2009 | ||
---|---|---|
115 | EE | Stanislaw Jarecki, Gene Tsudik: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings Springer 2009 |
114 | EE | Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin: Logging key assurance indicators in business processes. ASIACCS 2009: 364-367 |
113 | EE | Roberto Di Pietro, Claudio Soriente, Angelo Spognardi, Gene Tsudik: Collaborative authentication in unattended WSNs. WISEC 2009: 237-244 |
112 | EE | Di Ma, Claudio Soriente, Gene Tsudik: New adversary and new threats: security in unattended sensor networks. IEEE Network 23(2): 43-48 (2009) |
111 | EE | Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi: Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs. IEEE Trans. Parallel Distrib. Syst. 20(2): 158-170 (2009) |
110 | EE | Di Ma, Gene Tsudik: A new approach to secure logging. TOS 5(1): (2009) |
2008 | ||
109 | Gene Tsudik: Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers Springer 2008 | |
108 | EE | Gene Tsudik: Confronting a mobile adversary in unattended sensor networks. ASIACCS 2008: 1 |
107 | EE | Stanislaw Jarecki, Jihye Kim, Gene Tsudik: Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange. CT-RSA 2008: 352-369 |
106 | EE | Di Ma, Gene Tsudik: A New Approach to Secure Logging. DBSec 2008: 48-63 |
105 | EE | Jihye Kim, Gene Tsudik: Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks. ICISC 2008: 66-83 |
104 | EE | Claudio Soriente, Gene Tsudik, Ersin Uzun: HAPADEP: Human-Assisted Pure Audio Device Pairing. ISC 2008: 385-400 |
103 | EE | Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik: Catch Me (If You Can): Data Survival in Unattended Sensor Networks. PerCom 2008: 185-194 |
102 | EE | Roberto Di Pietro, Di Ma, Claudio Soriente, Gene Tsudik: POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks. SRDS 2008: 185-194 |
101 | EE | Di Ma, Gene Tsudik: DISH: Distributed Self-Healing. SSS 2008: 47-62 |
100 | EE | Gene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, Melanie R. Rieback: RFID security and privacy: long-term research or short-term tinkering? WISEC 2008: 160 |
99 | EE | Gene Tsudik: Editorial. ACM Trans. Inf. Syst. Secur. 11(3): (2008) |
2007 | ||
98 | EE | Stanislaw Jarecki, Jihye Kim, Gene Tsudik: Robust group key agreement using short broadcasts. ACM Conference on Computer and Communications Security 2007: 411-420 |
97 | EE | Stanislaw Jarecki, Jihye Kim, Gene Tsudik: Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement. CT-RSA 2007: 287-308 |
96 | EE | Maithili Narasimha, Gene Tsudik: Privacy-Preserving Revocation Checking with Modified CRLs. EuroPKI 2007: 18-33 |
95 | EE | Karim M. El Defrawy, Gene Tsudik: ALARM: Anonymous Location-Aided Routing in Suspicious MANETs. ICNP 2007: 304-313 |
94 | EE | Di Ma, Gene Tsudik: Extended Abstract: Forward-Secure Sequential Aggregate Authentication. IEEE Symposium on Security and Privacy 2007: 86-91 |
93 | EE | Gene Tsudik: A Family of Dunces: Trivial RFID Identification and Authentication Protocols. Privacy Enhancing Technologies 2007: 45-61 |
92 | EE | Xuhua Ding, Daniele Mazzocchi, Gene Tsudik: Equipping smart devices with public key signatures. ACM Trans. Internet Techn. 7(1): (2007) |
91 | EE | Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi: Threshold cryptography in P2P and MANETs: The case of access control. Computer Networks 51(12): 3632-3649 (2007) |
