Year |
Citation |
Score |
2019 |
Carpent X, Rattanavipanon N, Tsudik G. Remote Attestation via Self-Measurement Acm Transactions On Design Automation of Electronic Systems. 24: 11. DOI: 10.1145/3279950 |
0.389 |
|
2019 |
Ghali C, Tsudik G, Uzun E. In Content We Trust: Network-Layer Trust in Content-Centric Networking Ieee Acm Transactions On Networking. 27: 1787-1800. DOI: 10.1109/Tnet.2019.2926320 |
0.439 |
|
2019 |
Acs G, Conti M, Gasti P, Ghali C, Tsudik G, Wood CA. Privacy-Aware Caching in Information-Centric Networking Ieee Transactions On Dependable and Secure Computing. 16: 313-328. DOI: 10.1109/Tdsc.2017.2679711 |
0.442 |
|
2019 |
Tan H, Tsudik G, Jha SK. MTRA: Multi-Tier randomized remote attestation in IoT networks Computers & Security. 81: 78-93. DOI: 10.1016/J.Cose.2018.10.008 |
0.383 |
|
2018 |
Asokan N, Nyman T, Rattanavipanon N, Sadeghi A, Tsudik G. ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 37: 2290-2300. DOI: 10.1109/Tcad.2018.2858422 |
0.48 |
|
2018 |
Ambrosin M, Compagno A, Conti M, Ghali C, Tsudik G. Security and Privacy Analysis of National Science Foundation Future Internet Architectures Ieee Communications Surveys and Tutorials. 20: 1418-1442. DOI: 10.1109/Comst.2018.2798280 |
0.488 |
|
2018 |
Ding X, Tsudik G. Initializing trust in smart devices via presence attestation Computer Communications. 131: 35-38. DOI: 10.1016/J.Comcom.2018.07.004 |
0.657 |
|
2017 |
Martinovic I, Rasmussen K, Roeschlin M, Tsudik G. Authentication using pulse-response biometrics Communications of the Acm. 60: 108-115. DOI: 10.1145/3023359 |
0.363 |
|
2016 |
Abera T, Asokan N, Davi L, Koushanfar F, Paverd A, Sadeghi AR, Tsudik G. Invited - Things, trouble, trust: On building trust in IoT systems Proceedings - Design Automation Conference. 5. DOI: 10.1145/2897937.2905020 |
0.355 |
|
2016 |
Brasser F, Rasmussen KB, Sadeghi AR, Tsudik G. Remote attestation for low-end embedded devices: The prover's perspective Proceedings - Design Automation Conference. 5. DOI: 10.1145/2897937.2898083 |
0.407 |
|
2016 |
Asokan N, Brasser F, Ibrahim A, Sadeghi AR, Schunter M, Tsudik G, Wachsmann C. SEDA: Scalable embedded device attestation Proceedings of the Acm Conference On Computer and Communications Security. 2015: 964-975. DOI: 10.1145/2810103.2813670 |
0.349 |
|
2016 |
Ghali C, Tsudik G, Wood CA, Yeh E. Practical accounting in content-centric networking Proceedings of the Noms 2016 - 2016 Ieee/Ifip Network Operations and Management Symposium. 436-444. DOI: 10.1109/NOMS.2016.7502841 |
0.338 |
|
2016 |
Ghali C, Narayanan A, Oran D, Tsudik G, Wood CA. Secure fragmentation for content-centric networks Proceedings - 2015 Ieee 14th International Symposium On Network Computing and Applications, Nca 2015. 47-56. DOI: 10.1109/NCA.2015.34 |
0.413 |
|
2015 |
Kaczmarek T, Kobsa A, Sy R, Tsudik G. An Unattended Study of Users Performing Security Critical Tasks Under Adversarial Noise Arxiv: Human-Computer Interaction. DOI: 10.14722/Usec.2015.23014 |
0.34 |
|
2015 |
Ghali C, Schlosberg MA, Tsudik G, Wood CA. Interest-based access control for content-centric networks Icn 2015 - Proceedings of the 2nd International Conference On Information-Centric Networking. 147-156. DOI: 10.1145/2810156.2810174 |
0.352 |
|
2015 |
Compagno A, Conti M, Ghali C, Tsudik G. To NACK or not to NACK? Negative acknowledgments in information-centric networking Proceedings - International Conference On Computer Communications and Networks, Icccn. 2015. DOI: 10.1109/ICCCN.2015.7288477 |
0.409 |
|
2015 |
Compagno A, Conti M, Gasti P, Mancini LV, Tsudik G. Violating consumer anonymity: Geo-locating nodes in named data networking Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9092: 243-262. DOI: 10.1007/978-3-319-28166-7_12 |
