| 2009 |
| 115 | EE | Stanislaw Jarecki,
Gene Tsudik:
Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings
Springer 2009 |
| 114 | EE | Fabio Massacci,
Gene Tsudik,
Artsiom Yautsiukhin:
Logging key assurance indicators in business processes.
ASIACCS 2009: 364-367 |
| 113 | EE | Roberto Di Pietro,
Claudio Soriente,
Angelo Spognardi,
Gene Tsudik:
Collaborative authentication in unattended WSNs.
WISEC 2009: 237-244 |
| 112 | EE | Di Ma,
Claudio Soriente,
Gene Tsudik:
New adversary and new threats: security in unattended sensor networks.
IEEE Network 23(2): 43-48 (2009) |
| 111 | EE | Nitesh Saxena,
Gene Tsudik,
Jeong Hyun Yi:
Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs.
IEEE Trans. Parallel Distrib. Syst. 20(2): 158-170 (2009) |
| 110 | EE | Di Ma,
Gene Tsudik:
A new approach to secure logging.
TOS 5(1): (2009) |
| 2008 |
| 109 | | Gene Tsudik:
Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers
Springer 2008 |
| 108 | EE | Gene Tsudik:
Confronting a mobile adversary in unattended sensor networks.
ASIACCS 2008: 1 |
| 107 | EE | Stanislaw Jarecki,
Jihye Kim,
Gene Tsudik:
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange.
CT-RSA 2008: 352-369 |
| 106 | EE | Di Ma,
Gene Tsudik:
A New Approach to Secure Logging.
DBSec 2008: 48-63 |
| 105 | EE | Jihye Kim,
Gene Tsudik:
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks.
ICISC 2008: 66-83 |
| 104 | EE | Claudio Soriente,
Gene Tsudik,
Ersin Uzun:
HAPADEP: Human-Assisted Pure Audio Device Pairing.
ISC 2008: 385-400 |
| 103 | EE | Roberto Di Pietro,
Luigi V. Mancini,
Claudio Soriente,
Angelo Spognardi,
Gene Tsudik:
Catch Me (If You Can): Data Survival in Unattended Sensor Networks.
PerCom 2008: 185-194 |
| 102 | EE | Roberto Di Pietro,
Di Ma,
Claudio Soriente,
Gene Tsudik:
POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks.
SRDS 2008: 185-194 |
| 101 | EE | Di Ma,
Gene Tsudik:
DISH: Distributed Self-Healing.
SSS 2008: 47-62 |
| 100 | EE | Gene Tsudik,
Mike Burmester,
Ari Juels,
Alfred Kobsa,
David Molnar,
Roberto Di Pietro,
Melanie R. Rieback:
RFID security and privacy: long-term research or short-term tinkering?
WISEC 2008: 160 |
| 99 | EE | Gene Tsudik:
Editorial.
ACM Trans. Inf. Syst. Secur. 11(3): (2008) |
| 2007 |
| 98 | EE | Stanislaw Jarecki,
Jihye Kim,
Gene Tsudik:
Robust group key agreement using short broadcasts.
ACM Conference on Computer and Communications Security 2007: 411-420 |
| 97 | EE | Stanislaw Jarecki,
Jihye Kim,
Gene Tsudik:
Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement.
CT-RSA 2007: 287-308 |
| 96 | EE | Maithili Narasimha,
Gene Tsudik:
Privacy-Preserving Revocation Checking with Modified CRLs.
EuroPKI 2007: 18-33 |
| 95 | EE | Karim M. El Defrawy,
Gene Tsudik:
ALARM: Anonymous Location-Aided Routing in Suspicious MANETs.
ICNP 2007: 304-313 |
| 94 | EE | Di Ma,
Gene Tsudik:
Extended Abstract: Forward-Secure Sequential Aggregate Authentication.
