Gene Tsudik - Publications

Affiliations: 
University of Southern California, Los Angeles, CA, United States 
Area:
Computer Science

147 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2019 Carpent X, Rattanavipanon N, Tsudik G. Remote Attestation via Self-Measurement Acm Transactions On Design Automation of Electronic Systems. 24: 11. DOI: 10.1145/3279950  0.389
2019 Ghali C, Tsudik G, Uzun E. In Content We Trust: Network-Layer Trust in Content-Centric Networking Ieee Acm Transactions On Networking. 27: 1787-1800. DOI: 10.1109/Tnet.2019.2926320  0.439
2019 Acs G, Conti M, Gasti P, Ghali C, Tsudik G, Wood CA. Privacy-Aware Caching in Information-Centric Networking Ieee Transactions On Dependable and Secure Computing. 16: 313-328. DOI: 10.1109/Tdsc.2017.2679711  0.442
2019 Tan H, Tsudik G, Jha SK. MTRA: Multi-Tier randomized remote attestation in IoT networks Computers & Security. 81: 78-93. DOI: 10.1016/J.Cose.2018.10.008  0.383
2018 Asokan N, Nyman T, Rattanavipanon N, Sadeghi A, Tsudik G. ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 37: 2290-2300. DOI: 10.1109/Tcad.2018.2858422  0.48
2018 Ambrosin M, Compagno A, Conti M, Ghali C, Tsudik G. Security and Privacy Analysis of National Science Foundation Future Internet Architectures Ieee Communications Surveys and Tutorials. 20: 1418-1442. DOI: 10.1109/Comst.2018.2798280  0.488
2018 Ding X, Tsudik G. Initializing trust in smart devices via presence attestation Computer Communications. 131: 35-38. DOI: 10.1016/J.Comcom.2018.07.004  0.657
2017 Martinovic I, Rasmussen K, Roeschlin M, Tsudik G. Authentication using pulse-response biometrics Communications of the Acm. 60: 108-115. DOI: 10.1145/3023359  0.363
2016 Abera T, Asokan N, Davi L, Koushanfar F, Paverd A, Sadeghi AR, Tsudik G. Invited - Things, trouble, trust: On building trust in IoT systems Proceedings - Design Automation Conference. 5. DOI: 10.1145/2897937.2905020  0.355
2016 Brasser F, Rasmussen KB, Sadeghi AR, Tsudik G. Remote attestation for low-end embedded devices: The prover's perspective Proceedings - Design Automation Conference. 5. DOI: 10.1145/2897937.2898083  0.407
2016 Asokan N, Brasser F, Ibrahim A, Sadeghi AR, Schunter M, Tsudik G, Wachsmann C. SEDA: Scalable embedded device attestation Proceedings of the Acm Conference On Computer and Communications Security. 2015: 964-975. DOI: 10.1145/2810103.2813670  0.349
2016 Ghali C, Tsudik G, Wood CA, Yeh E. Practical accounting in content-centric networking Proceedings of the Noms 2016 - 2016 Ieee/Ifip Network Operations and Management Symposium. 436-444. DOI: 10.1109/NOMS.2016.7502841  0.338
2016 Ghali C, Narayanan A, Oran D, Tsudik G, Wood CA. Secure fragmentation for content-centric networks Proceedings - 2015 Ieee 14th International Symposium On Network Computing and Applications, Nca 2015. 47-56. DOI: 10.1109/NCA.2015.34  0.413
2015 Kaczmarek T, Kobsa A, Sy R, Tsudik G. An Unattended Study of Users Performing Security Critical Tasks Under Adversarial Noise Arxiv: Human-Computer Interaction. DOI: 10.14722/Usec.2015.23014  0.34
2015 Ghali C, Schlosberg MA, Tsudik G, Wood CA. Interest-based access control for content-centric networks Icn 2015 - Proceedings of the 2nd International Conference On Information-Centric Networking. 147-156. DOI: 10.1145/2810156.2810174  0.352
2015 Compagno A, Conti M, Ghali C, Tsudik G. To NACK or not to NACK? Negative acknowledgments in information-centric networking Proceedings - International Conference On Computer Communications and Networks, Icccn. 2015. DOI: 10.1109/ICCCN.2015.7288477  0.409