0.336 |
|
2014 |
Francillon A, Nguyen Q, Rasmussen KB, Tsudik G. A minimalist approach to Remote Attestation Proceedings -Design, Automation and Test in Europe, Date. DOI: 10.7873/DATE2014.257 |
0.406 |
|
2014 |
Ali ST, Sivaraman V, Ostry D, Tsudik G, Jha S. Securing first-hop data provenance for bodyworn devices using wireless link fingerprints Ieee Transactions On Information Forensics and Security. 9: 2193-2204. DOI: 10.1109/Tifs.2014.2357998 |
0.479 |
|
2014 |
Burke J, Gasti P, Nathan N, Tsudik G. Secure sensing over named data networking Proceedings - 2014 Ieee 13th International Symposium On Network Computing and Applications, Nca 2014. 175-180. DOI: 10.1109/NCA.2014.34 |
0.426 |
|
2013 |
Kobsa A, Nithyanand R, Tsudik G, Uzun E. Can Jannie verify? Usability of display-equipped RFID tags for security purposes Journal of Computer Security. 21: 347-370. DOI: 10.3233/Jcs-130470 |
0.493 |
|
2013 |
Almishari M, Gastiz P, Nathan N, Tsudik G. Optimizing bi-directional low-latency communication in Named Data Networking Computer Communication Review. 44: 13-19. DOI: 10.1145/2567561.2567564 |
0.323 |
|
2013 |
Di Pietro R, Oligeri G, Soriente C, Tsudik G. United we stand: Intrusion resilience in mobile unattended WSNs Ieee Transactions On Mobile Computing. 12: 1456-1468. DOI: 10.1109/Tmc.2012.126 |
0.394 |
|
2013 |
Compagno A, Conti M, Gasti P, Tsudik G. Poseidon: Mitigating interest flooding DDoS attacks in named data networking Proceedings - Conference On Local Computer Networks, Lcn. 630-638. DOI: 10.1109/LCN.2013.6761300 |
0.388 |
|
2013 |
Acs G, Conti M, Gasti P, Ghali C, Tsudik G. Cache privacy in named-data networking Proceedings - International Conference On Distributed Computing Systems. 41-51. DOI: 10.1109/ICDCS.2013.12 |
0.332 |
|
2013 |
Gasti P, Tsudik G, Uzun E, Zhang L. DoS and DDoS in named data networking Proceedings - International Conference On Computer Communications and Networks, Icccn. DOI: 10.1109/ICCCN.2013.6614127 |
0.415 |
|
2012 |
Di Pietro R, Ma D, Soriente C, Tsudik G. Self-healing in unattended wireless sensor networks Acm Transactions On Sensor Networks. 9. DOI: 10.1145/2379799.2379806 |
0.394 |
|
2012 |
Cheon JH, Hong J, Tsudik G. Reducing RFID reader load with the meet-in-the-middle strategy Journal of Communications and Networks. 14: 10-14. DOI: 10.1109/Jcn.2012.6184545 |
0.377 |
|
2012 |
Conti M, Das SK, Bisdikian C, Kumar M, Ni LM, Passarella A, Roussos G, Tröster G, Tsudik G, Zambonelli F. Looking ahead in pervasive computing: Challenges and opportunities in the era of cyberphysical convergence Pervasive and Mobile Computing. 8: 2-21. DOI: 10.1016/J.Pmcj.2011.10.001 |
0.355 |
|
2011 |
Nithyanand R, Tsudik G, Uzun E. User-aided reader revocation in PKI-based RFID systems Journal of Computer Security. 19: 1147-1172. DOI: 10.3233/Jcs-2011-0435 |
0.477 |
|
2011 |
Das SK, Noubir G, Molva R, Tsudik G, Zhang N. Message from the workshop chairs 2011 Ieee International Symposium On a World of Wireless, Mobile and Multimedia Networks, Wowmom 2011 - Digital Proceedings. DOI: 10.1109/WoWMoM.2011.5986126 |
0.381 |
|
2011 |
Jarecki S, Kim J, Tsudik G. Flexible robust group key agreement Ieee Transactions On Parallel and Distributed Systems. 22: 879-886. DOI: 10.1109/Tpds.2010.128 |
0.479 |
|
2011 |
El Defrawy K, Tsudik G. Privacy-preserving location-based on-demand routing in MANETs Ieee Journal On Selected Areas in Communications. 29: 1926-1934. DOI: 10.1109/Jsac.2011.111203 |
0.548 |
|
2011 |
Di Pietro R, Soriente C, Spognardi A, Tsudik G. Intrusion-resilient integrity in data-centric unattended WSNs Pervasive and Mobile Computing. 7: 495-508. DOI: 10.1016/J.Pmcj.2010.12.003 |
0.412 |
|
2011 |