IEEE Symposium on Security and Privacy 2007: 86-91 |
| 93 | EE | Gene Tsudik:
A Family of Dunces: Trivial RFID Identification and Authentication Protocols.
Privacy Enhancing Technologies 2007: 45-61 |
| 92 | EE | Xuhua Ding,
Daniele Mazzocchi,
Gene Tsudik:
Equipping smart devices with public key signatures.
ACM Trans. Internet Techn. 7(1): (2007) |
| 91 | EE | Nitesh Saxena,
Gene Tsudik,
Jeong Hyun Yi:
Threshold cryptography in P2P and MANETs: The case of access control.
Computer Networks 51(12): 3632-3649 (2007) |
| 90 | EE | Kumar Viswanath,
Katia Obraczka,
Gene Tsudik:
Correction to "Exploring Mesh and Tree-Based Multicast Routing Protocols for MANETs".
IEEE Trans. Mob. Comput. 6(2): 237 (2007) |
| 2006 |
| 89 | | Ari Juels,
Gene Tsudik,
Shouhuai Xu,
Moti Yung:
Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006
ACM 2006 |
| 88 | EE | Stanislaw Jarecki,
Jihye Kim,
Gene Tsudik:
Authentication for Paranoids: Multi-party Secret Handshakes.
ACNS 2006: 325-339 |
| 87 | EE | Claude Castelluccia,
Einar Mykletun,
Gene Tsudik:
Improving secure server performance by re-balancing SSL/TLS handshakes.
ASIACCS 2006: 26-34 |
| 86 | EE | Maithili Narasimha,
Gene Tsudik:
Authentication of Outsourced Databases Using Signature Aggregation and Chaining.
DASFAA 2006: 420-436 |
| 85 | EE | Einar Mykletun,
Gene Tsudik:
Aggregation Queries in the Database-As-a-Service Model.
DBSec 2006: 89-103 |
| 84 | EE | Samad Nasserian,
Gene Tsudik:
Revisiting Oblivious Signature-Based Envelopes.
Financial Cryptography 2006: 221-235 |
| 83 | EE | Michael T. Goodrich,
Michael Sirivianos,
John Solis,
Gene Tsudik,
Ersin Uzun:
Loud and Clear: Human-Verifiable Authentication Based on Audio.
ICDCS 2006: 10 |
| 82 | EE | Gene Tsudik:
YA-TRAP: Yet Another Trivial RFID Authentication Protocol.
PerCom Workshops 2006: 640-643 |
| 81 | EE | Gene Tsudik,
Shouhuai Xu:
A Flexible Framework for Secret Handshakes.
Privacy Enhancing Technologies 2006: 295-315 |
| 80 | EE | John Solis,
Gene Tsudik:
Simple and Flexible Revocation Checking with Privacy.
Privacy Enhancing Technologies 2006: 351-367 |
| 79 | EE | Claude Castelluccia,
Stanislaw Jarecki,
Jihye Kim,
Gene Tsudik:
Secure acknowledgment aggregation and multisignatures with limited robustness.
Computer Networks 50(10): 1639-1652 (2006) |
| 78 | EE | Kumar Viswanath,
Katia Obraczka,
Gene Tsudik:
Exploring Mesh and Tree-Based Multicast Routing Protocols for MANETs.
IEEE Trans. Mob. Comput. 5(1): 28-42 (2006) |
| 77 | EE | Einar Mykletun,
Maithili Narasimha,
Gene Tsudik:
Authentication and integrity in outsourced databases.
TOS 2(2): 107-138 (2006) |
| 2005 |
| 76 | | Refik Molva,
Gene Tsudik,
Dirk Westhoff:
Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers
Springer 2005 |
| 75 | EE | Maithili Narasimha,
Gene Tsudik:
DSAC: integrity for outsourced databases with signature aggregation and chaining.
CIKM 2005: 235-236 |
| 74 | EE | Giuseppe Ateniese,
Daniel H. Chou,
Breno de Medeiros,
Gene Tsudik:
Sanitizable Signatures.