2015 Compagno A, Conti M, Gasti P, Mancini LV, Tsudik G. Violating consumer anonymity: Geo-locating nodes in named data networking Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9092: 243-262. DOI: 10.1007/978-3-319-28166-7_12  0.336
2014 Francillon A, Nguyen Q, Rasmussen KB, Tsudik G. A minimalist approach to Remote Attestation Proceedings -Design, Automation and Test in Europe, Date. DOI: 10.7873/DATE2014.257  0.406
2014 Ali ST, Sivaraman V, Ostry D, Tsudik G, Jha S. Securing first-hop data provenance for bodyworn devices using wireless link fingerprints Ieee Transactions On Information Forensics and Security. 9: 2193-2204. DOI: 10.1109/Tifs.2014.2357998  0.479
2014 Burke J, Gasti P, Nathan N, Tsudik G. Secure sensing over named data networking Proceedings - 2014 Ieee 13th International Symposium On Network Computing and Applications, Nca 2014. 175-180. DOI: 10.1109/NCA.2014.34  0.426
2013 Kobsa A, Nithyanand R, Tsudik G, Uzun E. Can Jannie verify? Usability of display-equipped RFID tags for security purposes Journal of Computer Security. 21: 347-370. DOI: 10.3233/Jcs-130470  0.493
2013 Almishari M, Gastiz P, Nathan N, Tsudik G. Optimizing bi-directional low-latency communication in Named Data Networking Computer Communication Review. 44: 13-19. DOI: 10.1145/2567561.2567564  0.323
2013 Di Pietro R, Oligeri G, Soriente C, Tsudik G. United we stand: Intrusion resilience in mobile unattended WSNs Ieee Transactions On Mobile Computing. 12: 1456-1468. DOI: 10.1109/Tmc.2012.126  0.394
2013 Compagno A, Conti M, Gasti P, Tsudik G. Poseidon: Mitigating interest flooding DDoS attacks in named data networking Proceedings - Conference On Local Computer Networks, Lcn. 630-638. DOI: 10.1109/LCN.2013.6761300  0.388
2013 Acs G, Conti M, Gasti P, Ghali C, Tsudik G. Cache privacy in named-data networking Proceedings - International Conference On Distributed Computing Systems. 41-51. DOI: 10.1109/ICDCS.2013.12  0.332
2013 Gasti P, Tsudik G, Uzun E, Zhang L. DoS and DDoS in named data networking Proceedings - International Conference On Computer Communications and Networks, Icccn. DOI: 10.1109/ICCCN.2013.6614127  0.415
2012 Di Pietro R, Ma D, Soriente C, Tsudik G. Self-healing in unattended wireless sensor networks Acm Transactions On Sensor Networks. 9. DOI: 10.1145/2379799.2379806  0.394
2012 Cheon JH, Hong J, Tsudik G. Reducing RFID reader load with the meet-in-the-middle strategy Journal of Communications and Networks. 14: 10-14. DOI: 10.1109/Jcn.2012.6184545  0.377
2012 Conti M, Das SK, Bisdikian C, Kumar M, Ni LM, Passarella A, Roussos G, Tröster G, Tsudik G, Zambonelli F. Looking ahead in pervasive computing: Challenges and opportunities in the era of cyberphysical convergence Pervasive and Mobile Computing. 8: 2-21. DOI: 10.1016/J.Pmcj.2011.10.001  0.355
2011 Nithyanand R, Tsudik G, Uzun E. User-aided reader revocation in PKI-based RFID systems Journal of Computer Security. 19: 1147-1172. DOI: 10.3233/Jcs-2011-0435  0.477
2011 Das SK, Noubir G, Molva R, Tsudik G, Zhang N. Message from the workshop chairs 2011 Ieee International Symposium On a World of Wireless, Mobile and Multimedia Networks, Wowmom 2011 - Digital Proceedings. DOI: 10.1109/WoWMoM.2011.5986126  0.381
2011 Jarecki S, Kim J, Tsudik G. Flexible robust group key agreement Ieee Transactions On Parallel and Distributed Systems. 22: 879-886. DOI: 10.1109/Tpds.2010.128  0.479
2011 El Defrawy K, Tsudik G. Privacy-preserving location-based on-demand routing in MANETs Ieee Journal On Selected Areas in Communications. 29: 1926-1934. DOI: 10.1109/Jsac.2011.111203  0.548