Kobsa A, Nithyanand R, Tsudik G, Uzun E. Usability of display-equipped RFID tags for security purposes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6879: 434-451. DOI: 10.1007/978-3-642-23822-2_24 |
0.4 |
|
2011 |
Lu Y, Tsudik G. Enhancing data privacy in the cloud Ifip Advances in Information and Communication Technology. 358: 117-132. DOI: 10.1007/978-3-642-22200-9_11 |
0.318 |
|
2011 |
Capkun S, El Defrawy K, Tsudik G. Group distance bounding protocols (Short paper) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6740: 302-312. DOI: 10.1007/978-3-642-21599-5-23 |
0.438 |
|
2010 |
Nithyanand R, Saxena N, Tsudik G, Uzun E. Groupthink: Usability of secure group association for wireless devices Ubicomp'10 - Proceedings of the 2010 Acm Conference On Ubiquitous Computing. 331-340. DOI: 10.1145/1864349.1864399 |
0.423 |
|
2010 |
Molva R, Tsudik G, Önen M, Strufe T. IEEE International Workshop on Security and Social Networking SESOC 2010: Message from the workshop chairs 2010 8th Ieee International Conference On Pervasive Computing and Communications Workshops, Percom Workshops 2010. DOI: 10.1109/PERCOMW.2010.5470585 |
0.317 |
|
2010 |
Lu Y, Tsudik G. Towards plugging privacy leaks in the domain name system 2010 Ieee 10th International Conference On Peer-to-Peer Computing, P2p 2010 - Proceedings. DOI: 10.1109/P2P.2010.5569976 |
0.37 |
|
2010 |
Ma D, Tsudik G. Security and privacy in emerging wireless networks Ieee Wireless Communications. 17: 12-21. DOI: 10.1109/MWC.2010.5601953 |
0.393 |
|
2010 |
Ma D, Tsudik G. IRRES: Intrusion-resilient remote email storage Proceedings - International Conference On Distributed Computing Systems. 72-76. DOI: 10.1109/ICDCSW.2010.38 |
0.431 |
|
2010 |
De Cristofaro E, Kim J, Tsudik G. Linear-complexity private set intersection protocols secure in malicious model Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6477: 213-231. DOI: 10.1007/978-3-642-17373-8_13 |
0.321 |
|
2010 |
Perito D, Tsudik G. Secure code update for embedded devices via proofs of secure erasure Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6345: 643-662. DOI: 10.1007/978-3-642-15497-3_39 |
0.413 |
|
2010 |
Nithyanand R, Tsudik G, Uzun E. Readers behaving badly: Reader revocation in PKI-based RFID systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6345: 19-36. DOI: 10.1007/978-3-642-15497-3_2 |
0.389 |
|
2010 |
De Cristofaro E, Tsudik G. Practical private set intersection protocols with linear complexity Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6052: 143-159. DOI: 10.1007/978-3-642-14577-3_13 |
0.314 |
|
2010 |
Manulis M, Poettering B, Tsudik G. Affiliation-hiding key exchange with untrusted group authorities Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6123: 402-419. DOI: 10.1007/978-3-642-13708-2_24 |
0.412 |
|
2009 |
Ding X, Tsudik G, Xu S. Leak-free mediated group signatures Journal of Computer Security. 17: 489-514. DOI: 10.3233/Jcs-2009-0342 |
0.65 |
|
2009 |
Goodrich MT, Sirivianos M, Solis J, Soriente C, Tsudik G, Uzun E. Using audio in secure device pairing International Journal of Security and Networks. 4: 57-68. DOI: 10.1504/Ijsn.2009.023426 |
0.393 |
|
2009 |
Soriente C, Tsudik G, Uzun E. Secure pairing of interface constrained devices International Journal of Security and Networks. 4: 17-26. DOI: 10.1504/Ijsn.2009.023423 |
0.482 |
|
2009 |
Ateniese G, Camenisch J, Joye M, Tsudik G. Remarks on "analysis of one popular group signature scheme" in Asiacrypt 2006 International Journal of Applied Cryptography. 1: 320-322. DOI: 10.1504/Ijact.2009.028030 |
0.432 |
|
2009 |
Kobsa A, Sonawalla R, Tsudik G, Uzun E, Wang Y. Serial hook-ups: A comparative usability study of secure device pairing methods Soups 2009 - Proceedings of the 5th Symposium On Usable Privacy and Security. DOI: 10.1145/1572532.1572546 |