ESORICS 2005: 159-177 |
| 73 | EE | Nitesh Saxena,
Gene Tsudik,
Jeong Hyun Yi:
Efficient Node Admission for Short-lived Mobile Ad Hoc Networks.
ICNP 2005: 269-278 |
| 72 | EE | Claude Castelluccia,
Einar Mykletun,
Gene Tsudik:
E.cient Aggregation of encrypted data in Wireless Sensor Networks.
MobiQuitous 2005: 109-117 |
| 71 | EE | Jihye Kim,
Gene Tsudik:
SRDP: Securing Route Discovery in DSR.
MobiQuitous 2005: 247-260 |
| 70 | EE | Gene Tsudik,
Shouhuai Xu:
Brief announcement: a flexible framework for secret handshakes.
PODC 2005: 39 |
| 69 | EE | Yair Amir,
Cristina Nita-Rotaru,
Jonathan Robert Stanton,
Gene Tsudik:
Secure Spread: An Integrated Architecture for Secure Group Communication.
IEEE Trans. Dependable Sec. Comput. 2(3): 248-261 (2005) |
| 68 | EE | Kyung Hyune Rhee,
Young-Ho Park,
Gene Tsudik:
A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks.
J. Inf. Sci. Eng. 21(2): 415-428 (2005) |
| 2004 |
| 67 | EE | Claude Castelluccia,
Stanislaw Jarecki,
Gene Tsudik:
Secret Handshakes from CA-Oblivious Encryption.
ASIACRYPT 2004: 293-307 |
| 66 | EE | Balakrishna R. Iyer,
Sharad Mehrotra,
Einar Mykletun,
Gene Tsudik,
Yonghua Wu:
A Framework for Efficient Storage Security in RDBMS.
EDBT 2004: 147-164 |
| 65 | EE | Einar Mykletun,
Maithili Narasimha,
Gene Tsudik:
Signature Bouquets: Immutability for Aggregated/Condensed Signatures.
ESORICS 2004: 160-176 |
| 64 | EE | Xuhua Ding,
Gene Tsudik,
Shouhuai Xu:
Leak-Free Group Signatures with Immediate Revocation.
ICDCS 2004: 608-615 |
| 63 | EE | Nitesh Saxena,
Gene Tsudik,
Jeong Hyun Yi:
Identity-Based Access Control for Ad Hoc Groups.
ICISC 2004: 362-379 |
| 62 | EE | Einar Mykletun,
Maithili Narasimha,
Gene Tsudik:
Authentication and Integrity in Outsourced Databases.
NDSS 2004 |
| 61 | EE | Claude Castelluccia,
Stanislaw Jarecki,
Gene Tsudik:
Brief announcement: secret handshakes from CA-oblivious encryption.
PODC 2004: 394 |
| 60 | EE | Claude Castelluccia,
Stanislaw Jarecki,
Jihye Kim,
Gene Tsudik:
A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation.
SCN 2004: 193-207 |
| 59 | EE | Bijit Hore,
Sharad Mehrotra,
Gene Tsudik:
A Privacy-Preserving Index for Range Queries.
VLDB 2004: 720-731 |
| 58 | EE | Yongdae Kim,
Adrian Perrig,
Gene Tsudik:
Tree-based group key agreement.
ACM Trans. Inf. Syst. Secur. 7(1): 60-96 (2004) |
| 57 | EE | Yair Amir,
Yongdae Kim,
Cristina Nita-Rotaru,
Gene Tsudik:
On the performance of group key agreement protocols.
ACM Trans. Inf. Syst. Secur. 7(3): 457-488 (2004) |
| 56 | EE | Dan Boneh,
Xuhua Ding,
Gene Tsudik:
Fine-grained control of security capabilities.