2011 Di Pietro R, Soriente C, Spognardi A, Tsudik G. Intrusion-resilient integrity in data-centric unattended WSNs Pervasive and Mobile Computing. 7: 495-508. DOI: 10.1016/J.Pmcj.2010.12.003  0.412
2011 Kobsa A, Nithyanand R, Tsudik G, Uzun E. Usability of display-equipped RFID tags for security purposes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6879: 434-451. DOI: 10.1007/978-3-642-23822-2_24  0.4
2011 Lu Y, Tsudik G. Enhancing data privacy in the cloud Ifip Advances in Information and Communication Technology. 358: 117-132. DOI: 10.1007/978-3-642-22200-9_11  0.318
2011 Capkun S, El Defrawy K, Tsudik G. Group distance bounding protocols (Short paper) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6740: 302-312. DOI: 10.1007/978-3-642-21599-5-23  0.438
2010 Nithyanand R, Saxena N, Tsudik G, Uzun E. Groupthink: Usability of secure group association for wireless devices Ubicomp'10 - Proceedings of the 2010 Acm Conference On Ubiquitous Computing. 331-340. DOI: 10.1145/1864349.1864399  0.423
2010 Molva R, Tsudik G, Önen M, Strufe T. IEEE International Workshop on Security and Social Networking SESOC 2010: Message from the workshop chairs 2010 8th Ieee International Conference On Pervasive Computing and Communications Workshops, Percom Workshops 2010. DOI: 10.1109/PERCOMW.2010.5470585  0.317
2010 Lu Y, Tsudik G. Towards plugging privacy leaks in the domain name system 2010 Ieee 10th International Conference On Peer-to-Peer Computing, P2p 2010 - Proceedings. DOI: 10.1109/P2P.2010.5569976  0.37
2010 Ma D, Tsudik G. Security and privacy in emerging wireless networks Ieee Wireless Communications. 17: 12-21. DOI: 10.1109/MWC.2010.5601953  0.393
2010 Ma D, Tsudik G. IRRES: Intrusion-resilient remote email storage Proceedings - International Conference On Distributed Computing Systems. 72-76. DOI: 10.1109/ICDCSW.2010.38  0.431
2010 De Cristofaro E, Kim J, Tsudik G. Linear-complexity private set intersection protocols secure in malicious model Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6477: 213-231. DOI: 10.1007/978-3-642-17373-8_13  0.321
2010 Perito D, Tsudik G. Secure code update for embedded devices via proofs of secure erasure Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6345: 643-662. DOI: 10.1007/978-3-642-15497-3_39  0.413
2010 Nithyanand R, Tsudik G, Uzun E. Readers behaving badly: Reader revocation in PKI-based RFID systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6345: 19-36. DOI: 10.1007/978-3-642-15497-3_2  0.389
2010 De Cristofaro E, Tsudik G. Practical private set intersection protocols with linear complexity Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6052: 143-159. DOI: 10.1007/978-3-642-14577-3_13  0.314
2010 Manulis M, Poettering B, Tsudik G. Affiliation-hiding key exchange with untrusted group authorities Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6123: 402-419. DOI: 10.1007/978-3-642-13708-2_24  0.412
2009 Ding X, Tsudik G, Xu S. Leak-free mediated group signatures Journal of Computer Security. 17: 489-514. DOI: 10.3233/Jcs-2009-0342  0.65
2009 Goodrich MT, Sirivianos M, Solis J, Soriente C, Tsudik G, Uzun E. Using audio in secure device pairing International Journal of Security and Networks. 4: 57-68. DOI: 10.1504/Ijsn.2009.023426  0.393
2009 Soriente C, Tsudik G, Uzun E. Secure pairing of interface constrained devices International Journal of Security and Networks. 4: 17-26. DOI: 10.1504/Ijsn.2009.023423  0.482
2009 Ateniese G, Camenisch J, Joye M, Tsudik G. Remarks on "analysis of one popular group signature scheme" in Asiacrypt 2006 International Journal of Applied Cryptography. 1: 320-322. DOI: 10.1504/Ijact.2009.028030  0.432