0.37 |
|
2009 |
Castelluccia C, Chan ACF, Mykletun E, Tsudik G. Efficient and provably secure aggregation of encrypted data in wireless sensor networks Acm Transactions On Sensor Networks. 5: 1-36. DOI: 10.1145/1525856.1525858 |
0.462 |
|
2009 |
Pietro RD, Soriente C, Spognardi A, Tsudik G. Collaborative authentication in unattended WSNs Proceedings of the 2nd Acm Conference On Wireless Network Security, Wisec'09. 237-244. DOI: 10.1145/1514274.1514307 |
0.315 |
|
2009 |
Burmester M, Van Le T, De Medeiros B, Tsudik G. Universally composable RFID identification and authentication protocols Acm Transactions On Information and System Security. 12. DOI: 10.1145/1513601.1513603 |
0.556 |
|
2009 |
Ma D, Tsudik G. A new approach to secure logging Acm Transactions On Storage. 5. DOI: 10.1145/1502777.1502779 |
0.532 |
|
2009 |
Saxena N, Tsudik G, Yi JH. Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs Ieee Transactions On Parallel and Distributed Systems. 20: 158-170. DOI: 10.1109/Tpds.2008.77 |
0.523 |
|
2009 |
Di Pietro R, Mancini LV, Soriente C, Spognardi A, Tsudik G. Data security in unattended wireless sensor networks Ieee Transactions On Computers. 58: 1500-1511. DOI: 10.1109/Tc.2009.109 |
0.443 |
|
2009 |
Ma D, Soriente C, Tsudik G. New adversary and new threats: Security in unattended sensor networks Ieee Network. 23: 43-48. DOI: 10.1109/Mnet.2009.4804335 |
0.42 |
|
2009 |
Cristofaro ED, Ding X, Tsudik G. Privacy-preserving querying in sensor networks Proceedings - International Conference On Computer Communications and Networks, Icccn. DOI: 10.1109/ICCCN.2009.5235352 |
0.33 |
|
2009 |
El Defrawy K, Solis J, Tsudik G. Leveraging social contacts for message confidentiality in delay tolerant networks Proceedings - International Computer Software and Applications Conference. 1: 271-279. DOI: 10.1109/COMPSAC.2009.43 |
0.415 |
|
2009 |
Kumar A, Saxena N, Tsudik G, Uzun E. A comparative study of secure device pairing methods Pervasive and Mobile Computing. 5: 734-749. DOI: 10.1016/J.Pmcj.2009.07.008 |
0.481 |
|
2009 |
Kim J, Tsudik G. SRDP: Secure route discovery for dynamic source routing in MANETs Ad Hoc Networks. 7: 1097-1109. DOI: 10.1016/j.adhoc.2008.09.007 |
0.46 |
|
2009 |
Narasimha M, Solis J, Tsudik G. Privacy-preserving revocation checking International Journal of Information Security. 8: 61-75. DOI: 10.1007/S10207-008-0064-Z |
0.46 |
|
2009 |
Kim J, Tsudik G. Survival in the Wild: Robust group key agreement in wide-area networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5461: 66-83. DOI: 10.1007/978-3-642-00730-9_5 |
0.366 |
|
2008 |
Ateniese G, Pietro RD, Mancini LV, Tsudik G. Scalable and efficient provable data possession Proceedings of the 4th International Conference On Security and Privacy in Communication Networks, Securecomm'08. DOI: 10.1145/1460877.1460889 |
0.416 |
|
2008 |
El Defrawy K, Tsudik G. PRISM: Privacy-friendly routing in suspicious MANETs (and VANETs) Proceedings - International Conference On Network Protocols, Icnp. 258-267. DOI: 10.1109/ICNP.2008.4697044 |
0.476 |
|
2008 |
Soriente C, Tsudik G, Uzun E. HAPADEP: Human-assisted pure audio device pairing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5222: 385-400. DOI: 10.1007/978-3-540-85886-7_27 |
0.343 |
|
2008 |
Jarecki S, Kim J, Tsudik G. Beyond secret handshakes: Affiliation-hiding authenticated key exchange Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4964: 352-369. DOI: 10.1007/978-3-540-79263-5_23 |
0.449 |
|
2007 |
Jarecki S, Kim J, Tsudik G. Robust group key agreement using short broadcasts Proceedings of the Acm Conference On Computer and Communications Security. 411-420. DOI: 10.1145/1315245.1315296 |