90 | EE | Kumar Viswanath, Katia Obraczka, Gene Tsudik: Correction to "Exploring Mesh and Tree-Based Multicast Routing Protocols for MANETs". IEEE Trans. Mob. Comput. 6(2): 237 (2007) |
2006 | ||
89 | Ari Juels, Gene Tsudik, Shouhuai Xu, Moti Yung: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006 ACM 2006 | |
88 | EE | Stanislaw Jarecki, Jihye Kim, Gene Tsudik: Authentication for Paranoids: Multi-party Secret Handshakes. ACNS 2006: 325-339 |
87 | EE | Claude Castelluccia, Einar Mykletun, Gene Tsudik: Improving secure server performance by re-balancing SSL/TLS handshakes. ASIACCS 2006: 26-34 |
86 | EE | Maithili Narasimha, Gene Tsudik: Authentication of Outsourced Databases Using Signature Aggregation and Chaining. DASFAA 2006: 420-436 |
85 | EE | Einar Mykletun, Gene Tsudik: Aggregation Queries in the Database-As-a-Service Model. DBSec 2006: 89-103 |
84 | EE | Samad Nasserian, Gene Tsudik: Revisiting Oblivious Signature-Based Envelopes. Financial Cryptography 2006: 221-235 |
83 | EE | Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, Ersin Uzun: Loud and Clear: Human-Verifiable Authentication Based on Audio. ICDCS 2006: 10 |
82 | EE | Gene Tsudik: YA-TRAP: Yet Another Trivial RFID Authentication Protocol. PerCom Workshops 2006: 640-643 |
81 | EE | Gene Tsudik, Shouhuai Xu: A Flexible Framework for Secret Handshakes. Privacy Enhancing Technologies 2006: 295-315 |
80 | EE | John Solis, Gene Tsudik: Simple and Flexible Revocation Checking with Privacy. Privacy Enhancing Technologies 2006: 351-367 |
79 | EE | Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik: Secure acknowledgment aggregation and multisignatures with limited robustness. Computer Networks 50(10): 1639-1652 (2006) |
78 | EE | Kumar Viswanath, Katia Obraczka, Gene Tsudik: Exploring Mesh and Tree-Based Multicast Routing Protocols for MANETs. IEEE Trans. Mob. Comput. 5(1): 28-42 (2006) |
77 | EE | Einar Mykletun, Maithili Narasimha, Gene Tsudik: Authentication and integrity in outsourced databases. TOS 2(2): 107-138 (2006) |
2005 | ||
76 | Refik Molva, Gene Tsudik, Dirk Westhoff: Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers Springer 2005 | |
75 | EE | Maithili Narasimha, Gene Tsudik: DSAC: integrity for outsourced databases with signature aggregation and chaining. CIKM 2005: 235-236 |
74 | EE | Giuseppe Ateniese, Daniel H. Chou, Breno de Medeiros, Gene Tsudik: Sanitizable Signatures. ESORICS 2005: 159-177 |
73 | EE | Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi: Efficient Node Admission for Short-lived Mobile Ad Hoc Networks. ICNP 2005: 269-278 |
72 | EE | Claude Castelluccia, Einar Mykletun, Gene Tsudik: E.cient Aggregation of encrypted data in Wireless Sensor Networks. MobiQuitous 2005: 109-117 |
71 | EE | Jihye Kim, Gene Tsudik: SRDP: Securing Route Discovery in DSR. MobiQuitous 2005: 247-260 |
70 | EE | Gene Tsudik, Shouhuai Xu: Brief announcement: a flexible framework for secret handshakes. PODC 2005: 39 |
69 | EE | Yair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton, Gene Tsudik: Secure Spread: An Integrated Architecture for Secure Group Communication. IEEE Trans. Dependable Sec. Comput. 2(3): 248-261 (2005) |
68 | EE | Kyung Hyune Rhee, Young-Ho Park, Gene Tsudik: A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks. J. Inf. Sci. Eng. 21(2): 415-428 (2005) |
