Gene Tsudik
Computer scientist
Gene Tsudik's AcademicInfluence.com Rankings
Download Badge
Computer Science
Gene Tsudik's Degrees
- PhD Computer Science University of Southern California
- Masters Computer Science University of Southern California
- Bachelors Computer Science University of Southern California
Similar Degrees You Can Earn
Why Is Gene Tsudik Influential?
(Suggest an Edit or Addition)According to Wikipedia, Gene Tsudik is a Distinguished Professor of Computer Science at the University of California, Irvine . He obtained his PhD in Computer Science from USC in 1991. His PhD advisor was Deborah Estrin. Before coming to UCI in 2000, he was at IBM Zurich Research Laboratory and USC/ISI . His research interests included many topics in security and applied cryptography. Gene Tsudik is a Fulbright Scholar, Fulbright Specialist , a fellow of ACM, IEEE, AAAS and IFIP as well as a foreign member of Academia Europaea. From 2009 to 2015 he served as Editor-in-Chief of ACM Transactions on Information and Systems Security , which was renamed in 2016 to ACM Transactions on Privacy and Security : http://tops.acm.org
Gene Tsudik's Published Works
Published Works
- A security architecture for computational grids (1998) (1444)
- Scalable and efficient provable data possession (2008) (1444)
- Named Data Networking (NDN) Project (2010) (966)
- A Practical and Provably Secure Coalition-Resistant Group Signature Scheme (2000) (890)
- Diffie-Hellman key distribution extended to group communication (1996) (824)
- Key Agreement in Dynamic Peer Groups (2000) (668)
- Efficient aggregation of encrypted data in wireless sensor networks (2005) (620)
- Tree-based group key agreement (2004) (556)
- Simple and fault-tolerant key agreement for dynamic collaborative groups (2000) (543)
- A Privacy-Preserving Index for Range Queries (2004) (507)
- Authentication and integrity in outsourced databases (2006) (474)
- Flooding for Reliable Multicast in Multi-Hop Ad Hoc Networks (1999) (458)
- Itinerant Agents for Mobile Computing (1995) (434)
- Towards an Analysis of Onion Routing Security (2000) (389)
- Practical Private Set Intersection Protocols with Linear Complexity (2010) (375)
- CLIQUES: a new approach to group key agreement (1998) (375)
- Mixing E-mail with Babel (1996) (354)
- Efficient and provably secure aggregation of encrypted data in wireless sensor networks (2009) (338)
- YA-TRAP: yet another trivial RFID authentication protocol (2006) (333)
- New multiparty authentication services and key agreement protocols (2000) (328)
- Message authentication with one-way hash functions (1992) (322)
- Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber-physical convergence (2012) (299)
- Refinement and extension of encrypted key exchange (1995) (298)
- SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust (2012) (285)
- A Method for Fast Revocation of Public Key Certificates and Security Capabilities (2001) (272)
- Loud and Clear: Human-Verifiable Authentication Based on Audio (2006) (271)
- DoS and DDoS in Named Data Networking (2012) (269)
- ALARM: Anonymous Location-Aided Routing in Suspicious MANETs (2007) (259)
- Quasi-Efficient Revocation in Group Signatures (2002) (247)
- Countering GATTACA: efficient and secure testing of fully-sequenced human genomes (2011) (242)
- Communication-Efficient Group Key Agreement (2001) (235)
- Sanitizable Signatures (2005) (225)
- A new approach to secure logging (2008) (219)
- Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking (2013) (217)
- C-FLAT: Control-Flow Attestation for Embedded Systems Software (2016) (215)
- Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model (2010) (205)
- Some Open Issues and New Directions in Group Signatures (1999) (205)
- Authenticated group key agreement and friends (1998) (197)
- On the performance of group key agreement protocols (2002) (197)
- iKP - A Family of Secure Electronic Payment Protocols (1995) (197)
- Fast and Private Computation of Cardinality of Set Intersection and Union (2012) (194)
- Private Computation of Spatial and Temporal Power Consumption with Smart Meters (2012) (193)