0.39 |
|
2007 |
El Defrawy K, El Zarki M, Tsudik G. Incentive-based cooperative and secure inter-personal networking Mobiopp'07: Proceedings of the First International Mobisys Workshop On Mobile Opportunistic Networking. 57-61. DOI: 10.1145/1247694.1247706 |
0.362 |
|
2007 |
Ding X, Mazzocchi D, Tsudik G. Equipping smart devices with public key signatures Acm Transactions On Internet Technology. 7. DOI: 10.1145/1189740.1189743 |
0.6 |
|
2007 |
El Defrawy K, Tsudik G. ALARM: Anonymous location-aided routing in suspicious MANETs Proceedings - International Conference On Network Protocols, Icnp. 304-313. DOI: 10.1109/Tmc.2010.256 |
0.357 |
|
2007 |
Viswanath K, Obraczka K, Tsudik G. Correction to "Exploring Mesh and Tree-Based Multicast Routing Protocols for MANETs" Ieee Transactions On Mobile Computing. 6: 237-237. DOI: 10.1109/Tmc.2007.21 |
0.392 |
|
2007 |
Ma D, Tsudik G. Forward-secure sequential aggregate authentication Proceedings - Ieee Symposium On Security and Privacy. 86-91. DOI: 10.1109/SP.2007.18 |
0.346 |
|
2007 |
Saxena N, Tsudik G, Yi JH. Threshold cryptography in P2P and MANETs: The case of access control Computer Networks. 51: 3632-3649. DOI: 10.1016/J.Comnet.2007.03.001 |
0.487 |
|
2007 |
Tsudik G. A family of dunces: Trivial RFID identification and authentication protocols Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4776: 45-61. |
0.384 |
|
2006 |
Mykletun E, Narasimha M, Tsudik G. Authentication and integrity in outsourced databases Acm Transactions On Storage. 2: 107-138. DOI: 10.1145/1149976.1149977 |
0.471 |
|
2006 |
Castelluccia C, Mykletun E, Tsudik G. Improving secure server performance by Re-balancing SSL/TLS handshakes Proceedings of the 2006 Acm Symposium On Information, Computer and Communications Security, Asiaccs '06. 2006: 26-34. DOI: 10.1145/1128817.1128826 |
0.325 |
|
2006 |
Viswanath K, Obraczka K, Tsudik G. Exploring mesh and tree-based multicast. Routing protocols for MANETs Ieee Transactions On Mobile Computing. 5: 28-42. DOI: 10.1109/Tmc.2006.11 |
0.451 |
|
2006 |
Tsudik G. YA-TRAP: Yet another trivial RFID authentication protocol Proceedings - Fourth Annual Ieee International Conference On Pervasive Computing and Communications Workshops, Percom Workshops 2006. 2006: 640-643. DOI: 10.1109/PERCOMW.2006.152 |
0.394 |
|
2006 |
Castelluccia C, Jarecki S, Kim J, Tsudik G. Secure acknowledgment aggregation and multisignatures with limited robustness Computer Networks. 50: 1639-1652. DOI: 10.1016/J.Comnet.2005.09.021 |
0.527 |
|
2006 |
Solis J, Tsudik G. Simple and flexible revocation checking with privacy Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4258: 351-367. DOI: 10.1007/11957454_20 |
0.364 |
|
2006 |
Tsudik G, Xu S. A flexible framework for secret handshakes: (Multi-party anonymous and un-observable authentication) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4258: 295-315. DOI: 10.1007/11957454_17 |
0.304 |
|
2006 |
Mykletun E, Tsudik G. Aggregation queries in the database-as-a-service model Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4127: 89-103. DOI: 10.1007/11805588_7 |
0.413 |
|
2006 |
Jarecki S, Kim J, Tsudik G. Authentication for paranoids: Multi-party secret handshakes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3989: 325-339. DOI: 10.1007/11767480_22 |
0.468 |
|
2006 |
Nasserian S, Tsudik G. Revisiting oblivious signature-based envelopes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4107: 221-235. |
0.348 |
|
2005 |
Rhee KH, Park YHO, Tsudik G. A group key management architecture for mobile Ad-hoc wireless networks Journal of Information Science and Engineering. 21: 415-428. DOI: 10.6688/Jise.2005.21.2.7 |
0.494 |
|
2005 |