ACM Trans. Internet Techn. 4(1): 60-82 (2004) |
| 55 | EE | Yongdae Kim,
Adrian Perrig,
Gene Tsudik:
Group Key Agreement Efficient in Communication.
IEEE Trans. Computers 53(7): 905-921 (2004) |
| 54 | EE | Yair Amir,
Yongdae Kim,
Cristina Nita-Rotaru,
John L. Schultz,
Jonathan Robert Stanton,
Gene Tsudik:
Secure Group Communication Using Robust Contributory Key Agreement.
IEEE Trans. Parallel Distrib. Syst. 15(5): 468-480 (2004) |
| 2003 |
| 53 | EE | Gene Tsudik,
Shouhuai Xu:
Accumulating Composites and Improved Group Signing.
ASIACRYPT 2003: 269-286 |
| 52 | EE | Xuhua Ding,
Gene Tsudik:
Simple Identity-Based Cryptography with Mediated RSA.
CT-RSA 2003: 193-210 |
| 51 | EE | Yair Amir,
Cristina Nita-Rotaru,
Jonathan Robert Stanton,
Gene Tsudik:
Scaling Secure Group Communication Systems: Beyond Peer-to-Peer.
DISCEX (1) 2003: 226-237 |
| 50 | EE | Maithili Narasimha,
Gene Tsudik,
Jeong Hyun Yi:
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control.
ICNP 2003: 336- |
| 49 | EE | Yongdae Kim,
Daniele Mazzocchi,
Gene Tsudik:
Admission Control in Peer Groups.
NCA 2003: 131-139 |
| 48 | EE | Nitesh Saxena,
Gene Tsudik,
Jeong Hyun Yi:
Admission control in Peer-to-Peer: design and performance evaluation.
SASN 2003: 104-113 |
| 47 | EE | Kemal Bicakci,
Gene Tsudik,
Brian Tung:
How to construct optimal one-time signatures.
Computer Networks 43(3): 339-349 (2003) |
| 2002 |
| 46 | EE | Giuseppe Ateniese,
Dawn Xiaodong Song,
Gene Tsudik:
Quasi-Efficient Revocation in Group Signatures.
Financial Cryptography 2002: 183-197 |
| 45 | EE | Yair Amir,
Yongdae Kim,
Cristina Nita-Rotaru,
Gene Tsudik:
On the Performance of Group Key Agreement Protocols.
ICDCS 2002: 463-464 |
| 44 | EE | Yongdae Kim,
Maithili Narasimha,
Fabio Maino,
Gene Tsudik:
Secure Group Services for Storage Area Networks.
IEEE Security in Storage Workshop 2002: 80-93 |
| 43 | EE | Xuhua Ding,
Daniele Mazzocchi,
Gene Tsudik:
Experimenting with Server-Aided Signatures.
NDSS 2002 |
| 42 | EE | Gene Tsudik:
Weak Forward Security in Mediated RSA.
SCN 2002: 45-54 |
| 2001 |
| 41 | EE | Yair Amir,
Cristina Nita-Rotaru,
John L. Schultz,
Jonathan Robert Stanton,
Yongdae Kim,
Gene Tsudik:
Exploring Robustness in Group Key Agreement.
ICDCS 2001: 399-408 |
| 40 | EE | Katia Obraczka,
Gene Tsudik,
Kumar Viswanath:
Pushing the Limits of Multicast in Ad Hoc Networks.
ICDCS 2001: 719-722 |
| 39 | EE | Deborah A. Agarwal,
Olivier Chevassut,
Mary R. Thompson,
Gene Tsudik:
An Integrated Solution for Secure Group Communication in Wide-Area Networks.
ISCC 2001: 22-28 |
| 38 | | Yongdae Kim,
Adrian Perrig,
Gene Tsudik:
Communication-Efficient Group Key Agreement.
SEC 2001: 229-244 |
| 37 | | Katia Obraczka,
Kumar Viswanath,
Gene Tsudik:
Flooding for Reliable Multicast in Multi-Hop Ad Hoc Networks.