2009 Kobsa A, Sonawalla R, Tsudik G, Uzun E, Wang Y. Serial hook-ups: A comparative usability study of secure device pairing methods Soups 2009 - Proceedings of the 5th Symposium On Usable Privacy and Security. DOI: 10.1145/1572532.1572546  0.37
2009 Castelluccia C, Chan ACF, Mykletun E, Tsudik G. Efficient and provably secure aggregation of encrypted data in wireless sensor networks Acm Transactions On Sensor Networks. 5: 1-36. DOI: 10.1145/1525856.1525858  0.462
2009 Pietro RD, Soriente C, Spognardi A, Tsudik G. Collaborative authentication in unattended WSNs Proceedings of the 2nd Acm Conference On Wireless Network Security, Wisec'09. 237-244. DOI: 10.1145/1514274.1514307  0.315
2009 Burmester M, Van Le T, De Medeiros B, Tsudik G. Universally composable RFID identification and authentication protocols Acm Transactions On Information and System Security. 12. DOI: 10.1145/1513601.1513603  0.556
2009 Ma D, Tsudik G. A new approach to secure logging Acm Transactions On Storage. 5. DOI: 10.1145/1502777.1502779  0.532
2009 Saxena N, Tsudik G, Yi JH. Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs Ieee Transactions On Parallel and Distributed Systems. 20: 158-170. DOI: 10.1109/Tpds.2008.77  0.523
2009 Di Pietro R, Mancini LV, Soriente C, Spognardi A, Tsudik G. Data security in unattended wireless sensor networks Ieee Transactions On Computers. 58: 1500-1511. DOI: 10.1109/Tc.2009.109  0.443
2009 Ma D, Soriente C, Tsudik G. New adversary and new threats: Security in unattended sensor networks Ieee Network. 23: 43-48. DOI: 10.1109/Mnet.2009.4804335  0.42
2009 Cristofaro ED, Ding X, Tsudik G. Privacy-preserving querying in sensor networks Proceedings - International Conference On Computer Communications and Networks, Icccn. DOI: 10.1109/ICCCN.2009.5235352  0.33
2009 El Defrawy K, Solis J, Tsudik G. Leveraging social contacts for message confidentiality in delay tolerant networks Proceedings - International Computer Software and Applications Conference. 1: 271-279. DOI: 10.1109/COMPSAC.2009.43  0.415
2009 Kumar A, Saxena N, Tsudik G, Uzun E. A comparative study of secure device pairing methods Pervasive and Mobile Computing. 5: 734-749. DOI: 10.1016/J.Pmcj.2009.07.008  0.481
2009 Kim J, Tsudik G. SRDP: Secure route discovery for dynamic source routing in MANETs Ad Hoc Networks. 7: 1097-1109. DOI: 10.1016/j.adhoc.2008.09.007  0.46
2009 Narasimha M, Solis J, Tsudik G. Privacy-preserving revocation checking International Journal of Information Security. 8: 61-75. DOI: 10.1007/S10207-008-0064-Z  0.46
2009 Kim J, Tsudik G. Survival in the Wild: Robust group key agreement in wide-area networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5461: 66-83. DOI: 10.1007/978-3-642-00730-9_5  0.366
2008 Ateniese G, Pietro RD, Mancini LV, Tsudik G. Scalable and efficient provable data possession Proceedings of the 4th International Conference On Security and Privacy in Communication Networks, Securecomm'08. DOI: 10.1145/1460877.1460889  0.416
2008 El Defrawy K, Tsudik G. PRISM: Privacy-friendly routing in suspicious MANETs (and VANETs) Proceedings - International Conference On Network Protocols, Icnp. 258-267. DOI: 10.1109/ICNP.2008.4697044  0.476
2008 Soriente C, Tsudik G, Uzun E. HAPADEP: Human-assisted pure audio device pairing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5222: 385-400. DOI: 10.1007/978-3-540-85886-7_27  0.343
2008 Jarecki S, Kim J, Tsudik G. Beyond secret handshakes: Affiliation-hiding authenticated key exchange Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4964: 352-369. DOI: 10.1007/978-3-540-79263-5_23  0.449