Tsudik G, Xu S. Brief announcement: A flexible framework for secret handshakes Proceedings of the Annual Acm Symposium On Principles of Distributed Computing. 24: 39. DOI: 10.1145/1073814.1073820 |
0.34 |
|
2005 |
Amir Y, Nita-Rotaru C, Stanton J, Tsudik G. Secure spread: An integrated architecture for secure group communication Ieee Transactions On Dependable and Secure Computing. 2: 248-261. DOI: 10.1109/Tdsc.2005.39 |
0.461 |
|
2005 |
Kim J, Tsudik G. SRDP: Securing route discovery in DSR Mobiquitous 2005: Second Annual International Conference On Mobile and Ubiquitous Systems -Networking and Services. 247-258. DOI: 10.1109/MOBIQUITOUS.2005.54 |
0.468 |
|
2005 |
Saxena N, Tsudik G, Yi JH. Efficient node admission for short-lived mobile ad hoc networks Proceedings - International Conference On Network Protocols, Icnp. 2005: 269-278. DOI: 10.1109/ICNP.2005.14 |
0.463 |
|
2005 |
Ateniese G, Chou DH, De Medeiros B, Tsudik G. Sanitizable signatures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3679: 159-177. DOI: 10.1007/11555827_10 |
0.391 |
|
2005 |
Saxena N, Tsudik G, Yi JH. Experimenting with admission control in P2P networks Computer Security in the 21st Century. 71-89. DOI: 10.1007/0-387-24006-3_6 |
0.322 |
|
2005 |
Saxena N, Tsudik G, Yi JH. Identity-based access control for ad hoc groups Lecture Notes in Computer Science. 3506: 362-379. |
0.388 |
|
2004 |
Kim Y, Perrig A, Tsudik G. Tree-based group key agreement Acm Transactions On Information and System Security. 7: 60-96. DOI: 10.1145/984334.984337 |
0.619 |
|
2004 |
Boneh D, Ding X, Tsudik G. Fine-grained control of security capabilities Acm Transactions On Internet Technology. 4: 60-82. DOI: 10.1145/967030.967033 |
0.631 |
|
2004 |
Amir Y, Kim Y, Nita-Rotaru C, Schultz JL, Stanton J, Tsudik G. Secure group communication using robust contributory key agreement Ieee Transactions On Parallel and Distributed Systems. 15: 468-480. DOI: 10.1109/Tpds.2004.1278104 |
0.649 |
|
2004 |
Kim Y, Perrig A, Tsudik G. Group key agreement efficient in communication Ieee Transactions On Computers. 53: 905-921. DOI: 10.1109/Tc.2004.31 |
0.627 |
|
2004 |
Rhee KH, Park YH, Tsudik G. An architecture for key management in hierarchical mobile ad-hoc networks Journal of Communications and Networks. 6: 156-162. DOI: 10.1109/Jcn.2004.6596636 |
0.49 |
|
2004 |
Saxena N, Tsudik G, Yi JH. Access control in ad hoc groups Proceedings of the First International Workshop On Hot Topics in Peer-to-Peer Systems, Hot-P2p '04. 2-7. |
0.381 |
|
2004 |
Castelluccia C, Jarecki S, Tsudik G. Secret handshakes from CA-oblivious encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3329: 293-307. |
0.377 |
|
2004 |
Ding X, Tsudik G, Xu S. Leak-free group signatures with immediate revocation Proceedings - International Conference On Distributed Computing Systems. 24: 608-615. |
0.353 |
|
2004 |
Lyer B, Mehrotra S, Mykletun E, Tsudik G, Wu Y. A framework for efficient storage security in RDBMS Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2992: 147-164. |
0.43 |
|
2003 |
Kim Y, Maino F, Narasimha M, Tsudik G. Secure group services for storage area networks Proceedings - 1st International Ieee Security in Storage Workshop, Sisw 2002. 80-93. DOI: 10.1109/SISW.2002.1183514 |
0.444 |
|
2003 |
Kim Y, Mazzocchi D, Tsudik G. Admission control in peer groups Proceedings - 2nd Ieee International Symposium On Network Computing and Applications, Nca 2003. 131-139. DOI: 10.1109/NCA.2003.1201147 |
0.375 |
|
2003 |
Kim Y, Maino F, Narasimha M, Rhee KH, Tsudik G. Secure group key management for storage area networks Ieee Communications Magazine. 41: 92-99. DOI: 10.1109/Mcom.2003.1222723 |
0.664 |
|
2003 |