- Group key agreement efficient in communication (2004) (192)
- Security Issues in a Future Vehicular Network (2002) (190)
- SEDA: Scalable Embedded Device Attestation (2015) (188)
- Design, implementation, and deployment of the iKP secure electronic payment system (2000) (175)
- Caveat eptor: A comparative study of secure device pairing methods (2009) (168)
- Authentication of Outsourced Databases Using Signature Aggregation and Chaining (2006) (166)
- Exploring mesh and tree-based multicast. Routing protocols for MANETs (2006) (160)
- Authentication of mobile users (1994) (153)
- Privacy-Preserving Location-Based On-Demand Routing in MANETs (2011) (151)
- On the utility of distributed cryptography in P2P and MANETs: the case of membership control (2003) (147)
- Secure group communication using robust contributory key agreement (2004) (145)
- ANDaNA: Anonymous Named Data Networking Application (2011) (144)
- HAPADEP: Human-Assisted Pure Audio Device Pairing (2008) (144)
- Hummingbird: Privacy at the Time of Twitter (2012) (140)
- Public Key Cryptography – PKC 2009 (2009) (136)
- Catch Me (If You Can): Data Survival in Unattended Sensor Networks (2008) (135)
- A minimalist approach to Remote Attestation (2014) (130)
- Secret Handshakes from CA-Oblivious Encryption (2004) (130)
- Reducing the cost of security in link-state routing (1997) (127)
- Aggregation Queries in the Database-As-a-Service Model (2006) (123)
- Securing instrumented environments over content-centric networking: the case of lighting control and NDN (2012) (122)
- KryptoKnight Authentication and Key Distribution System (1992) (115)
- Invited: Things, trouble, trust: On building trust in IoT systems (2016) (114)
- Secure Code Update for Embedded Devices via Proofs of Secure Erasure (2010) (114)
- Needle in a Haystack: Mitigating Content Poisoning in Named-Data Networking (2014) (111)
- Fine-grained control of security capabilities (2004) (111)
- Simple Identity-Based Cryptography with Mediated RSA (2003) (110)
- DSAC: integrity for outsourced databases with signature aggregation and chaining (2005) (105)
- Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers (2005) (103)
- Cache Privacy in Named-Data Networking (2013) (102)
- Admission control in Peer-to-Peer: design and performance evaluation (2003) (101)
- Network-Layer Trust in Named-Data Networking (2014) (100)
- (If) Size Matters: Size-Hiding Private Set Intersection (2011) (99)
- Admission control in peer groups (2003) (98)
- Signature Bouquets: Immutability for Aggregated/Condensed Signatures (2004) (97)
- Di e-hellman key distribution extended to groups (1996) (95)
- A Family of Dunces: Trivial RFID Identification and Authentication Protocols (2007) (93)
- IP multicast security: Issues and directions (2000) (93)
- DARPA: Device Attestation Resilient to Physical Attacks (2016) (92)
- Serial hook-ups: a comparative usability study of secure device pairing methods (2009) (90)
- A Framework for Efficient Storage Security in RDBMS (2004) (89)
- Server-Supported Signatures (1996) (86)
- Accumulating Composites and Improved Group Signing (2003) (86)
- PRISM: Privacy-friendly routing in suspicious MANETs (and VANETs) (2008) (86)
- Extended Abstract: Forward-Secure Sequential Aggregate Authentication (2007) (86)
- Exploring Linkability of User Reviews (2012) (83)
- Improving secure server performance by re-balancing SSL/TLS handshakes (2006) (83)
- Data Security in Unattended Wireless Sensor Networks (2009) (82)
- Universally Composable RFID Identification and Authentication Protocols (2009) (82)
- Secure Group Barter: Multi-party Fair Exchange with Semi-Trusted Neutral Parties (1998) (79)
- Experimenting with Fast Private Set Intersection (2012) (76)
- Efficient node admission for short-lived mobile ad hoc networks (2005) (76)
- Authentication using pulse-response biometrics (2017) (76)
- ALARM: Anonymous Location-Aided Routing in Suspicious MANETs (2011) (75)
- An integrated solution for secure group communication in wide-area networks (2001) (74)