2007 Jarecki S, Kim J, Tsudik G. Robust group key agreement using short broadcasts Proceedings of the Acm Conference On Computer and Communications Security. 411-420. DOI: 10.1145/1315245.1315296  0.39
2007 El Defrawy K, El Zarki M, Tsudik G. Incentive-based cooperative and secure inter-personal networking Mobiopp'07: Proceedings of the First International Mobisys Workshop On Mobile Opportunistic Networking. 57-61. DOI: 10.1145/1247694.1247706  0.362
2007 Ding X, Mazzocchi D, Tsudik G. Equipping smart devices with public key signatures Acm Transactions On Internet Technology. 7. DOI: 10.1145/1189740.1189743  0.6
2007 El Defrawy K, Tsudik G. ALARM: Anonymous location-aided routing in suspicious MANETs Proceedings - International Conference On Network Protocols, Icnp. 304-313. DOI: 10.1109/Tmc.2010.256  0.357
2007 Viswanath K, Obraczka K, Tsudik G. Correction to "Exploring Mesh and Tree-Based Multicast Routing Protocols for MANETs" Ieee Transactions On Mobile Computing. 6: 237-237. DOI: 10.1109/Tmc.2007.21  0.392
2007 Ma D, Tsudik G. Forward-secure sequential aggregate authentication Proceedings - Ieee Symposium On Security and Privacy. 86-91. DOI: 10.1109/SP.2007.18  0.346
2007 Saxena N, Tsudik G, Yi JH. Threshold cryptography in P2P and MANETs: The case of access control Computer Networks. 51: 3632-3649. DOI: 10.1016/J.Comnet.2007.03.001  0.487
2007 Tsudik G. A family of dunces: Trivial RFID identification and authentication protocols Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4776: 45-61.  0.384
2006 Mykletun E, Narasimha M, Tsudik G. Authentication and integrity in outsourced databases Acm Transactions On Storage. 2: 107-138. DOI: 10.1145/1149976.1149977  0.471
2006 Castelluccia C, Mykletun E, Tsudik G. Improving secure server performance by Re-balancing SSL/TLS handshakes Proceedings of the 2006 Acm Symposium On Information, Computer and Communications Security, Asiaccs '06. 2006: 26-34. DOI: 10.1145/1128817.1128826  0.325
2006 Viswanath K, Obraczka K, Tsudik G. Exploring mesh and tree-based multicast. Routing protocols for MANETs Ieee Transactions On Mobile Computing. 5: 28-42. DOI: 10.1109/Tmc.2006.11  0.451
2006 Tsudik G. YA-TRAP: Yet another trivial RFID authentication protocol Proceedings - Fourth Annual Ieee International Conference On Pervasive Computing and Communications Workshops, Percom Workshops 2006. 2006: 640-643. DOI: 10.1109/PERCOMW.2006.152  0.394
2006 Castelluccia C, Jarecki S, Kim J, Tsudik G. Secure acknowledgment aggregation and multisignatures with limited robustness Computer Networks. 50: 1639-1652. DOI: 10.1016/J.Comnet.2005.09.021  0.527
2006 Solis J, Tsudik G. Simple and flexible revocation checking with privacy Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4258: 351-367. DOI: 10.1007/11957454_20  0.364
2006 Tsudik G, Xu S. A flexible framework for secret handshakes: (Multi-party anonymous and un-observable authentication) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4258: 295-315. DOI: 10.1007/11957454_17  0.304
2006 Mykletun E, Tsudik G. Aggregation queries in the database-as-a-service model Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4127: 89-103. DOI: 10.1007/11805588_7  0.413
2006 Jarecki S, Kim J, Tsudik G. Authentication for paranoids: Multi-party secret handshakes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3989: 325-339. DOI: 10.1007/11767480_22  0.468
2006 Nasserian S, Tsudik G. Revisiting oblivious signature-based envelopes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4107: 221-235.  0.348
2005 Rhee KH, Park YHO, Tsudik G. A group key management architecture for mobile Ad-hoc wireless networks Journal of Information Science and Engineering. 21: 415-428. DOI: 10.6688/Jise.2005.21.2.7  0.494
