Liviu Iftode - Publications

Affiliations: 
Rutgers University, New Brunswick, New Brunswick, NJ, United States 
Area:
Computer Science

44 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2016 Kwak D, Liu R, Kim D, Nath B, Iftode L. Seeing Is Believing: Sharing Real-Time Visual Traffic Information via Vehicular Clouds Ieee Access. 4: 3617-3631. DOI: 10.1109/Access.2016.2569585  0.363
2013 Smaldone S, Gilbert B, Harkes J, Iftode L, Satyanarayanan M. Optimizing storage performance for VM-based mobile computing Acm Transactions On Computer Systems. 31. DOI: 10.1145/2465346.2465348  0.686
2013 Kinebuchi Y, Butt S, Ganapathy V, Iftode L, Nakajima T. Monitoring integrity using limited local memory Ieee Transactions On Information Forensics and Security. 8: 1230-1242. DOI: 10.1109/Tifs.2013.2266095  0.401
2012 Datta A, Dikaiakos MD, Haridi S, Iftode L. Infrastructures for online social networking services Ieee Internet Computing. 16: 10-12. DOI: 10.1109/Mic.2012.53  0.403
2011 Baliga A, Ganapathy V, Iftode L. Detecting kernel-level rootkits using data structure invariants Ieee Transactions On Dependable and Secure Computing. 8: 670-684. DOI: 10.1109/Tdsc.2010.38  0.645
2011 Xu G, Borcea C, Iftode L. A policy enforcing mechanism for trusted ad hoc networks Ieee Transactions On Dependable and Secure Computing. 8: 321-326. DOI: 10.1109/Tdsc.2010.11  0.72
2010 Bickford J, O'Hare R, Baliga A, Ganapathy V, Iftode L. Rootkits on smart phones: Attacks, implications and opportunities Hotmobile 2010: the 11th Workshop On Mobile Computing Systems and Applications. 49-53. DOI: 10.1145/1734583.1734596  0.674
2009 Baliga A, Kamat P, Ganapathy V, Iftode L. Identifying systemic threats to kernel data: Attacks and defense techniques Advanced Operating Systems and Kernel Applications: Techniques and Technologies. 46-70. DOI: 10.4018/978-1-60566-850-5.ch003  0.66
2009 Smaldone S, Ganapathy V, Iftode L. Working set-based access control for network file systems Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 207-216. DOI: 10.1145/1542207.1542241  0.301
2008 Baliga A, Ganapathy V, Iftode L. Automatic inference and enforcement of kernel data structure invariants Proceedings - Annual Computer Security Applications Conference, Acsac. 77-86. DOI: 10.1109/ACSAC.2008.29  0.629
2008 Baliga A, Iftode L, Chen X. Automated containment of rootkits attacks Computers and Security. 27: 323-334. DOI: 10.1016/J.Cose.2008.06.003  0.668
2008 Pathak V, Iftode L, Yao D. Improving email trustworthiness through social-group key authentication 5th Conference On Email and Anti-Spam, Ceas 2008 0.569
2007 Riva O, Nadeem T, Borcea C, Iftode L. Context-aware migratory services in ad hoc networks Ieee Transactions On Mobile Computing. 6: 1313-1328. DOI: 10.1109/Tmc.2007.1053  0.757
2007 Baliga A, Kamat P, Iftode L. Lurking in the shadows: Identifying systemic threats to kernel data (short paper) Proceedings - Ieee Symposium On Security and Privacy. 246-251. DOI: 10.1109/SP.2007.25  0.663
2007 Bohra A, Iftode L. Improving network processing concurrency using TCPServers Proceedings - 6th Ieee International Symposium On Network Computing and Applications, Nca 2007. 213-220. DOI: 10.1109/NCA.2007.31  0.609
2007 Bohra A, Smaldone S, Iftode L. FRAC: Implementing role-based access control for network file systems Proceedings - 6th Ieee International Symposium On Network Computing and Applications, Nca 2007. 95-102. DOI: 10.1109/NCA.2007.25  0.659
2007 Dikaiakos MD, Florides A, Nadeem T, Iftode L. Location-aware services over vehicular ad-hoc networks using car-to-car communication Ieee Journal On Selected Areas in Communications. 25: 1590-1602. DOI: 10.1109/Jsac.2007.071008  0.475
2007 Smaldone S, Bohra A, Iftode L. File wall: A firewall for network file systems Proceedings - Dasc 2007: Third Ieee International Symposium On Dependable, Autonomic and Secure Computing. 153-162. DOI: 10.1109/ISDASC.2007.4351400  0.644
2007 Ravi N, Iftode L. Outdoor distributed computing with split smart messages Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4322: 161-183.  0.575
2006 Picconi F, Ravi N, Gruteser M, Iftode L. Probabilistic validation of aggregated data in vehicular ad-hoc networks Vanet - Proceedings of the Third Acm International Workshop On Vehicular Ad Hoc Networks. 2006: 76-85. DOI: 10.1145/1161064.1161077  0.327
2006 Gang X, Borcea C, Iftode L. Satem: Trusted service code execution across transactions Proceedings of the Ieee Symposium On Reliable Distributed Systems. 321-334. DOI: 10.1109/SRDS.2006.42  0.358
2006 Ravi N, Gruteser M, Iftode L. Non-inference: An information flow control model for location-based services 2006 3rd Annual International Conference On Mobile and Ubiquitous Systems, Mobiquitous - Workshops. DOI: 10.1109/MOBIQW.2006.361739  0.538