2004 | ||
67 | EE | Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik: Secret Handshakes from CA-Oblivious Encryption. ASIACRYPT 2004: 293-307 |
66 | EE | Balakrishna R. Iyer, Sharad Mehrotra, Einar Mykletun, Gene Tsudik, Yonghua Wu: A Framework for Efficient Storage Security in RDBMS. EDBT 2004: 147-164 |
65 | EE | Einar Mykletun, Maithili Narasimha, Gene Tsudik: Signature Bouquets: Immutability for Aggregated/Condensed Signatures. ESORICS 2004: 160-176 |
64 | EE | Xuhua Ding, Gene Tsudik, Shouhuai Xu: Leak-Free Group Signatures with Immediate Revocation. ICDCS 2004: 608-615 |
63 | EE | Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi: Identity-Based Access Control for Ad Hoc Groups. ICISC 2004: 362-379 |
62 | EE | Einar Mykletun, Maithili Narasimha, Gene Tsudik: Authentication and Integrity in Outsourced Databases. NDSS 2004 |
61 | EE | Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik: Brief announcement: secret handshakes from CA-oblivious encryption. PODC 2004: 394 |
60 | EE | Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik: A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation. SCN 2004: 193-207 |
59 | EE | Bijit Hore, Sharad Mehrotra, Gene Tsudik: A Privacy-Preserving Index for Range Queries. VLDB 2004: 720-731 |
58 | EE | Yongdae Kim, Adrian Perrig, Gene Tsudik: Tree-based group key agreement. ACM Trans. Inf. Syst. Secur. 7(1): 60-96 (2004) |
57 | EE | Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene Tsudik: On the performance of group key agreement protocols. ACM Trans. Inf. Syst. Secur. 7(3): 457-488 (2004) |
56 | EE | Dan Boneh, Xuhua Ding, Gene Tsudik: Fine-grained control of security capabilities. ACM Trans. Internet Techn. 4(1): 60-82 (2004) |
55 | EE | Yongdae Kim, Adrian Perrig, Gene Tsudik: Group Key Agreement Efficient in Communication. IEEE Trans. Computers 53(7): 905-921 (2004) |
54 | EE | Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Gene Tsudik: Secure Group Communication Using Robust Contributory Key Agreement. IEEE Trans. Parallel Distrib. Syst. 15(5): 468-480 (2004) |
2003 | ||
53 | EE | Gene Tsudik, Shouhuai Xu: Accumulating Composites and Improved Group Signing. ASIACRYPT 2003: 269-286 |
52 | EE | Xuhua Ding, Gene Tsudik: Simple Identity-Based Cryptography with Mediated RSA. CT-RSA 2003: 193-210 |
51 | EE | Yair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton, Gene Tsudik: Scaling Secure Group Communication Systems: Beyond Peer-to-Peer. DISCEX (1) 2003: 226-237 |
50 | EE | Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi: On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control. ICNP 2003: 336- |
49 | EE | Yongdae Kim, Daniele Mazzocchi, Gene Tsudik: Admission Control in Peer Groups. NCA 2003: 131-139 |
48 | EE | Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi: Admission control in Peer-to-Peer: design and performance evaluation. SASN 2003: 104-113 |
47 | EE | Kemal Bicakci, Gene Tsudik, Brian Tung: How to construct optimal one-time signatures. Computer Networks 43(3): 339-349 (2003) |
2002 | ||
46 | EE | Giuseppe Ateniese, Dawn Xiaodong Song, Gene Tsudik: Quasi-Efficient Revocation in Group Signatures. Financial Cryptography 2002: 183-197 |
45 | EE | Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene Tsudik: On the Performance of Group Key Agreement Protocols. ICDCS 2002: 463-464 |