- Secure spread: an integrated architecture for secure group communication (2005) (73)
- POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks (2008) (73)
- Identity-Based Access Control for Ad Hoc Groups (2004) (71)
- DoS & DDoS in Named Data Networking (2013) (71)
- Visa protocols for controlling interorganizational datagram flow (1989) (70)
- Secure group communication in asynchronous networks with failures: integration and experiments (2000) (67)
- A Flexible Framework for Secret Handshakes (2006) (67)
- Secure genomic testing with size- and position-hiding private substring matching (2013) (65)
- Threshold cryptography in P2P and MANETs: The case of access control (2007) (64)
- Visa Protocols for Controlling Inter-Organizational Datagram Flow: Extended Description (1987) (62)
- The Chills and Thrills of Whole Genome Sequencing (2013) (62)
- Lightweight Swarm Attestation: A Tale of Two LISA-s (2017) (61)
- Untraceable mobility or how to travel incognito (1999) (61)
- Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange (2008) (60)
- ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices (2018) (60)
- VRASED: A Verified Hardware/Software Co-Design for Remote Attestation (2019) (59)
- HYDRA: hybrid design for remote attestation (using a formally verified microkernel) (2017) (58)
- Security and privacy in emerging wireless networks [Invited Paper] (2010) (58)
- Lowering security overhead in link state routing (1999) (56)
- SRDP: Secure route discovery for dynamic source routing in MANETs (2009) (55)
- Genodroid: are privacy-preserving genomic tests ready for prime time? (2012) (55)
- Experimenting with Server-Aided Signatures (2002) (54)
- Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs (2009) (54)
- Exploring robustness in group key agreement (2001) (53)
- Remote attestation for low-end embedded devices: The prover's perspective (2016) (53)
- Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information (2011) (53)
- New adversary and new threats: security in unattended sensor networks (2009) (53)
- Pushing the limits of multicast in ad hoc networks (2001) (52)
- Don't Skype & Type!: Acoustic Eavesdropping in Voice-Over-IP (2016) (49)
- Interest-Based Access Control for Content Centric Networks (2015) (49)
- Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks (2009) (48)
- On Travelling Incognito (1994) (47)
- Forward-Secure Sequential Aggregate Authentication (2007) (47)
- Collaborative authentication in unattended WSNs (2009) (46)
- DISH: Distributed Self-Healing (2008) (46)
- Secure Sensing over Named Data Networking (2014) (46)
- Flexible Robust Group Key Agreement (2011) (45)
- SRDP: securing route discovery in DSR (2005) (45)
- To NACK or Not to NACK? Negative Acknowledgments in Information-Centric Networking (2015) (45)
- Intrusion-Resilience in Mobile Unattended WSNs (2010) (44)
- Scalability and flexibility in authentication services: the KryptoKnight approach (1997) (43)
- Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare? (2015) (43)
- Groupthink: usability of secure group association for wireless devices (2010) (43)
- Using audio in secure device pairing (2009) (41)
- A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks (2005) (41)
- Privacy-Preserving Policy-Based Information Transfer (2009) (41)
- Practical Private Set Intersection Protocols with Linear Computational and Bandwidth Complexity (2009) (41)
- ERASMUS: Efficient remote attestation via self-measurement for unattended settings (2017) (39)
- BEDA: Button-Enabled Device Pairing (2007) (38)
- Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks (2009) (38)
- Group signatures á la carte (1999) (37)
- Secure and minimal protocols for authenticated key distribution (1995) (35)
- Secure Fragmentation for Content-Centric Networks (2014) (35)
- Leak-free group signatures with immediate revocation (2004) (35)
- Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement (2007) (34)
- Public Key Cryptography for Cross-Realm Authentication in Kerberos (2001) (32)
- Access control in ad hoc groups (2004) (31)
- Authentication for Paranoids: Multi-party Secret Handshakes (2006) (31)
- Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints (2014) (31)
- Privacy-Aware Caching in Information-Centric Networking (2019) (30)
- Incorporating a secure coprocessor in the database-as-a-service model (2005) (30)
- AudES - An Expert System for Security Auditing (1990) (29)
- An architecture for key management in hierarchical mobile ad-hoc networks (2004) (29)
- Privacy-Preserving Cloud Database Querying (2011) (29)
- How to construct optimal one-time signatures (2003) (29)
- Remote attestation of IoT devices via SMARM: Shuffled measurements against roving malware (2018) (29)
- Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking (2015) (29)
- Towards Plugging Privacy Leaks in the Domain Name System (2009) (28)
- Fighting authorship linkability with crowdsourcing (2014) (27)
- Secure pairing of interface constrained devices (2009) (27)
- Systematic Treatment of Remote Attestation (2012) (27)
- Privacy-Preserving Querying in Sensor Networks (2009) (27)
- United We Stand: Intrusion Resilience in Mobile Unattended WSNs (2013) (27)
- Some remarks on protecting weak keys and poorly-chosen secrets from guessing attacks (1993) (27)
- A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise (2019) (27)
- Revisiting Oblivious Signature-Based Envelopes (2006) (27)
- US-AID: Unattended Scalable Attestation of IoT Devices (2018) (27)
- Ditio: Trustworthy Auditing of Sensor Activities in Mobile & IoT Devices (2017) (27)
- Stylometric Linkability of Tweets (2014) (27)
- A protocol for route establishment and packet forwarding across multidomain internets (1993) (26)
- AC3N: Anonymous communication in Content-Centric Networking (2016) (26)
- Readers Behaving Badly - Reader Revocation in PKI-Based RFID Systems (2010) (26)
- SIMPLE: A Remote Attestation Approach for Resource-constrained IoT devices (2020) (26)
- On the TOCTOU Problem in Remote Attestation (2020) (25)
- Securing Mobile Unattended WSNs against a Mobile Adversary (2010) (25)
- Security and Privacy Analysis of National Science Foundation Future Internet Architectures (2018) (23)
- Authentication method with impersonal token cards (1993) (22)
- Enhancing Data Privacy in the Cloud (2011) (22)
- MTRA: Multiple-tier remote attestation in IoT networks (2017) (22)
- Secure acknowledgment aggregation and multisignatures with limited robustness (2006) (22)
- Affiliation-Hiding Key Exchange with Untrusted Group Authorities (2010) (21)
- On simple and secure key distribution (1993) (21)
- Equipping smart devices with public key signatures (2007) (21)
- (The Futility of) Data Privacy in Content-Centric Networking (2016) (20)
- Reducing RFID reader load with the meet-in-the-middle strategy (2012) (20)
- Quasi-Efficient Revocation of Group Signatures (2003) (20)
- Self-healing in unattended wireless sensor networks (2012) (20)
- Fast and Private Computation of Set Intersection Cardinality (2011) (20)
- Harvesting SSL Certificate Data to Identify Web-Fraud (2009) (19)
- DISH: Distributed Self-Healing in Unattended Sensor Networks (2008) (19)
- When encryption is not enough: privacy attacks in content-centric networking (2017) (19)
- Secure Control of Transit Internetwork Traffic (1991) (18)
- Security issues in policy routing (1989) (18)
- Scaling secure group communication systems: beyond peer-to-peer (2003) (18)
- Visa Scheme for Inter-Organization Network Security (1987) (18)
- Covert ephemeral communication in named data networking (2013) (17)
- A Technical Approach to Net Neutrality (2006) (16)
- Temporal Consistency of Integrity-Ensuring Computations and Applications to Embedded Systems Security (2018) (16)
- Living in a PIT-less World: A Case Against Stateful Forwarding in Content-Centric Networking (2015) (16)
- Traveling Incognito (1998) (16)
- Secret Sets and Applications (1998) (16)
- Simple and Flexible Revocation Checking with Privacy (2006) (15)
- The design of a group key agreement API (2000) (15)
- Secure group key management for storage area networks (2003) (15)
- On travelling incognito [mobile computing] (1994) (14)
