dblp.uni-trier.dewww.uni-trier.de

Gene Tsudik

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
115EEStanislaw Jarecki, Gene Tsudik: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings Springer 2009
114EEFabio Massacci, Gene Tsudik, Artsiom Yautsiukhin: Logging key assurance indicators in business processes. ASIACCS 2009: 364-367
113EERoberto Di Pietro, Claudio Soriente, Angelo Spognardi, Gene Tsudik: Collaborative authentication in unattended WSNs. WISEC 2009: 237-244
112EEDi Ma, Claudio Soriente, Gene Tsudik: New adversary and new threats: security in unattended sensor networks. IEEE Network 23(2): 43-48 (2009)
111EENitesh Saxena, Gene Tsudik, Jeong Hyun Yi: Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs. IEEE Trans. Parallel Distrib. Syst. 20(2): 158-170 (2009)
110EEDi Ma, Gene Tsudik: A new approach to secure logging. TOS 5(1): (2009)
2008
109 Gene Tsudik: Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers Springer 2008
108EEGene Tsudik: Confronting a mobile adversary in unattended sensor networks. ASIACCS 2008: 1
107EEStanislaw Jarecki, Jihye Kim, Gene Tsudik: Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange. CT-RSA 2008: 352-369
106EEDi Ma, Gene Tsudik: A New Approach to Secure Logging. DBSec 2008: 48-63
105EEJihye Kim, Gene Tsudik: Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks. ICISC 2008: 66-83
104EEClaudio Soriente, Gene Tsudik, Ersin Uzun: HAPADEP: Human-Assisted Pure Audio Device Pairing. ISC 2008: 385-400
103EERoberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik: Catch Me (If You Can): Data Survival in Unattended Sensor Networks. PerCom 2008: 185-194
102EERoberto Di Pietro, Di Ma, Claudio Soriente, Gene Tsudik: POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks. SRDS 2008: 185-194
101EEDi Ma, Gene Tsudik: DISH: Distributed Self-Healing. SSS 2008: 47-62
100EEGene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, Melanie R. Rieback: RFID security and privacy: long-term research or short-term tinkering? WISEC 2008: 160
99EEGene Tsudik: Editorial. ACM Trans. Inf. Syst. Secur. 11(3): (2008)
2007
98EEStanislaw Jarecki, Jihye Kim, Gene Tsudik: Robust group key agreement using short broadcasts. ACM Conference on Computer and Communications Security 2007: 411-420
97EEStanislaw Jarecki, Jihye Kim, Gene Tsudik: Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement. CT-RSA 2007: 287-308
96EEMaithili Narasimha, Gene Tsudik: Privacy-Preserving Revocation Checking with Modified CRLs. EuroPKI 2007: 18-33
95EEKarim M. El Defrawy, Gene Tsudik: ALARM: Anonymous Location-Aided Routing in Suspicious MANETs. ICNP 2007: 304-313
94EEDi Ma, Gene Tsudik: Extended Abstract: Forward-Secure Sequential Aggregate Authentication. IEEE Symposium on Security and Privacy 2007: 86-91
93EEGene Tsudik: A Family of Dunces: Trivial RFID Identification and Authentication Protocols. Privacy Enhancing Technologies 2007: 45-61
92EEXuhua Ding, Daniele Mazzocchi, Gene Tsudik: Equipping smart devices with public key signatures. ACM Trans. Internet Techn. 7(1): (2007)
91EENitesh Saxena, Gene Tsudik, Jeong Hyun Yi: Threshold cryptography in P2P and MANETs: The case of access control. Computer Networks 51(12): 3632-3649 (2007)
90EEKumar Viswanath, Katia Obraczka, Gene Tsudik: Correction to "Exploring Mesh and Tree-Based Multicast Routing Protocols for MANETs". IEEE Trans. Mob. Comput. 6(2): 237 (2007)
2006
89 Ari Juels, Gene Tsudik, Shouhuai Xu, Moti Yung: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006 ACM 2006
88EEStanislaw Jarecki, Jihye Kim, Gene Tsudik: Authentication for Paranoids: Multi-party Secret Handshakes. ACNS 2006: 325-339
87EEClaude Castelluccia, Einar Mykletun, Gene Tsudik: Improving secure server performance by re-balancing SSL/TLS handshakes. ASIACCS 2006: 26-34