Amir Y, Nita-Rotaru C, Stanton J, Tsudik G. Scaling secure group communication systems: Beyond peer-to-peer Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2003. 1: 226-237. DOI: 10.1109/DISCEX.2003.1194887 |
0.383 |
|
2003 |
Bicakci K, Tsudik G, Tung B. How to construct optimal one-time signatures Computer Networks. 43: 339-349. DOI: 10.1016/S1389-1286(03)00285-8 |
0.354 |
|
2003 |
Tsudik G. Weak forward security in mediated RSA Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2576: 45-54. |
0.427 |
|
2003 |
Tsudik G, Xu S. Accumulating composites and improved group signing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2894: 269-286. |
0.364 |
|
2003 |
Ding X, Tsudik G. Simple identity-based cryptography with mediated RSA Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2612: 193-210. |
0.372 |
|
2003 |
Ateniese G, Song D, Tsudik G. Quasi-efficient revocation of group signatures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2357: 183-197. |
0.33 |
|
2003 |
Saxena N, Tsudik G, Yi JH. Admission control in peer-to-peer: Design and performance evaluation Proceedings of the 1st Acm Workshop On Security of Ad Hoc and Security of Ad Hoc and Sensor Networks (in Association With 10th Acm Conference On Computer and Communications Security). 104-114. |
0.441 |
|
2002 |
Amir Y, Kim Y, Nita-Rotaru C, Tsudik G. On the performance of group key agreement protocols Proceedings - International Conference On Distributed Computing Systems. 463-464. DOI: 10.1145/1015040.1015045 |
0.593 |
|
2002 |
Amir Y, Kim Y, Nita-Rotaru C, Tsudik G. On the performance of group key agreement protocols Proceedings - International Conference On Distributed Computing Systems. 463-464. |
0.364 |
|
2002 |
Kim Y, Perrig A, Tsudik G. Communication-efficient group key agreement Ifip Advances in Information and Communication Technology. 65: 229-244. |
0.454 |
|
2001 |
Obraczka K, Viswanath K, Tsudik G. Flooding for reliable multicast in multi-hop ad hoc networks Wireless Networks. 7: 627-634. DOI: 10.1023/A:1012323519059 |
0.389 |
|
2001 |
Agarwal DA, Chevassut O, Thompson MR, Tsudik G. An integrated solution for secure group communication in wide-area networks Ieee Symposium On Computers and Communications - Proceedings. 22-28. |
0.452 |
|
2001 |
Syverson P, Tsudik G, Reed M, Landwehr C. Towards an analysis of onion routing security Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2009: 96-114. |
0.375 |
|
2001 |
Amir Y, Kim Y, Nita-Rotaru C, Schultz J, Stanton J, Tsudik G. Exploring robustness in group key agreement Proceedings - International Conference On Distributed Computing Systems. 399-408. |
0.404 |
|
2000 |
Ateniese G, Chevassut O, Hasse D, Kim Y, Tsudik G. The design of a group key agreement API Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2000. 1: 115-126. DOI: 10.1109/DISCEX.2000.824969 |
0.417 |
|
2000 |
Steiner M, Tsudik G, Waidner M. Key agreement in dynamic peer groups Ieee Transactions On Parallel and Distributed Systems. 11: 769-780. DOI: 10.1109/71.877936 |
0.518 |
|
2000 |
Ateniese G, Steiner M, Tsudik G. New multiparty authentication services and key agreement protocols Ieee Journal On Selected Areas in Communications. 18: 628-639. DOI: 10.1109/49.839937 |
0.552 |
|
2000 |
Bellare M, Garay JA, Hauser R, Herzberg A, Krawczyk H, Steiner M, Tsudik G, Van Herreweghen E, Waidner M. Design, implementation, and deployment of the iKP secure electronic payment system Ieee Journal On Selected Areas in Communications. 18: 611-627. DOI: 10.1109/49.839936 |
0.525 |
|
2000 |
Hardjono T, Tsudik G. IP multicast security: Issues and directions Annales Des Telecommunications/Annals of Telecommunications. 55: 324-340. DOI: 10.1007/Bf02994841 |
0.539 |
|
2000 |