2005 Tsudik G, Xu S. Brief announcement: A flexible framework for secret handshakes Proceedings of the Annual Acm Symposium On Principles of Distributed Computing. 24: 39. DOI: 10.1145/1073814.1073820  0.34
2005 Amir Y, Nita-Rotaru C, Stanton J, Tsudik G. Secure spread: An integrated architecture for secure group communication Ieee Transactions On Dependable and Secure Computing. 2: 248-261. DOI: 10.1109/Tdsc.2005.39  0.461
2005 Kim J, Tsudik G. SRDP: Securing route discovery in DSR Mobiquitous 2005: Second Annual International Conference On Mobile and Ubiquitous Systems -Networking and Services. 247-258. DOI: 10.1109/MOBIQUITOUS.2005.54  0.468
2005 Saxena N, Tsudik G, Yi JH. Efficient node admission for short-lived mobile ad hoc networks Proceedings - International Conference On Network Protocols, Icnp. 2005: 269-278. DOI: 10.1109/ICNP.2005.14  0.463
2005 Ateniese G, Chou DH, De Medeiros B, Tsudik G. Sanitizable signatures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3679: 159-177. DOI: 10.1007/11555827_10  0.391
2005 Saxena N, Tsudik G, Yi JH. Experimenting with admission control in P2P networks Computer Security in the 21st Century. 71-89. DOI: 10.1007/0-387-24006-3_6  0.322
2005 Saxena N, Tsudik G, Yi JH. Identity-based access control for ad hoc groups Lecture Notes in Computer Science. 3506: 362-379.  0.388
2004 Kim Y, Perrig A, Tsudik G. Tree-based group key agreement Acm Transactions On Information and System Security. 7: 60-96. DOI: 10.1145/984334.984337  0.619
2004 Boneh D, Ding X, Tsudik G. Fine-grained control of security capabilities Acm Transactions On Internet Technology. 4: 60-82. DOI: 10.1145/967030.967033  0.631
2004 Amir Y, Kim Y, Nita-Rotaru C, Schultz JL, Stanton J, Tsudik G. Secure group communication using robust contributory key agreement Ieee Transactions On Parallel and Distributed Systems. 15: 468-480. DOI: 10.1109/Tpds.2004.1278104  0.649
2004 Kim Y, Perrig A, Tsudik G. Group key agreement efficient in communication Ieee Transactions On Computers. 53: 905-921. DOI: 10.1109/Tc.2004.31  0.627
2004 Rhee KH, Park YH, Tsudik G. An architecture for key management in hierarchical mobile ad-hoc networks Journal of Communications and Networks. 6: 156-162. DOI: 10.1109/Jcn.2004.6596636  0.49
2004 Saxena N, Tsudik G, Yi JH. Access control in ad hoc groups Proceedings of the First International Workshop On Hot Topics in Peer-to-Peer Systems, Hot-P2p '04. 2-7.  0.381
2004 Castelluccia C, Jarecki S, Tsudik G. Secret handshakes from CA-oblivious encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3329: 293-307.  0.377
2004 Ding X, Tsudik G, Xu S. Leak-free group signatures with immediate revocation Proceedings - International Conference On Distributed Computing Systems. 24: 608-615.  0.353
2004 Lyer B, Mehrotra S, Mykletun E, Tsudik G, Wu Y. A framework for efficient storage security in RDBMS Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2992: 147-164.  0.43
2003 Kim Y, Maino F, Narasimha M, Tsudik G. Secure group services for storage area networks Proceedings - 1st International Ieee Security in Storage Workshop, Sisw 2002. 80-93. DOI: 10.1109/SISW.2002.1183514  0.444
2003 Kim Y, Mazzocchi D, Tsudik G. Admission control in peer groups Proceedings - 2nd Ieee International Symposium On Network Computing and Applications, Nca 2003. 131-139. DOI: 10.1109/NCA.2003.1201147  0.375
2003 Kim Y, Maino F, Narasimha M, Rhee KH, Tsudik G. Secure group key management for storage area networks Ieee Communications Magazine. 41: 92-99. DOI: 10.1109/Mcom.2003.1222723  0.664