86EEMaithili Narasimha, Gene Tsudik: Authentication of Outsourced Databases Using Signature Aggregation and Chaining. DASFAA 2006: 420-436
85EEEinar Mykletun, Gene Tsudik: Aggregation Queries in the Database-As-a-Service Model. DBSec 2006: 89-103
84EESamad Nasserian, Gene Tsudik: Revisiting Oblivious Signature-Based Envelopes. Financial Cryptography 2006: 221-235
83EEMichael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, Ersin Uzun: Loud and Clear: Human-Verifiable Authentication Based on Audio. ICDCS 2006: 10
82EEGene Tsudik: YA-TRAP: Yet Another Trivial RFID Authentication Protocol. PerCom Workshops 2006: 640-643
81EEGene Tsudik, Shouhuai Xu: A Flexible Framework for Secret Handshakes. Privacy Enhancing Technologies 2006: 295-315
80EEJohn Solis, Gene Tsudik: Simple and Flexible Revocation Checking with Privacy. Privacy Enhancing Technologies 2006: 351-367
79EEClaude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik: Secure acknowledgment aggregation and multisignatures with limited robustness. Computer Networks 50(10): 1639-1652 (2006)
78EEKumar Viswanath, Katia Obraczka, Gene Tsudik: Exploring Mesh and Tree-Based Multicast Routing Protocols for MANETs. IEEE Trans. Mob. Comput. 5(1): 28-42 (2006)
77EEEinar Mykletun, Maithili Narasimha, Gene Tsudik: Authentication and integrity in outsourced databases. TOS 2(2): 107-138 (2006)
2005
76 Refik Molva, Gene Tsudik, Dirk Westhoff: Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers Springer 2005
75EEMaithili Narasimha, Gene Tsudik: DSAC: integrity for outsourced databases with signature aggregation and chaining. CIKM 2005: 235-236
74EEGiuseppe Ateniese, Daniel H. Chou, Breno de Medeiros, Gene Tsudik: Sanitizable Signatures. ESORICS 2005: 159-177
73EENitesh Saxena, Gene Tsudik, Jeong Hyun Yi: Efficient Node Admission for Short-lived Mobile Ad Hoc Networks. ICNP 2005: 269-278
72EEClaude Castelluccia, Einar Mykletun, Gene Tsudik: E.cient Aggregation of encrypted data in Wireless Sensor Networks. MobiQuitous 2005: 109-117
71EEJihye Kim, Gene Tsudik: SRDP: Securing Route Discovery in DSR. MobiQuitous 2005: 247-260
70EEGene Tsudik, Shouhuai Xu: Brief announcement: a flexible framework for secret handshakes. PODC 2005: 39
69EEYair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton, Gene Tsudik: Secure Spread: An Integrated Architecture for Secure Group Communication. IEEE Trans. Dependable Sec. Comput. 2(3): 248-261 (2005)
68EEKyung Hyune Rhee, Young-Ho Park, Gene Tsudik: A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks. J. Inf. Sci. Eng. 21(2): 415-428 (2005)
2004
67EEClaude Castelluccia, Stanislaw Jarecki, Gene Tsudik: Secret Handshakes from CA-Oblivious Encryption. ASIACRYPT 2004: 293-307
66EEBalakrishna R. Iyer, Sharad Mehrotra, Einar Mykletun, Gene Tsudik, Yonghua Wu: A Framework for Efficient Storage Security in RDBMS. EDBT 2004: 147-164
65EEEinar Mykletun, Maithili Narasimha, Gene Tsudik: Signature Bouquets: Immutability for Aggregated/Condensed Signatures. ESORICS 2004: 160-176
64EEXuhua Ding, Gene Tsudik, Shouhuai Xu: Leak-Free Group Signatures with Immediate Revocation. ICDCS 2004: 608-615
63EENitesh Saxena, Gene Tsudik, Jeong Hyun Yi: Identity-Based Access Control for Ad Hoc Groups. ICISC 2004: 362-379
62EEEinar Mykletun, Maithili Narasimha, Gene Tsudik: Authentication and Integrity in Outsourced Databases. NDSS 2004
61EEClaude Castelluccia, Stanislaw Jarecki, Gene Tsudik: Brief announcement: secret handshakes from CA-oblivious encryption. PODC 2004: 394
60EEClaude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik: A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation. SCN 2004: 193-207