44 | EE | Yongdae Kim, Maithili Narasimha, Fabio Maino, Gene Tsudik: Secure Group Services for Storage Area Networks. IEEE Security in Storage Workshop 2002: 80-93 |
43 | EE | Xuhua Ding, Daniele Mazzocchi, Gene Tsudik: Experimenting with Server-Aided Signatures. NDSS 2002 |
42 | EE | Gene Tsudik: Weak Forward Security in Mediated RSA. SCN 2002: 45-54 |
2001 | ||
41 | EE | Yair Amir, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Yongdae Kim, Gene Tsudik: Exploring Robustness in Group Key Agreement. ICDCS 2001: 399-408 |
40 | EE | Katia Obraczka, Gene Tsudik, Kumar Viswanath: Pushing the Limits of Multicast in Ad Hoc Networks. ICDCS 2001: 719-722 |
39 | EE | Deborah A. Agarwal, Olivier Chevassut, Mary R. Thompson, Gene Tsudik: An Integrated Solution for Secure Group Communication in Wide-Area Networks. ISCC 2001: 22-28 |
38 | Yongdae Kim, Adrian Perrig, Gene Tsudik: Communication-Efficient Group Key Agreement. SEC 2001: 229-244 | |
37 | Katia Obraczka, Kumar Viswanath, Gene Tsudik: Flooding for Reliable Multicast in Multi-Hop Ad Hoc Networks. Wireless Networks 7(6): 627-634 (2001) | |
2000 | ||
36 | EE | Yongdae Kim, Adrian Perrig, Gene Tsudik: Simple and fault-tolerant key agreement for dynamic collaborative groups. ACM Conference on Computer and Communications Security 2000: 235-244 |
35 | EE | Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik: A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. CRYPTO 2000: 255-270 |
34 | EE | Jonathan Robert Stanton, Yair Amir, Damian Hasse, Giuseppe Ateniese, Yongdae Kim, Cristina Nita-Rotaru, Theo Schlossnagle, John L. Schultz, Gene Tsudik: Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments. ICDCS 2000: 330-343 |
33 | EE | Paul F. Syverson, Gene Tsudik, Michael G. Reed, Carl E. Landwehr: Towards an Analysis of Onion Routing Security. Workshop on Design Issues in Anonymity and Unobservability 2000: 96-114 |
32 | EE | Michael Steiner, Gene Tsudik, Michael Waidner: Key Agreement in Dynamic Peer Groups. IEEE Trans. Parallel Distrib. Syst. 11(8): 769-780 (2000) |
1999 | ||
31 | EE | Christopher Ho, Katia Obraczka, Gene Tsudik, Kumar Viswanath: Flooding for reliable multicast in multi-hop ad hoc networks. DIAL-M 1999: 64-71 |
30 | EE | Giuseppe Ateniese, Gene Tsudik: Some Open Issues and New Directions in Group Signatures. Financial Cryptography 1999: 196-211 |
29 | EE | Giuseppe Ateniese, Gene Tsudik: Group Signatures Á la carte. SODA 1999: 848-849 |
28 | EE | Giuseppe Ateniese, Amir Herzberg, Hugo Krawczyk, Gene Tsudik: Untraceable mobility or how to travel incognito. Computer Networks 31(8): 871-884 (1999) |
27 | EE | Ralf C. Hauser, Tony Przygienda, Gene Tsudik: Lowering security overhead in link state routing. Computer Networks 31(8): 885-894 (1999) |
1998 | ||
26 | EE | Giuseppe Ateniese, Michael Steiner, Gene Tsudik: Authenticated Group Key Agreement and Friends. ACM Conference on Computer and Communications Security 1998: 17-26 |
25 | EE | Ian T. Foster, Carl Kesselman, Gene Tsudik, Steven Tuecke: A Security Architecture for Computational Grids. ACM Conference on Computer and Communications Security 1998: 83-92 |
24 | EE | Matthew K. Franklin, Gene Tsudik: Secure Group Barter: Multi-party Fair Exchange with Semi-Trusted Neutral Parties. Financial Cryptography 1998: 90-102 |