2003 Amir Y, Nita-Rotaru C, Stanton J, Tsudik G. Scaling secure group communication systems: Beyond peer-to-peer Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2003. 1: 226-237. DOI: 10.1109/DISCEX.2003.1194887  0.383
2003 Bicakci K, Tsudik G, Tung B. How to construct optimal one-time signatures Computer Networks. 43: 339-349. DOI: 10.1016/S1389-1286(03)00285-8  0.354
2003 Tsudik G. Weak forward security in mediated RSA Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2576: 45-54.  0.427
2003 Tsudik G, Xu S. Accumulating composites and improved group signing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2894: 269-286.  0.364
2003 Ding X, Tsudik G. Simple identity-based cryptography with mediated RSA Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2612: 193-210.  0.372
2003 Ateniese G, Song D, Tsudik G. Quasi-efficient revocation of group signatures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2357: 183-197.  0.33
2003 Saxena N, Tsudik G, Yi JH. Admission control in peer-to-peer: Design and performance evaluation Proceedings of the 1st Acm Workshop On Security of Ad Hoc and Security of Ad Hoc and Sensor Networks (in Association With 10th Acm Conference On Computer and Communications Security). 104-114.  0.441
2002 Amir Y, Kim Y, Nita-Rotaru C, Tsudik G. On the performance of group key agreement protocols Proceedings - International Conference On Distributed Computing Systems. 463-464. DOI: 10.1145/1015040.1015045  0.593
2002 Amir Y, Kim Y, Nita-Rotaru C, Tsudik G. On the performance of group key agreement protocols Proceedings - International Conference On Distributed Computing Systems. 463-464.  0.364
2002 Kim Y, Perrig A, Tsudik G. Communication-efficient group key agreement Ifip Advances in Information and Communication Technology. 65: 229-244.  0.454
2001 Obraczka K, Viswanath K, Tsudik G. Flooding for reliable multicast in multi-hop ad hoc networks Wireless Networks. 7: 627-634. DOI: 10.1023/A:1012323519059  0.389
2001 Agarwal DA, Chevassut O, Thompson MR, Tsudik G. An integrated solution for secure group communication in wide-area networks Ieee Symposium On Computers and Communications - Proceedings. 22-28.  0.452
2001 Syverson P, Tsudik G, Reed M, Landwehr C. Towards an analysis of onion routing security Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2009: 96-114.  0.375
2001 Amir Y, Kim Y, Nita-Rotaru C, Schultz J, Stanton J, Tsudik G. Exploring robustness in group key agreement Proceedings - International Conference On Distributed Computing Systems. 399-408.  0.404
2000 Ateniese G, Chevassut O, Hasse D, Kim Y, Tsudik G. The design of a group key agreement API Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2000. 1: 115-126. DOI: 10.1109/DISCEX.2000.824969  0.417
2000 Steiner M, Tsudik G, Waidner M. Key agreement in dynamic peer groups Ieee Transactions On Parallel and Distributed Systems. 11: 769-780. DOI: 10.1109/71.877936  0.518
2000 Ateniese G, Steiner M, Tsudik G. New multiparty authentication services and key agreement protocols Ieee Journal On Selected Areas in Communications. 18: 628-639. DOI: 10.1109/49.839937  0.552
2000 Bellare M, Garay JA, Hauser R, Herzberg A, Krawczyk H, Steiner M, Tsudik G, Van Herreweghen E, Waidner M. Design, implementation, and deployment of the iKP secure electronic payment system Ieee Journal On Selected Areas in Communications. 18: 611-627. DOI: 10.1109/49.839936  0.525
2000 Hardjono T, Tsudik G. IP multicast security: Issues and directions Annales Des Telecommunications/Annals of Telecommunications. 55: 324-340. DOI: 10.1007/Bf02994841  0.539