Wireless Networks 7(6): 627-634 (2001) |
| 2000 |
| 36 | EE | Yongdae Kim,
Adrian Perrig,
Gene Tsudik:
Simple and fault-tolerant key agreement for dynamic collaborative groups.
ACM Conference on Computer and Communications Security 2000: 235-244 |
| 35 | EE | Giuseppe Ateniese,
Jan Camenisch,
Marc Joye,
Gene Tsudik:
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme.
CRYPTO 2000: 255-270 |
| 34 | EE | Jonathan Robert Stanton,
Yair Amir,
Damian Hasse,
Giuseppe Ateniese,
Yongdae Kim,
Cristina Nita-Rotaru,
Theo Schlossnagle,
John L. Schultz,
Gene Tsudik:
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments.
ICDCS 2000: 330-343 |
| 33 | EE | Paul F. Syverson,
Gene Tsudik,
Michael G. Reed,
Carl E. Landwehr:
Towards an Analysis of Onion Routing Security.
Workshop on Design Issues in Anonymity and Unobservability 2000: 96-114 |
| 32 | EE | Michael Steiner,
Gene Tsudik,
Michael Waidner:
Key Agreement in Dynamic Peer Groups.
IEEE Trans. Parallel Distrib. Syst. 11(8): 769-780 (2000) |
| 1999 |
| 31 | EE | Christopher Ho,
Katia Obraczka,
Gene Tsudik,
Kumar Viswanath:
Flooding for reliable multicast in multi-hop ad hoc networks.
DIAL-M 1999: 64-71 |
| 30 | EE | Giuseppe Ateniese,
Gene Tsudik:
Some Open Issues and New Directions in Group Signatures.
Financial Cryptography 1999: 196-211 |
| 29 | EE | Giuseppe Ateniese,
Gene Tsudik:
Group Signatures Á la carte.
SODA 1999: 848-849 |
| 28 | EE | Giuseppe Ateniese,
Amir Herzberg,
Hugo Krawczyk,
Gene Tsudik:
Untraceable mobility or how to travel incognito.
Computer Networks 31(8): 871-884 (1999) |
| 27 | EE | Ralf C. Hauser,
Tony Przygienda,
Gene Tsudik:
Lowering security overhead in link state routing.
Computer Networks 31(8): 885-894 (1999) |
| 1998 |
| 26 | EE | Giuseppe Ateniese,
Michael Steiner,
Gene Tsudik:
Authenticated Group Key Agreement and Friends.
ACM Conference on Computer and Communications Security 1998: 17-26 |
| 25 | EE | Ian T. Foster,
Carl Kesselman,
Gene Tsudik,
Steven Tuecke:
A Security Architecture for Computational Grids.
ACM Conference on Computer and Communications Security 1998: 83-92 |
| 24 | EE | Matthew K. Franklin,
Gene Tsudik:
Secure Group Barter: Multi-party Fair Exchange with Semi-Trusted Neutral Parties.
Financial Cryptography 1998: 90-102 |
| 23 | EE | Michael Steiner,
Gene Tsudik,
Michael Waidner:
CLIQUES: A New Approach to Group Key Agreement.
ICDCS 1998: 380-387 |
| 22 | EE | Refik Molva,
Gene Tsudik:
Secret Sets and Applications.
Inf. Process. Lett. 65(1): 47-55 (1998) |
| 1997 |
| 21 | | Philippe A. Janson,
Gene Tsudik,
Moti Yung:
Scalability and Flexibility in Authentication Services: The KryptoKnight Approach.
INFOCOM 1997: 725-736 |
| 20 | EE | Ralf C. Hauser,
Tony Przygienda,
Gene Tsudik:
Reducing the Cost of Security in Link-State Routing.
NDSS 1997 |
| 19 | | N. Asokan,
Gene Tsudik,
Michael Waidner:
Server-Supported Signatures.