59EEBijit Hore, Sharad Mehrotra, Gene Tsudik: A Privacy-Preserving Index for Range Queries. VLDB 2004: 720-731
58EEYongdae Kim, Adrian Perrig, Gene Tsudik: Tree-based group key agreement. ACM Trans. Inf. Syst. Secur. 7(1): 60-96 (2004)
57EEYair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene Tsudik: On the performance of group key agreement protocols. ACM Trans. Inf. Syst. Secur. 7(3): 457-488 (2004)
56EEDan Boneh, Xuhua Ding, Gene Tsudik: Fine-grained control of security capabilities. ACM Trans. Internet Techn. 4(1): 60-82 (2004)
55EEYongdae Kim, Adrian Perrig, Gene Tsudik: Group Key Agreement Efficient in Communication. IEEE Trans. Computers 53(7): 905-921 (2004)
54EEYair Amir, Yongdae Kim, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Gene Tsudik: Secure Group Communication Using Robust Contributory Key Agreement. IEEE Trans. Parallel Distrib. Syst. 15(5): 468-480 (2004)
2003
53EEGene Tsudik, Shouhuai Xu: Accumulating Composites and Improved Group Signing. ASIACRYPT 2003: 269-286
52EEXuhua Ding, Gene Tsudik: Simple Identity-Based Cryptography with Mediated RSA. CT-RSA 2003: 193-210
51EEYair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton, Gene Tsudik: Scaling Secure Group Communication Systems: Beyond Peer-to-Peer. DISCEX (1) 2003: 226-237
50EEMaithili Narasimha, Gene Tsudik, Jeong Hyun Yi: On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control. ICNP 2003: 336-
49EEYongdae Kim, Daniele Mazzocchi, Gene Tsudik: Admission Control in Peer Groups. NCA 2003: 131-139
48EENitesh Saxena, Gene Tsudik, Jeong Hyun Yi: Admission control in Peer-to-Peer: design and performance evaluation. SASN 2003: 104-113
47EEKemal Bicakci, Gene Tsudik, Brian Tung: How to construct optimal one-time signatures. Computer Networks 43(3): 339-349 (2003)
2002
46EEGiuseppe Ateniese, Dawn Xiaodong Song, Gene Tsudik: Quasi-Efficient Revocation in Group Signatures. Financial Cryptography 2002: 183-197
45EEYair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene Tsudik: On the Performance of Group Key Agreement Protocols. ICDCS 2002: 463-464
44EEYongdae Kim, Maithili Narasimha, Fabio Maino, Gene Tsudik: Secure Group Services for Storage Area Networks. IEEE Security in Storage Workshop 2002: 80-93
43EEXuhua Ding, Daniele Mazzocchi, Gene Tsudik: Experimenting with Server-Aided Signatures. NDSS 2002
42EEGene Tsudik: Weak Forward Security in Mediated RSA. SCN 2002: 45-54
2001
41EEYair Amir, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Yongdae Kim, Gene Tsudik: Exploring Robustness in Group Key Agreement. ICDCS 2001: 399-408
40EEKatia Obraczka, Gene Tsudik, Kumar Viswanath: Pushing the Limits of Multicast in Ad Hoc Networks. ICDCS 2001: 719-722
39EEDeborah A. Agarwal, Olivier Chevassut, Mary R. Thompson, Gene Tsudik: An Integrated Solution for Secure Group Communication in Wide-Area Networks. ISCC 2001: 22-28
38 Yongdae Kim, Adrian Perrig, Gene Tsudik: Communication-Efficient Group Key Agreement. SEC 2001: 229-244
37 Katia Obraczka, Kumar Viswanath, Gene Tsudik: Flooding for Reliable Multicast in Multi-Hop Ad Hoc Networks. Wireless Networks 7(6): 627-634 (2001)
2000
36EEYongdae Kim, Adrian Perrig, Gene Tsudik: Simple and fault-tolerant key agreement for dynamic collaborative groups. ACM Conference on Computer and Communications Security 2000: 235-244
35EEGiuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik: A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. CRYPTO 2000: 255-270
34EEJonathan Robert Stanton, Yair Amir, Damian Hasse, Giuseppe Ateniese, Yongdae Kim, Cristina Nita-Rotaru, Theo Schlossnagle, John L. Schultz, Gene Tsudik: Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments. ICDCS 2000: 330-343
