gateways: implications of fragmentation and dynamic routing.
IEEE Journal on Selected Areas in Communications, 1989

Visa protocols for controlling interorganizational datagram flow.
IEEE Journal on Selected Areas in Communications, 1989

Security Issues in Policy Routing.
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989

Secure Policy Enforcement in Internetworks.
Proceedings of the Distributed Computing And Cryptography, 1989

1987
Visa Scheme for Inter-Organization Network Security.
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987


  Loading...