2006 Pathak V, Iftode L. Byzantine fault tolerant public key authentication in peer-to-peer systems Computer Networks. 50: 580-597. DOI: 10.1016/J.Comnet.2005.07.007  0.563
2005 Ravi N, Stern P, Desai N, Iftode L. Accessing ubiquitous services using smart phones Proceedings - Third Ieee International Conference On Pervasive Computing and Communications, Percom 2005. 2005: 383-393. DOI: 10.1109/PERCOM.2005.6  0.603
2005 Sultan F, Bohra A, Smaldone S, Pan Y, Gallard P, Neamtiu I, Iftode L. Recovering internet service sessions from operating system failures Ieee Internet Computing. 9: 17-27. DOI: 10.1109/Mic.2005.45  0.662
2005 Zhou P, Nadeem T, Kang P, Borcea C, Iftode L. EZCab: A cab booking application using short-range wireless communication Proceedings - Third Ieee International Conference On Pervasive Computing and Communications, Percom 2005. 2005: 27-40.  0.317
2005 Iftode L, Baliga A, Bohra A, Smaldone S, Sultan F. Defending network-centric systems using backdoors Collection of Technical Papers - Infotech At Aerospace: Advancing Contemporary Aerospace Technologies and Their Integration. 3: 1746-1752.  0.745
2004 Ni Y, Kremer U, Iftode L. A programming language for ad-hoc networks of mobile devices Acm International Conference Proceeding Series. 81. DOI: 10.1145/1066650.1066662  0.312
2004 Nadeem T, Dashtinezhad S, Liao C, Iftode L. TrafficView: traffic data dissemination using car-to-car communication Mobile Computing and Communications Review. 8: 6-19. DOI: 10.1145/1031483.1031487  0.306
2004 Ravi N, Borcea C, Kang P, Iftode L. Portable smart messages for ubiquitous java-enabled devices Proceedings of Mobiquitous 2004 - 1st Annual International Conference On Mobile and Ubiquitous Systems: Networking and Services. 412-421. DOI: 10.1109/MOBIQ.2004.1331748  0.335
2004 Kang P, Borcea C, Xu G, Saxena A, Kremer U, Iftode L. Smart messages: A distributed computing platform for networks of embedded systems Computer Journal. 47: 475-494. DOI: 10.1093/Comjnl/47.4.475  0.733
2004 Xu G, Iftode L. Locality driven key management architecture for mobile ad-hoc networks 2004 Ieee International Conference On Mobile Ad-Hoc and Sensor Systems. 436-446.  0.351
2004 Ni Y, Kremer U, Iftode L. Spatial views: Space-aware programming for networks of embedded systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2958: 258-272.  0.315
2003 Youssef M, Elsayed T, Hussein M, Nadeem T, Youssef A, Iftode L. Instance-based networking: a communication paradigm for mobile applications Mobile Computing and Communications Review. 7: 66-67. DOI: 10.1145/965732.965748  0.377
2003 Xu G, Borcea C, Iftode L. Toward a security architecture for smart messages: Challenges, solutions, and open issues Proceedings - 23rd International Conference On Distributed Computing Systems Workshops, Icdcsw 2003. 454-460. DOI: 10.1109/ICDCSW.2003.1203594  0.337
2003 Sultan F, Bohra A, Iftode L. Service continuations: An operating system mechanism for dynamic migration of Internet service sessions Proceedings of the Ieee Symposium On Reliable Distributed Systems. 177-186.  0.712
2002 Sultan F, Nguyen TD, Iftode L. Lazy garbage collection of recovery state for fault-tolerant distributed shared memory Ieee Transactions On Parallel and Distributed Systems. 13: 1085-1098. DOI: 10.1109/Tpds.2002.1019857  0.61
2002 Borcea C, Iyer D, Kang P, Saxena A, Iftode L. Cooperative computing for distributed embedded systems Proceedings - International Conference On Distributed Computing Systems. 227-236.  0.311
2002 Sultan F, Srinivasan K, Iyer D, Iftode L. Migratory TCP: Connection migration for service continuity in the internet Proceedings - International Conference On Distributed Computing Systems. 469-470.  0.595
2001 Phatak SH, Esakki V, Badrinath BR, Iftode L. Web&: An architecture for non-interactive Web Proceedings - 2nd Ieee Workshop On Internet Applications, Wiapp 2001. 104-112. DOI: 10.1109/WIAPP.2001.941877  0.368
2001 Sultan F, Srinivasan K, Iftode L. Transport layer support for highly-available network services Proceedings of the Workshop On Hot Topics in Operating Systems - Hotos. 182.  0.58
2001 Stanley-Marbell P, Borcea C, Nagaraja K, Iftode L. Smart messages: A system architecture for large networks of embedded systems Proceedings of the Workshop On Hot Topics in Operating Systems - Hotos. 181.  0.306
1998 Iftode L, Singh JP, Li K. Scope Consistency: A Bridge between Release Consistency and Entry Consistency Theory of Computing Systems \/ Mathematical Systems Theory. 31: 451-473. DOI: 10.1007/S002240000097  0.387
1995 Cáceres R, Iftode L. Improving the Performance of Reliable Transport Protocols in Mobile Computing Environments Ieee Journal On Selected Areas in Communications. 13: 850-857. DOI: 10.1109/49.391749  0.395
Show low-probability matches.