23 | EE | Michael Steiner, Gene Tsudik, Michael Waidner: CLIQUES: A New Approach to Group Key Agreement. ICDCS 1998: 380-387 |
22 | EE | Refik Molva, Gene Tsudik: Secret Sets and Applications. Inf. Process. Lett. 65(1): 47-55 (1998) |
1997 | ||
21 | Philippe A. Janson, Gene Tsudik, Moti Yung: Scalability and Flexibility in Authentication Services: The KryptoKnight Approach. INFOCOM 1997: 725-736 | |
20 | EE | Ralf C. Hauser, Tony Przygienda, Gene Tsudik: Reducing the Cost of Security in Link-State Routing. NDSS 1997 |
19 | N. Asokan, Gene Tsudik, Michael Waidner: Server-Supported Signatures. Journal of Computer Security 5(1): 91-108 (1997) | |
18 | James P. Gray, Ajay D. Kshemkalyani, Stephen M. Matyas, Mohammad Peyravian, Gene Tsudik: ATM cell encryption and key update synchronization. Telecommunication Systems 7(4): 391-408 (1997) | |
1996 | ||
17 | EE | Michael Steiner, Gene Tsudik, Michael Waidner: Diffie-Hellman Key Distribution Extended to Group Communication. ACM Conference on Computer and Communications Security 1996: 31-37 |
16 | EE | N. Asokan, Gene Tsudik, Michael Waidner: Server-Supported Signatures. ESORICS 1996: 131-143 |
15 | EE | Stefano Zatti, Refik Molva, Angelo Tosi, Gene Tsudik, Helmut Kurth: Limitations of the Approach of Solving a Network's Security Problem with a Firewall. ESORICS 1996: 144-145 |
14 | Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen: Robust and Secure Password and Key Change Method. Journal of Computer Security 4(1): 97-112 (1996) | |
1995 | ||
13 | EE | Philippe A. Janson, Gene Tsudik: Secure and minimal protocols for authenticated key distribution. Computer Communications 18(9): 645-653 (1995) |
12 | Michael Steiner, Gene Tsudik, Michael Waidner: Refinement and Extension of Encrypted Key Exchange. Operating Systems Review 29(3): 22-30 (1995) | |
1994 | ||
11 | EE | Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen: Robust and Secure Password and Key Change Method. ESORICS 1994: 107-122 |
1993 | ||
10 | EE | Gene Tsudik, Els Van Herreweghen: On Simple and Secure Key Distribution. ACM Conference on Computer and Communications Security 1993: 49-57 |
9 | Gene Tsudik, Els Van Herreweghen: Some Remarks on Protecting Weak Keys and Poorly-Chosen Secrets from Guessing Attacks. SRDS 1993: 136-142 | |
8 | EE | Deborah Estrin, Martha Steenstrup, Gene Tsudik: A protocol for route establishment and packet forwarding across multidomain internets. IEEE/ACM Trans. Netw. 1(1): 56-70 (1993) |
1992 | ||
7 | EE | Refik Molva, Gene Tsudik, Els Van Herreweghen, Stefano Zatti: KryptoKnight Authentication and Key Distribution System. ESORICS 1992: 155-174 |
6 | EE | Gene Tsudik: Policy Enforcement in Stub Autonomous Domains. ESORICS 1992: 229-257 |
5 | Gene Tsudik: Message Authentication with One-Way Hash Functions. INFOCOM 1992: 2055-2059 | |
1991 | ||
4 | Deborah Estrin, Gene Tsudik: Secure Control of Transit Internetwork Traffic. Computer Networks and ISDN Systems 22(5): 363-382 (1991) | |
1990 | ||
3 | Gene Tsudik, Rita C. Summers: AudES - An Expert System for Security Auditing. IAAI 1990: 221-232 | |
1989 | ||
2 | Deborah Estrin, Gene Tsudik: Security Issues in Policy Routing. IEEE Symposium on Security and Privacy 1989: 183-193 | |
1987 | ||
1 | Deborah Estrin, Gene Tsudik: Visa Scheme for Inter-Organization Network Security. IEEE Symposium on Security and Privacy 1987: 174-183 |