2000 Kim Y, Perrig A, Tsudik G. Simple and fault-tolerant key agreement for dynamic collaborative groups Proceedings of the Acm Conference On Computer and Communications Security. 235-244.  0.403
2000 Ateniese G, Camenisch J, Joye M, Tsudik G. A practical and provably secure coalition-resistant group signature scheme Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1880: 255-270.  0.36
1999 Hauser R, Przygienda T, Tsudik G. Lowering security overhead in link state routing Computer Networks. 31: 885-894. DOI: 10.1016/S1389-1286(98)00022-X  0.508
1999 Ateniese G, Herzberg A, Krawczyk H, Tsudik G. Untraceable mobility or how to travel incognito Computer Networks. 31: 871-884. DOI: 10.1016/S1389-1286(98)00021-8  0.436
1999 Ateniese G, Tsudik G. Some open issues and new directions in group signatures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1648: 196-211.  0.332
1998 Molva R, Tsudik G. Secret sets and applications Information Processing Letters. 65: 47-55. DOI: 10.1016/S0020-0190(97)80449-8  0.339
1998 Franklin M, Tsudik G. Secure group barter: Multi-party fair exchange with semi-trusted neutral parties Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1465: 90-102. DOI: 10.1007/BFb0055475  0.344
1998 Steiner M, Tsudik G, Waidner M. CLIQUES: a new approach to group key agreement Proceedings - International Conference On Distributed Computing Systems. 380-387.  0.36
1997 Asokan N, Tsudik G, Waidner M. Server-supported signatures Journal of Computer Security. 5: 91-108. DOI: 10.3233/Jcs-1997-5105  0.504
1997 Gray JP, Kshemkalyani AD, Matyas SM, Peyravian M, Tsudik G. ATM cell encryption and key update synchronization Telecommunication Systems. 7: 391-408. DOI: 10.1023/A:1019192916871  0.356
1996 Hauser R, Janson P, Tsudik G, Herreweghen EV, Molva R. Robust and secure password and key change method Journal of Computer Security. 4: 97-111. DOI: 10.3233/Jcs-1996-4106  0.463
1996 Zatti S, Molva R, Tosi A, Tsudik G, Kurth H. Limitations of the approach of solving a network’s security problems with a firewall Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1146: 144-145.  0.352
1995 Steiner M, Tsudik G, Waidner M. Refinement and extension of encrypted key exchange Operating Systems Review. 29: 22-30. DOI: 10.1145/206826.206834  0.523
1995 Chess D, Grosof B, Harrison C, Levine D, Parris C, Tsudik G. ltinerant Agents for Mobile Computing Ieee Personal Communications. 2: 34-49. DOI: 10.1109/98.468361  0.426
1995 Janson P, Tsudik G. Secure and minimal protocols for authenticated key distribution Computer Communications. 18: 645-653. DOI: 10.1016/0140-3664(95)99807-O  0.469
1995 Herzberg A, Krawczyk H, Tsudik G. On travelling incognito Mobile Computing Systems and Applications - Workshop Proceedings. 205-210.  0.308
1994 Molva R, Samfat D, Tsudik G. Authentication of mobile users Ieee Network. 8: 26-34. DOI: 10.1109/65.272938  0.445
1993 Estrin D, Steenstrup M, Tsudik G. A protocol for route establishment and packet forwarding across multidomain internets Ieee/Acm Transactions On Networking. 1: 56-70. DOI: 10.1109/90.222907  0.405
1991 Estrin D, Tsudik G. Secure control of transit internetwork traffic Computer Networks and Isdn Systems. 22: 363-382. DOI: 10.1016/0169-7552(91)90094-S  0.436
1989 Tsudik G. Datagram authentication in internet gateways: implications of fragmentation and dynamic routing Ieee Journal On Selected Areas in Communications. 7: 499-504. DOI: 10.1109/49.17713  0.418
1989 Estrin D, Mogul J, Tsudik G. Visa protocols for controlling interorganizational datagram flow Ieee Journal On Selected Areas in Communications. 7: 486-498. DOI: 10.1109/49.17712  0.403
Show low-probability matches.