Kim Y, Perrig A, Tsudik G. Simple and fault-tolerant key agreement for dynamic collaborative groups Proceedings of the Acm Conference On Computer and Communications Security. 235-244. |
0.403 |
|
2000 |
Ateniese G, Camenisch J, Joye M, Tsudik G. A practical and provably secure coalition-resistant group signature scheme Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1880: 255-270. |
0.36 |
|
1999 |
Hauser R, Przygienda T, Tsudik G. Lowering security overhead in link state routing Computer Networks. 31: 885-894. DOI: 10.1016/S1389-1286(98)00022-X |
0.508 |
|
1999 |
Ateniese G, Herzberg A, Krawczyk H, Tsudik G. Untraceable mobility or how to travel incognito Computer Networks. 31: 871-884. DOI: 10.1016/S1389-1286(98)00021-8 |
0.436 |
|
1999 |
Ateniese G, Tsudik G. Some open issues and new directions in group signatures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1648: 196-211. |
0.332 |
|
1998 |
Molva R, Tsudik G. Secret sets and applications Information Processing Letters. 65: 47-55. DOI: 10.1016/S0020-0190(97)80449-8 |
0.339 |
|
1998 |
Franklin M, Tsudik G. Secure group barter: Multi-party fair exchange with semi-trusted neutral parties Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1465: 90-102. DOI: 10.1007/BFb0055475 |
0.344 |
|
1998 |
Steiner M, Tsudik G, Waidner M. CLIQUES: a new approach to group key agreement Proceedings - International Conference On Distributed Computing Systems. 380-387. |
0.36 |
|
1997 |
Asokan N, Tsudik G, Waidner M. Server-supported signatures Journal of Computer Security. 5: 91-108. DOI: 10.3233/Jcs-1997-5105 |
0.504 |
|
1997 |
Gray JP, Kshemkalyani AD, Matyas SM, Peyravian M, Tsudik G. ATM cell encryption and key update synchronization Telecommunication Systems. 7: 391-408. DOI: 10.1023/A:1019192916871 |
0.356 |
|
1996 |
Hauser R, Janson P, Tsudik G, Herreweghen EV, Molva R. Robust and secure password and key change method Journal of Computer Security. 4: 97-111. DOI: 10.3233/Jcs-1996-4106 |
0.463 |
|
1996 |
Zatti S, Molva R, Tosi A, Tsudik G, Kurth H. Limitations of the approach of solving a network’s security problems with a firewall Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1146: 144-145. |
0.352 |
|
1995 |
Steiner M, Tsudik G, Waidner M. Refinement and extension of encrypted key exchange Operating Systems Review. 29: 22-30. DOI: 10.1145/206826.206834 |
0.523 |
|
1995 |
Chess D, Grosof B, Harrison C, Levine D, Parris C, Tsudik G. ltinerant Agents for Mobile Computing Ieee Personal Communications. 2: 34-49. DOI: 10.1109/98.468361 |
0.426 |
|
1995 |
Janson P, Tsudik G. Secure and minimal protocols for authenticated key distribution Computer Communications. 18: 645-653. DOI: 10.1016/0140-3664(95)99807-O |
0.469 |
|
1995 |
Herzberg A, Krawczyk H, Tsudik G. On travelling incognito Mobile Computing Systems and Applications - Workshop Proceedings. 205-210. |
0.308 |
|
1994 |
Molva R, Samfat D, Tsudik G. Authentication of mobile users Ieee Network. 8: 26-34. DOI: 10.1109/65.272938 |
0.445 |
|
1993 |
Estrin D, Steenstrup M, Tsudik G. A protocol for route establishment and packet forwarding across multidomain internets Ieee/Acm Transactions On Networking. 1: 56-70. DOI: 10.1109/90.222907 |
0.405 |
|
1991 |
Estrin D, Tsudik G. Secure control of transit internetwork traffic Computer Networks and Isdn Systems. 22: 363-382. DOI: 10.1016/0169-7552(91)90094-S |
0.436 |
|
1989 |
Tsudik G. Datagram authentication in internet gateways: implications of fragmentation and dynamic routing Ieee Journal On Selected Areas in Communications. 7: 499-504. DOI: 10.1109/49.17713 |
0.418 |
|
1989 |
Estrin D, Mogul J, Tsudik G. Visa protocols for controlling interorganizational datagram flow Ieee Journal On Selected Areas in Communications. 7: 486-498. DOI: 10.1109/49.17712 |
0.403 |
|
Show low-probability matches. |