33EEPaul F. Syverson, Gene Tsudik, Michael G. Reed, Carl E. Landwehr: Towards an Analysis of Onion Routing Security. Workshop on Design Issues in Anonymity and Unobservability 2000: 96-114
32EEMichael Steiner, Gene Tsudik, Michael Waidner: Key Agreement in Dynamic Peer Groups. IEEE Trans. Parallel Distrib. Syst. 11(8): 769-780 (2000)
1999
31EEChristopher Ho, Katia Obraczka, Gene Tsudik, Kumar Viswanath: Flooding for reliable multicast in multi-hop ad hoc networks. DIAL-M 1999: 64-71
30EEGiuseppe Ateniese, Gene Tsudik: Some Open Issues and New Directions in Group Signatures. Financial Cryptography 1999: 196-211
29EEGiuseppe Ateniese, Gene Tsudik: Group Signatures Á la carte. SODA 1999: 848-849
28EEGiuseppe Ateniese, Amir Herzberg, Hugo Krawczyk, Gene Tsudik: Untraceable mobility or how to travel incognito. Computer Networks 31(8): 871-884 (1999)
27EERalf C. Hauser, Tony Przygienda, Gene Tsudik: Lowering security overhead in link state routing. Computer Networks 31(8): 885-894 (1999)
1998
26EEGiuseppe Ateniese, Michael Steiner, Gene Tsudik: Authenticated Group Key Agreement and Friends. ACM Conference on Computer and Communications Security 1998: 17-26
25EEIan T. Foster, Carl Kesselman, Gene Tsudik, Steven Tuecke: A Security Architecture for Computational Grids. ACM Conference on Computer and Communications Security 1998: 83-92
24EEMatthew K. Franklin, Gene Tsudik: Secure Group Barter: Multi-party Fair Exchange with Semi-Trusted Neutral Parties. Financial Cryptography 1998: 90-102
23EEMichael Steiner, Gene Tsudik, Michael Waidner: CLIQUES: A New Approach to Group Key Agreement. ICDCS 1998: 380-387
22EERefik Molva, Gene Tsudik: Secret Sets and Applications. Inf. Process. Lett. 65(1): 47-55 (1998)
1997
21 Philippe A. Janson, Gene Tsudik, Moti Yung: Scalability and Flexibility in Authentication Services: The KryptoKnight Approach. INFOCOM 1997: 725-736
20EERalf C. Hauser, Tony Przygienda, Gene Tsudik: Reducing the Cost of Security in Link-State Routing. NDSS 1997
19 N. Asokan, Gene Tsudik, Michael Waidner: Server-Supported Signatures. Journal of Computer Security 5(1): 91-108 (1997)
18 James P. Gray, Ajay D. Kshemkalyani, Stephen M. Matyas, Mohammad Peyravian, Gene Tsudik: ATM cell encryption and key update synchronization. Telecommunication Systems 7(4): 391-408 (1997)
1996
17EEMichael Steiner, Gene Tsudik, Michael Waidner: Diffie-Hellman Key Distribution Extended to Group Communication. ACM Conference on Computer and Communications Security 1996: 31-37
16EEN. Asokan, Gene Tsudik, Michael Waidner: Server-Supported Signatures. ESORICS 1996: 131-143
15EEStefano Zatti, Refik Molva, Angelo Tosi, Gene Tsudik, Helmut Kurth: Limitations of the Approach of Solving a Network's Security Problem with a Firewall. ESORICS 1996: 144-145
14 Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen: Robust and Secure Password and Key Change Method. Journal of Computer Security 4(1): 97-112 (1996)
1995
13EEPhilippe A. Janson, Gene Tsudik: Secure and minimal protocols for authenticated key distribution. Computer Communications 18(9): 645-653 (1995)
12 Michael Steiner, Gene Tsudik, Michael Waidner: Refinement and Extension of Encrypted Key Exchange. Operating Systems Review 29(3): 22-30 (1995)
1994
11EERalf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen: Robust and Secure Password and Key Change Method. ESORICS 1994: 107-122
1993
10EEGene Tsudik, Els Van Herreweghen: On Simple and Secure Key Distribution. ACM Conference on Computer and Communications Security 1993: 49-57
9 Gene Tsudik, Els Van Herreweghen: Some Remarks on Protecting Weak Keys and Poorly-Chosen Secrets from Guessing Attacks. SRDS 1993: 136-142