- Cliques: a protocol suite for key agreement in dynamic groups (1997) (14)
- An authentication protocol for mobile users (1994) (14)
- Thermanator: Thermal Residue-Based Post Factum Attacks on Keyboard Data Entry (2018) (14)
- Named Data Networking (NDN) Project 2011 - 2012 Annual Report (2012) (14)
- Identity-Based Mediated RSA ? (2002) (14)
- On the performance of certain Private Set Intersection protocols. (And some remarks on the recent paper by Huang et al. in NDSS'12) (2012) (14)
- On shopping incognito (1996) (14)
- DSAC: An Approach to Ensure Integrity of Outsourced Databases using Signature Aggregation and Chaining (2005) (14)
- MTRA: Multi-Tier randomized remote attestation in IoT networks (2019) (14)
- Taming Big Brother Ambitions: More Privacy for Secret Handshakes (2010) (14)
- Network Names in Content-Centric Networking (2016) (13)
- Brief announcement: secret handshakes from CA-oblivious encryption (2004) (13)
- Can We Make a Cake and Eat it Too? A Discussion of ICN Security and Privacy (2017) (13)
- Robust group key agreement using short broadcasts (2007) (13)
- Itinerant Agents for Mobile Computing Secure, remote applications for large public networks (1995) (13)
- HEALED: HEaling & Attestation for Low-End Embedded Devices (2019) (13)
- Presence Attestation: The Missing Link in Dynamic Trust Bootstrapping (2017) (13)
- SILK-TV: Secret Information Leakage from Keystroke Timing Videos (2018) (13)
- Weak Forward Security in Mediated RSA (2002) (13)
- Towards Systematic Design of Collective Remote Attestation Protocols (2019) (13)
- Privacy-Preserving Sharing of Sensitive Information (2010) (12)
- Design, Implementation and Deployment of a Secure Account-Based Electronic Payment System (2000) (12)
- Brief announcement: a flexible framework for secret handshakes (2005) (12)
- A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation (2004) (12)
- Elements of Trust in Named-Data Networking (2014) (12)
- Closing the Floodgate with Stateless Content-Centric Networking (2017) (12)
- Optimizing bi-directional low-latency communication in named data networking (2012) (11)
- PURE: Using Verified Remote Attestation to Obtain Proofs of Update, Reset and Erasure in low-End Embedded Systems (2019) (11)
- Reconciling remote attestation and safety-critical operation on simple IoT devices (2018) (11)
- Secure group services for storage area networks (2002) (11)
- Tiny-CFA: A Minimalistic Approach for Control-Flow Attestation Using Verified Proofs of Execution (2020) (11)
- Datagram authentication in internet gateways: implications of fragmentation and dynamic routing (1989) (11)
- DIALED: Data Integrity Attestation for Low-end Embedded Devices (2021) (10)
- Harvesting SSL Certificate Data to Mitigate Web-Fraud (2009) (10)
- Assentication: User Deauthentication and Lunchtime Attack Mitigation with Seated Posture Biometric (2017) (10)
- In Content We Trust: Network-Layer Trust in Content-Centric Networking (2019) (9)
- Access control and policy enforcement in internetworks (1992) (9)
- Tiny-CFA: Minimalistic Control-Flow Attestation Using Verified Proofs of Execution (2021) (9)
- PDoT: private DNS-over-TLS with TEE support (2019) (9)
- Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary (2008) (9)
- KRB-CCN: Lightweight Authentication & Access Control for Private Content-Centric Networks (2018) (8)
- PILOT: Password and PIN Information Leakage from Obfuscated Typing Videos (2019) (8)
- CLIQUES : A New Approach to Group Key (1998) (8)
- User-aided reader revocation in PKI-based RFID systems (2011) (8)
- Privacy-preserving revocation checking (2009) (8)
- Content-Centric and Named-Data Networking Security: The Good, The Bad and The Rest (2018) (8)
- Privacy-Preserving Matching of Community-Contributed Content (2013) (8)
- Group key agreement: theory and practice (2002) (8)
- Invited: Reconciling Remote Attestation and Safety-Critical Operation on Simple IoT Devices (2018) (8)
- Flexible Framework for Secret Handshakes (Multi-Party Anonymous and Un-observable Authentication) (2005) (8)
- Formally Verified Hardware/Software Co-Design for Remote Attestation (2018) (8)