Journal of Computer Security 5(1): 91-108 (1997) |
| 18 | | James P. Gray,
Ajay D. Kshemkalyani,
Stephen M. Matyas,
Mohammad Peyravian,
Gene Tsudik:
ATM cell encryption and key update synchronization.
Telecommunication Systems 7(4): 391-408 (1997) |
| 1996 |
| 17 | EE | Michael Steiner,
Gene Tsudik,
Michael Waidner:
Diffie-Hellman Key Distribution Extended to Group Communication.
ACM Conference on Computer and Communications Security 1996: 31-37 |
| 16 | EE | N. Asokan,
Gene Tsudik,
Michael Waidner:
Server-Supported Signatures.
ESORICS 1996: 131-143 |
| 15 | EE | Stefano Zatti,
Refik Molva,
Angelo Tosi,
Gene Tsudik,
Helmut Kurth:
Limitations of the Approach of Solving a Network's Security Problem with a Firewall.
ESORICS 1996: 144-145 |
| 14 | | Ralf C. Hauser,
Philippe A. Janson,
Refik Molva,
Gene Tsudik,
Els Van Herreweghen:
Robust and Secure Password and Key Change Method.
Journal of Computer Security 4(1): 97-112 (1996) |
| 1995 |
| 13 | EE | Philippe A. Janson,
Gene Tsudik:
Secure and minimal protocols for authenticated key distribution.
Computer Communications 18(9): 645-653 (1995) |
| 12 | | Michael Steiner,
Gene Tsudik,
Michael Waidner:
Refinement and Extension of Encrypted Key Exchange.
Operating Systems Review 29(3): 22-30 (1995) |
| 1994 |
| 11 | EE | Ralf C. Hauser,
Philippe A. Janson,
Refik Molva,
Gene Tsudik,
Els Van Herreweghen:
Robust and Secure Password and Key Change Method.
ESORICS 1994: 107-122 |
| 1993 |
| 10 | EE | Gene Tsudik,
Els Van Herreweghen:
On Simple and Secure Key Distribution.
ACM Conference on Computer and Communications Security 1993: 49-57 |
| 9 | | Gene Tsudik,
Els Van Herreweghen:
Some Remarks on Protecting Weak Keys and Poorly-Chosen Secrets from Guessing Attacks.
SRDS 1993: 136-142 |
| 8 | EE | Deborah Estrin,
Martha Steenstrup,
Gene Tsudik:
A protocol for route establishment and packet forwarding across multidomain internets.
IEEE/ACM Trans. Netw. 1(1): 56-70 (1993) |
| 1992 |
| 7 | EE | Refik Molva,
Gene Tsudik,
Els Van Herreweghen,
Stefano Zatti:
KryptoKnight Authentication and Key Distribution System.
ESORICS 1992: 155-174 |
| 6 | EE | Gene Tsudik:
Policy Enforcement in Stub Autonomous Domains.
ESORICS 1992: 229-257 |
| 5 | | Gene Tsudik:
Message Authentication with One-Way Hash Functions.
INFOCOM 1992: 2055-2059 |
| 1991 |
| 4 | | Deborah Estrin,
Gene Tsudik:
Secure Control of Transit Internetwork Traffic.
Computer Networks and ISDN Systems 22(5): 363-382 (1991) |
| 1990 |
| 3 | | Gene Tsudik,
Rita C. Summers:
AudES - An Expert System for Security Auditing.
IAAI 1990: 221-232 |
| 1989 |
| 2 | | Deborah Estrin,
Gene Tsudik:
Security Issues in Policy Routing.
IEEE Symposium on Security and Privacy 1989: 183-193 |
| 1987 |
| 1 | | Deborah Estrin,
Gene Tsudik:
Visa Scheme for Inter-Organization Network Security.
IEEE Symposium on Security and Privacy 1987: 174-183 |