8EEDeborah Estrin, Martha Steenstrup, Gene Tsudik: A protocol for route establishment and packet forwarding across multidomain internets. IEEE/ACM Trans. Netw. 1(1): 56-70 (1993)
1992
7EERefik Molva, Gene Tsudik, Els Van Herreweghen, Stefano Zatti: KryptoKnight Authentication and Key Distribution System. ESORICS 1992: 155-174
6EEGene Tsudik: Policy Enforcement in Stub Autonomous Domains. ESORICS 1992: 229-257
5 Gene Tsudik: Message Authentication with One-Way Hash Functions. INFOCOM 1992: 2055-2059
1991
4 Deborah Estrin, Gene Tsudik: Secure Control of Transit Internetwork Traffic. Computer Networks and ISDN Systems 22(5): 363-382 (1991)
1990
3 Gene Tsudik, Rita C. Summers: AudES - An Expert System for Security Auditing. IAAI 1990: 221-232
1989
2 Deborah Estrin, Gene Tsudik: Security Issues in Policy Routing. IEEE Symposium on Security and Privacy 1989: 183-193
1987
1 Deborah Estrin, Gene Tsudik: Visa Scheme for Inter-Organization Network Security. IEEE Symposium on Security and Privacy 1987: 174-183

Coauthor Index

1Deborah A. Agarwal [39]
2Yair Amir [34] [41] [45] [51] [54] [57] [69]
3N. Asokan [16] [19]
4Giuseppe Ateniese [26] [28] [29] [30] [34] [35] [46] [74]
5Kemal Bicakci [47]
6Dan Boneh [56]
7Mike Burmester [100]
8Jan Camenisch [35]
9Claude Castelluccia [60] [61] [67] [72] [79] [87]
10Olivier Chevassut [39]
11Daniel H. Chou [74]
12Karim M. El Defrawy [95]
13Xuhua Ding [43] [52] [56] [64] [92]
14Deborah Estrin [1] [2] [4] [8]
15Ian T. Foster [25]
16Matthew K. Franklin [24]
17Michael T. Goodrich [83]
18James P. Gray [18]
19Damian Hasse [34]
20Ralf C. Hauser [11] [14] [20] [27]
21Els Van Herreweghen [7] [9] [10] [11] [14]
22Amir Herzberg [28]
23Christopher Ho [31]
24Bijit Hore [59]
25Balakrishna R. Iyer [66]
26Philippe A. Janson [11] [13] [14] [21]
27Stanislaw Jarecki [60] [61] [67] [79] [88] [97] [98] [107] [115]
28Marc Joye [35]
29Ari Juels [89] [100]
30Carl Kesselman [25]
31Jihye Kim [60] [71] [79] [88] [97] [98] [105] [107]
32Yongdae Kim [34] [36] [38] [41] [44] [45] [49] [54] [55] [57] [58]
33Alfred Kobsa [100]
34Hugo Krawczyk [28]
35Ajay D. Kshemkalyani [18]
36Helmut Kurth [15]
37Carl E. Landwehr [33]
38Di Ma [94] [101] [102] [106] [110] [112]
39Fabio Maino [44]
40Luigi V. Mancini [103]
41Fabio Massacci [114]
42Stephen M. Matyas [18]
43Daniele Mazzocchi [43] [49] [92]
44Breno de Medeiros [74]
45Sharad Mehrotra [59] [66]
46David Molnar [100]
47Refik Molva [7] [11] [14] [15] [22] [76]
48Einar Mykletun [62] [65] [66] [72] [77] [85] [87]
49Maithili Narasimha [44] [50] [62] [65] [75] [77] [86] [96]
50Samad Nasserian [84]
51Cristina Nita-Rotaru [34] [41] [45] [51] [54] [57] [69]
52Katia Obraczka [31] [37] [40] [78] [90]
53Young-Ho Park [68]
54Adrian Perrig [36] [38] [55] [58]
55Mohammad Peyravian [18]
56Roberto Di Pietro [100] [102] [103] [113]
57Tony Przygienda [20] [27]
58Michael G. Reed [33]
59Kyung Hyune Rhee [68]
60Melanie R. Rieback [100]
61Nitesh Saxena [48] [63] [73] [91] [111]
62Theo Schlossnagle [34]
63John L. Schultz [34] [41] [54]
64Michael Sirivianos [83]
65John Solis [80] [83]
66Dawn Xiaodong Song [46]
67Claudio Soriente [102] [103] [104] [112] [113]
68Angelo Spognardi [103] [113]
69Jonathan Robert Stanton [34] [41] [51] [54] [69]
70Martha Steenstrup [8]
71Michael Steiner [12] [17] [23] [26] [32]
72Rita C. Summers [3]
73Paul F. Syverson [33]
74Mary R. Thompson [39]
75Angelo Tosi [15]
76Steven Tuecke [25]
77Brian Tung [47]
78Ersin Uzun [83] [104]
79Kumar Viswanath [31] [37] [40] [78] [90]
80Michael Waidner [12] [16] [17] [19] [23] [32]
81Dirk Westhoff [76]
82Yonghua Wu [66]
83Shouhuai Xu [53] [64] [70] [81] [89]
84Artsiom Yautsiukhin [114]
85Jeong Hyun Yi [48] [50] [63] [73] [91] [111]
86Moti Yung (Mordechai M. Yung) [21] [89]
87Stefano Zatti [7] [15]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)