- Robust and Secure Password and Key Change Method (1994) (7)
- FADEWICH: Fast Deauthentication Over the Wireless Channel (2016) (7)
- Pulse-Response (2017) (7)
- Proceedings of the 6th ACM conference on Computer and communications security (1999) (7)
- Bounded Size-Hiding Private Set Intersection (2016) (7)
- Usability of Display-Equipped RFID Tags for Security Purposes (2011) (7)
- Group Distance Bounding Protocols - (Short Paper) (2011) (6)
- On the Difficulty of Coalition-Resistance in Group Signature Schemes (II) (1998) (6)
- Practical accounting in content-centric networking (2016) (6)
- Namespace Tunnels in Content-Centric Networks (2017) (6)
- On the Root of Trust Identification Problem (2020) (6)
- ProMACs: Progressive and Resynchronizing MACs for Continuous Efficient Authentication of Message Streams (2020) (6)
- An Unattended Study of Users Performing Security Critical Tasks Under Adversarial Noise (2015) (6)
- Can Jannie verify? Usability of display-equipped RFID tags for security purposes (2013) (6)
- Genomic Privacy (Dagstuhl Seminar 13412) (2013) (6)
- Thermanator: Thermal Residue-Based Post Factum Attacks On Keyboard Password Entry (2018) (5)
- Secure Fragmentation for Content-Centric Networks (extended version) (2014) (5)
- Incentive-based cooperative and secure inter-personal networking (2007) (5)
- Authentication of Mobile Users A new set of inter-domain security mechanisms is needed for users to venture into remote domains while inheriting privileges from their home domains. (1994) (5)
- Tweeting with Hummingbird: Privacy in Large-Scale Micro-Blogging OSNs (2012) (5)
- A Proactive Cache Privacy Attack on NDN (2020) (5)
- FUsing Hybrid Remote Attestation with a Formally Verified Microkernel: Lessons Learned (2017) (5)
- DE-auth of the Blue! Transparent De-authentication Using Bluetooth Low Energy Beacon (2020) (5)
- Remarks on ''Analysis of one popular group signature scheme'' in Asiacrypt 2006 (2009) (5)
- Public key cryptography -- PKC 2009 : 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009 : proceedings (2009) (5)
- Genomic Security (Lest We Forget) (2017) (5)
- RFID security and privacy: long-term research or short-term tinkering? (2008) (5)
- Remote Attestation via Self-Measurement (2018) (4)
- Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks (2009) (4)
- Private Set Projections & Variants (2017) (4)
- Intrusion-resilient integrity in data-centric unattended WSNs (2011) (4)
- dynamic-searchable-encryption-very-large-databases-data-structures-and-implementation (2014) (4)
- Leak-free mediated group signatures (2009) (4)
- An Exploration of the Effects of Sensory Stimuli on the Completion of Security Tasks (2017) (4)
- Button-enabled Device Association (2007) (4)
- Delegated attestation: scalable remote attestation of commodity CPS by blending proofs of execution with software attestation (2021) (4)
- Experimenting with Admission Control in P 2 P (2005) (4)
- Genomic Privacy (Dagstuhl Seminar 15431) (2015) (3)
- Revisiting Oblivious Signature-Based Envelopes : New Constructs and Properties (2006) (3)
- The Effect of Visual Noise on The Completion of Security Critical Tasks (2014) (3)
- GAROTA: Generalized Active Root-Of-Trust Architecture (2021) (3)
- Towards an Analysis of Onion Routing (2008) (3)
- Cryptology and network security : 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011 : proceedings (2011) (3)
- Zurich iKP Prototype (ZiP): Protocol Specification Document (1996) (3)
- Generating Secret Keys from Biometric Body Impedance Measurements (2016) (3)
- Proceedings of the 9th international conference on Applied cryptography and network security (2011) (3)
- SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier (2022) (3)
- UnLinked: Private Proximity-based Off-line OSN Interaction (2015) (3)
- Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks (2017) (3)
- An End-to-End Argument for Network Layer, Inter-Domain Access Controls (1991) (3)
- Are 140 Characters Enough? A Large-Scale Linkability Study of Tweets (2014) (3)
- Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings (2011) (3)
- Trilateral Large-Scale OSN Account Linkability Study (2015) (3)
- Information-centric Networking and Security (Dagstuhl Seminar 16251) (2016) (2)
- Exploring Linkablility of Community Reviewing (2011) (2)
- Practical Accounting in Content-Centric Networking (extended version) (2015) (2)
- Advancing remote attestation via computer-aided formal verification of designs and synthesis of executables: opinion (2019) (2)
- VICEROY: GDPR-/CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests (2021) (2)
- Proceedings of the Fourth ACM Conference on Wireless Network Security, WISEC 2011, Hamburg, Germany, June 14-17, 2011 (2011) (2)
- On Security of Sovereign Joins (2006) (2)
- Decentralized security services (2006) (2)
- Skype & Type (2019) (2)
- Privacy-Friendly De-authentication with BLUFADE: Blurred Face Detection (2022) (2)
- Proceedings of the 13th international conference on Information security (2010) (2)
- Implications of fragmentation dynamic routing for internet datagram authentication (1988) (2)
- Experimenting with Admission Control in P2P Networks (2005) (2)
- Security and Privacy in Ad-hoc and Sensor Networks: Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005. Revised Selected Papers (Lecture Notes in Computer Science) (2006) (2)
- Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSA (2022) (2)
- BEAD: Best effort autonomous deletion in content-centric networking (2015) (2)
- CACTI: Captcha Avoidance via Client-side TEE Integration (2020) (2)
- Initializing trust in smart devices via presence attestation (2018) (2)
- Simple identity-based encryption with mediated RSA (2013) (2)
- Balancing Security and Privacy in Genomic Range Queries (2019) (2)
- Policy Enforcement in Stub Autonomous Domains (1992) (2)
- 9th International Conference on Applied Cryptography and Network Security (ACNS 2011) (2011) (2)
- Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09 (2009) (2)
- Some Issues in WSN, MANET and Cellular Security (2007) (2)
- We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack on ATM PIN Pads (2022) (1)
- GDB: Group Distance Bounding Protocols (2010) (1)
- Securing network resources in opportunistic and delay-tolerant networks (2010) (1)
- Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers (2008) (1)
- ATM cell encryption and key update synchronization (1997) (1)
- Security and privacy in location-based mobile ad-hoc networks (2010) (1)
- Privacy-preserving database querying (2012) (1)
- Correction to "Exploring Mesh and Tree-Based Multicast Routing Protocols for MANETs" (2007) (1)
- Confronting a mobile adversary in unattended sensor networks (2008) (1)
- Challenges in Remote Attestation of Low-End Embedded Devices (2014) (1)
- Privacy-Oriented Cryptography (Dagstuhl Seminar 12381) (2012) (1)
- Privacy-Preserving Location-Based On-Demand (2011) (1)
- A Certification Infrastructure for ATM (1995) (1)
- Erratum to: Public Key Cryptography – PKC 2009 (2009) (1)
- Mitigating On-Path Adversaries in Content-Centric Networks (2017) (1)
- Privacy-Preserving Revocation Checking with Modified CRLs (2007) (1)
- Probabilistic and Considerate Attestation of IoT Devices against Roving Malware (2017) (1)
- GAROTA: Generalized Active Root-Of-Trust Architecture (for Tiny Embedded Devices) (2022) (1)
- Forward-Secure Sequential Aggregate Authentication ( Short (2007) (1)
- A Coalition-resistant Group SignatureGiuseppe Ateniese (1998) (1)
- Machine-learning based security and privacy techniques for the modern web (2012) (1)
- Link-Layer Encryption Effect on Achievable Capacity in Wireless Network Coding (2010) (1)
- Security and Privacy Analysis of NSF Future Internet Architectures (2016) (1)
- Vronicle: verifiable provenance for videos from mobile devices (2022) (1)
- User Errors in the Performance of Security Critical Tasks in the Context of Adversarial Noise (2014) (0)
- Balancing Security and Privacy in Genomic Range Queries* (2022) (0)
- Poster : LIghtweight Swarm Attestation : a Tale of Two LISAs (2017) (0)
- Message from the Workshop Chairs 2nd IEEE International Workshop on Data Security and PrivAcy in wireless Networks (D-SPAN 2011) (2011) (0)
- CCNx 1.0 Elements of Trust (2014) (0)
- Limitations of the Approach of Solving a Network's Security Problem with a Firewall (1996) (0)
- Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription (2023) (0)
- ROSEN: RObust and SElective Non-repudiation (for TLS) (2021) (0)
- Exploring Effects of Auditory Stimuli on CAPTCHA Performance (2020) (0)
- Secure Policy Enforcement in Internetworks (1989) (0)
- CASU: Compromise Avoidance via Secure Update for Low-end Embedded Systems (2022) (0)
- Title: a Framework for Authenticated Key Distribution in Atm Networks Source (1995) (0)
- Private Projections & Variants (2016) (0)
- Authorship Integrity and Attacks (2017) (0)
- PDoT (2019) (0)
- SWARM ATTESTATION 2 . 1 Problem Description and System Model (2015) (0)
- Chains and Whips - An approach to lighweight MACs (2018) (0)
- A FOSAD 2005 short course on: SECURITY in (certain) Wireless Communication (2005) (0)
- Logging key assurance indicators in business processes (2009) (0)
- Session details: Cryptography (2007) (0)
- Vronicle: A System for Producing Videos with Verifiable Provenance (2021) (0)
- POSH:Proactiveco-OperativeSelf-Healing inUnattendedWirelessSensorNetworks (2008) (0)
- SEDA - Technical Report (2015) (0)
- ERASMUS: E fficient R emote A ttestation via S elf- M easurement for U nattended S ettings (2018) (0)
- Sharing sensitive information with privacy (2011) (0)
- SEDIMENT: An IoT-device-centric Methodology for Scalable 5G Network Security (2022) (0)
- Usable bootstrapping of secure ad hoc communication (2010) (0)
- Secure spread: providing a secure infrastructure for collaborative applications (2004) (0)
- SILK-TV: S ecret I nformation L eakage from K eystroke T iming V ideos (2018) (0)
- Vronicle: verifiable provenance for videos from mobile devices (2022) (0)
- Safe anonymous exchange of information in a network (1996) (0)
- Survivability Using Controlled Security Services (2005) (0)
- Privacy in outsourced databases (2006) (0)
- Thermal (and Hybrid Thermal/Audio) Side-Channel Attacks on Keyboard Input (2022) (0)
- On Trayeliing incognito (1995) (0)
- Membership management for dynamic peer groups (2005) (0)
- V'CER: Efficient Certificate Validation in Constrained Networks (2022) (0)
- Usable security: the case of pairing of wireless personal devices (2011) (0)
- Simple and Flexible Private Revocation Checking (2006) (0)
- Privacy-Oriented Cryptography (2013) (0)
- AC 3 N : An API and Service for Anonymous Communication in Content-Centric Networking ( Extended Version ) Gene Tsudik (2017) (0)
- Session details: Password & Auth 2 (2017) (0)
- Efficient and Secure Testing of Fully-Sequenced Human Genomes ( Extended Abstract ) (2012) (0)
- Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006 (2006) (0)
- Some Security Topics with Possible Applications for Pairing-Based Cryptography (2010) (0)
- KryptoKnight Authentication and KeyDistribution (1992) (0)
- Au th or ' s pe rs on al co py Threshold cryptography in P 2 P and MANETs : The case of access control q (2007) (0)
- Security services for remote data management (2006) (0)
- Proofs or Remote Execution and Mitigation of TOCTOU Attacks (2020) (0)
- Vronicle: verifiable provenance for videos from mobile devices (2022) (0)
- Fine-grained control of security services (2003) (0)
- ALAR : Anonymous Location-Aided outing in Suspicious A , Ts (2008) (0)
- Message from the workshop chairs (2011) (0)
- IRRES: Intrusion-Resilient Remote Email Storage (2010) (0)
- Security and privacy in unattended sensor networks (2008) (0)
- A Protocol for Forwarding Route Establishment and Packet Across Multidomain Internets (1993) (0)
- Robust privacy-preserving group key agreement protocols (2008) (0)
- N I ] 7 A ug 2 01 2 DoS & DDoS in Named-Data Networking (2012) (0)
- Security in Personal Genomics: Lest We Forget (2017) (0)
This paper list is powered by the following services:
Other Resources About Gene Tsudik
What Schools Are Affiliated With Gene Tsudik?
Gene Tsudik is affiliated with the following schools: