2013
207Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data Networking. Alberto Compagno, Mauro Conti, Paolo Gasti, Gene Tsudik. CoRR (abs/1303.4823) (2013). Web SearchBibTeXDownload
206United We Stand: Intrusion Resilience in Mobile Unattended WSNs. Roberto Di Pietro, Gabriele Oligeri, Claudio Soriente, Gene Tsudik. IEEE Trans. Mob. Comput. (12): 1456-1468 (2013). Web SearchBibTeXDownload
2012
205Private Computation of Spatial and Temporal Power Consumption with Smart Meters. Zekeriya Erkin, Gene Tsudik. ACNS 2012, 561-577. Web SearchBibTeXDownload
204Securing Instrumented Environments over Content-Centric Networking: the Case of Lighting Control. Jeffery Burke, Paolo Gasti, Naveen Nathan, Gene Tsudik. CoRR (abs/1208.1336) (2012). Web SearchBibTeXDownload
203DoS and DDoS in Named-Data Networking. Paolo Gasti, Gene Tsudik, Ersin Uzun, Lixia Zhang. CoRR (abs/1208.0952) (2012). Web SearchBibTeXDownload
202Optimizing Bi-directional Low-Latency Communication in Named Data Networking. Mishari Al Mishari, Paolo Gasti, Naveen Nathan, Gene Tsudik. CoRR (abs/1207.7085) (2012). Web SearchBibTeXDownload
201Privacy-Oriented Cryptography (Dagstuhl Seminar 12381). Jan Camenisch, Mark Manulis, Gene Tsudik, Rebecca N. Wright. Dagstuhl Reports (2): 165-183 (2012). Web SearchBibTeXDownload
200Exploring Linkability of User Reviews. Mishari Al Mishari, Gene Tsudik. ESORICS 2012, 307-324. Web SearchBibTeXDownload
199On the performance of certain Private Set Intersection protocols. (And some remarks on the recent paper by Huang et al. in NDSS'12). Emiliano De Cristofaro, Gene Tsudik. IACR Cryptology ePrint Archive (2012): 54 (2012). Web SearchBibTeXDownload
198Systematic Treatment of Remote Attestation. Aurélien Francillon, Quan Nguyen, Kasper Bonne Rasmussen, Gene Tsudik. IACR Cryptology ePrint Archive (2012): 713 (2012). Web SearchBibTeXDownload
197Tweeting with Hummingbird: Privacy in Large-Scale Micro-Blogging OSNs. Emiliano De Cristofaro, Claudio Soriente, Gene Tsudik, Andrew Williams. IEEE Data Eng. Bull. (35): 93-100 (2012). Web SearchBibTeXDownload
196Hummingbird: Privacy at the Time of Twitter. Emiliano De Cristofaro, Claudio Soriente, Gene Tsudik, Andrew Williams. IEEE Symposium on Security and Privacy 2012, 285-299. Web SearchBibTeXDownload
195Harvesting SSL Certificate Data to Identify Web-Fraud. Mishari Al Mishari, Emiliano De Cristofaro, Karim M. El Defrawy, Gene Tsudik. I. J. Network Security (14): 324-338 (2012). Web SearchBibTeXDownload
194Reducing RFID reader load with the meet-in-the-middle strategy. Jung Hee Cheon, Jeongdae Hong, Gene Tsudik. Journal of Communications and Networks (14): 10-14 (2012). Web SearchBibTeXDownload
193Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber-physical convergence. Marco Conti, Sajal K. Das, Chatschik Bisdikian, Mohan Kumar, Lionel M. Ni, Andrea Passarella, George Roussos, Gerhard Tröster, Gene Tsudik, Franco Zambonelli. Pervasive and Mobile Computing (8): 2-21 (2012). Web SearchBibTeXDownload
192Self-healing in unattended wireless sensor networks. Roberto Di Pietro, Di Ma, Claudio Soriente, Gene Tsudik. TOSN (9): 7 (2012). Web SearchBibTeXDownload
191Experimenting with Fast Private Set Intersection. Emiliano De Cristofaro, Gene Tsudik. TRUST 2012, 55-73. Web SearchBibTeXDownload
190Genodroid: are privacy-preserving genomic tests ready for prime time?. Emiliano De Cristofaro, Sky Faber, Paolo Gasti, Gene Tsudik. WPES 2012, 97-108. Web SearchBibTeXDownload
2011
189Countering GATTACA: efficient and secure testing of fully-sequenced human genomes. Pierre Baldi, Roberta Baronio, Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik. ACM Conference on Computer and Communications Security 2011, 691-702. Web SearchBibTeXDownload
188Exploring Linkablility of Community Reviewing. Mishari Al Mishari, Gene Tsudik. CoRR (abs/1111.0338) (2011). Web SearchBibTeXDownload
187ANDaNA: Anonymous Named Data Networking Application. Steve DiBenedetto, Paolo Gasti, Gene Tsudik, Ersin Uzun. CoRR (abs/1112.2205) (2011). Web SearchBibTeXDownload
186Countering Gattaca: Efficient and Secure Testing of Fully-Sequenced Human Genomes. Pierre Baldi, Roberta Baronio, Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik. CoRR (abs/1110.2478) (2011). Web SearchBibTeXDownload
185Usability of Display-Equipped RFID Tags for Security Purposes. Alfred Kobsa, Rishab Nithyanand, Gene Tsudik, Ersin Uzun. ESORICS 2011, 434-451. Web SearchBibTeXDownload
184Fast and Private Computation of Set Intersection Cardinality. Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik. IACR Cryptology ePrint Archive (2011): 141 (2011). Web SearchBibTeXDownload
183Hummingbird: Privacy at the time of Twitter. Emiliano De Cristofaro, Claudio Soriente, Gene Tsudik, Andrew Williams. IACR Cryptology ePrint Archive (2011): 640 (2011). Web SearchBibTeXDownload
182Privacy-Preserving Location-Based On-Demand Routing in MANETs. Karim M. El Defrawy, Gene Tsudik. IEEE Journal on Selected Areas in Communications (29): 1926-1934 (2011). Web SearchBibTeXDownload
181ALARM: Anonymous Location-Aided Routing in Suspicious MANETs. Karim M. El Defrawy, Gene Tsudik. IEEE Trans. Mob. Comput. (10): 1345-1358 (2011). Web SearchBibTeXDownload
180Flexible Robust Group Key Agreement. Stanislaw Jarecki, Jihye Kim, Gene Tsudik. IEEE Trans. Parallel Distrib. Syst. (22): 879-886 (2011). Web SearchBibTeXDownload
179Enhancing Data Privacy in the Cloud. Yanbin Lu, Gene Tsudik. IFIPTM 2011, 117-132. Web SearchBibTeXDownload
178User-aided reader revocation in PKI-based RFID systems. Rishab Nithyanand, Gene Tsudik, Ersin Uzun. Journal of Computer Security (19): 1147-1172 (2011). Web SearchBibTeXDownload
177Intrusion-resilient integrity in data-centric unattended WSNs. Roberto Di Pietro, Claudio Soriente, Angelo Spognardi, Gene Tsudik. Pervasive and Mobile Computing (7): 495-508 (2011). Web SearchBibTeXDownload
176(If) Size Matters: Size-Hiding Private Set Intersection. Giuseppe Ateniese, Emiliano De Cristofaro, Gene Tsudik. Public Key Cryptography 2011, 156-173. Web SearchBibTeXDownload
175Group Distance Bounding Protocols - (Short Paper). Srdjan Capkun, Karim M. El Defrawy, Gene Tsudik. TRUST 2011, 302-312. Web SearchBibTeXDownload
174Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information. Emiliano De Cristofaro, Yanbin Lu, Gene Tsudik. TRUST 2011, 239-253. Web SearchBibTeXDownload
173Message from the workshop chairs. Sajal K. Das, Merkouris Karariopoulos, Guevara Noubir, Enzo Mingozzi, Nan Zhang. WOWMOM 2011, 1-4. Web SearchBibTeXDownload
2010
172Affiliation-Hiding Key Exchange with Untrusted Group Authorities. Mark Manulis, Bertram Poettering, Gene Tsudik. ACNS 2010, 402-419. Web SearchBibTeXDownload
171Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model. Emiliano De Cristofaro, Jihye Kim, Gene Tsudik. ASIACRYPT 2010, 213-231. Web SearchBibTeXDownload
170GDB: Group Distance Bounding Protocols. Karim M. El Defrawy, Srdjan Capkun, Gene Tsudik. CoRR (abs/1011.5295) (2010). Web SearchBibTeXDownload
169Readers Behaving Badly - Reader Revocation in PKI-Based RFID Systems. Rishab Nithyanand, Gene Tsudik, Ersin Uzun. ESORICS 2010, 19-36. Web SearchBibTeXDownload
168Secure Code Update for Embedded Devices via Proofs of Secure Erasure. Daniele Perito, Gene Tsudik. ESORICS 2010, 643-662. Web SearchBibTeXDownload
167Practical Private Set Intersection Protocols with Linear Complexity. Emiliano De Cristofaro, Gene Tsudik. Financial Cryptography 2010, 143-159. Web SearchBibTeXDownload
166(If) Size Matters: Size-Hiding Private Set Intersection. Giuseppe Ateniese, Emiliano De Cristofaro, Gene Tsudik. IACR Cryptology ePrint Archive (2010): 220 (2010). Web SearchBibTeXDownload
165Privacy-preserving Sharing of Sensitive Information. Emiliano De Cristofaro, Yanbin Lu, Gene Tsudik. IACR Cryptology ePrint Archive (2010): 471 (2010). Web SearchBibTeXDownload
164IRRES: Intrusion-Resilient Remote Email Storage. Di Ma, Gene Tsudik. ICDCS Workshops 2010, 72-76. Web SearchBibTeXDownload
163Privacy-Preserving Sharing of Sensitive Information. Salvatore J. Stolfo, Gene Tsudik. IEEE Security & Privacy (8): 16-17 (2010). Web SearchBibTeXDownload
162Security and privacy in emerging wireless networks. Di Ma, Gene Tsudik. IEEE Wireless Commun. (17): 12-21 (2010). Web SearchBibTeXDownload
161Intrusion-Resilience in Mobile Unattended WSNs. Roberto Di Pietro, Gabriele Oligeri, Claudio Soriente, Gene Tsudik. INFOCOM 2010, 2303-2311. Web SearchBibTeXDownload
160Some Security Topics with Possible Applications for Pairing-Based Cryptography. Gene Tsudik. Pairing 2010, 40. Web SearchBibTeXDownload
159Towards Plugging Privacy Leaks in the Domain Name System. Yanbin Lu, Gene Tsudik. Peer-to-Peer Computing 2010, 1-10. Web SearchBibTeXDownload
158Taming Big Brother Ambitions: More Privacy for Secret Handshakes. Mark Manulis, Bertram Poettering, Gene Tsudik. Privacy Enhancing Technologies 2010, 149-165. Web SearchBibTeXDownload
157Securing Mobile Unattended WSNs against a Mobile Adversary. Roberto Di Pietro, Gabriele Oligeri, Claudio Soriente, Gene Tsudik. SRDS 2010, 11-20. Web SearchBibTeXDownload
156Groupthink: usability of secure group association for wireless devices. Rishab Nithyanand, Nitesh Saxena, Gene Tsudik, Ersin Uzun. UbiComp 2010, 331-340. Web SearchBibTeXDownload
2009
155Universally Composable RFID Identification and Authentication Protocols. Mike Burmester, Tri Van Le, Breno de Medeiros, Gene Tsudik. ACM Trans. Inf. Syst. Secur. (12) (2009). Web SearchBibTeXDownload
154SRDP: Secure route discovery for dynamic source routing in MANETs. Jihye Kim, Gene Tsudik. Ad Hoc Networks (7): 1097-1109 (2009). Web SearchBibTeXDownload
153Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks. Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik. Ad Hoc Networks (7): 1463-1475 (2009). Web SearchBibTeXDownload
152Logging key assurance indicators in business processes. Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin. ASIACCS 2009, 364-367. Web SearchBibTeXDownload
151Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks. Karim M. El Defrawy, John Solis, Gene Tsudik. COMPSAC (1) 2009, 271-279. Web SearchBibTeXDownload
150Privacy-Preserving Querying in Sensor Networks. Emiliano De Cristofaro, Xuhua Ding, Gene Tsudik. CoRR (abs/0905.2158) (2009). Web SearchBibTeXDownload
149Towards Plugging Privacy Leaks in Domain Name System. Yanbin Lu, Gene Tsudik. CoRR (abs/0910.2472) (2009). Web SearchBibTeXDownload
148Harvesting SSL Certificate Data to Mitigate Web-Fraud. Mishari Al Mishari, Emiliano De Cristofaro, Karim M. El Defrawy, Gene Tsudik. CoRR (abs/0909.3688) (2009). Web SearchBibTeXDownload
147Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems. Rishab Nithyanand, Gene Tsudik, Ersin Uzun. IACR Cryptology ePrint Archive (2009): 465 (2009). Web SearchBibTeXDownload
146Reducing RFID Reader Load with the Meet-in-the-Middle Strategy. Jung Hee Cheon, Jeongdae Hong, Gene Tsudik. IACR Cryptology ePrint Archive (2009): 92 (2009). Web SearchBibTeXDownload
145Practical Private Set Intersection Protocols with Linear Computational and Bandwidth Complexity. Emiliano De Cristofaro, Gene Tsudik. IACR Cryptology ePrint Archive (2009): 491 (2009). Web SearchBibTeXDownload
144New adversary and new threats: security in unattended sensor networks. Di Ma, Claudio Soriente, Gene Tsudik. IEEE Network (23): 43-48 (2009). Web SearchBibTeXDownload
143Data Security in Unattended Wireless Sensor Networks. Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik. IEEE Trans. Computers (58): 1500-1511 (2009). Web SearchBibTeXDownload
142Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs. Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi. IEEE Trans. Parallel Distrib. Syst. (20): 158-170 (2009). Web SearchBibTeXDownload
141Remarks on ''Analysis of one popular group signature scheme'' in Asiacrypt 2006. Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik. IJACT (1): 320-322 (2009). Web SearchBibTeXDownload
140Using audio in secure device pairing. Michael T. Goodrich, Michael Sirivianos, John Solis, Claudio Soriente, Gene Tsudik, Ersin Uzun. IJSN (4): 57-68 (2009). Web SearchBibTeXDownload
139Secure pairing of interface constrained devices. Claudio Soriente, Gene Tsudik, Ersin Uzun. IJSN (4): 17-26 (2009). Web SearchBibTeXDownload
138Privacy-preserving revocation checking. Maithili Narasimha, John Solis, Gene Tsudik. Int. J. Inf. Sec. (8): 61-75 (2009). Web SearchBibTeXDownload
137Leak-free mediated group signatures. Xuhua Ding, Gene Tsudik, Shouhuai Xu. Journal of Computer Security (17): 489-514 (2009). Web SearchBibTeXDownload
136Caveat Emptor: A Comparative Study of Secure Device Pairing Methods. Arun Kumar, Nitesh Saxena, Gene Tsudik, Ersin Uzun. PerCom 2009, 1-10. Web SearchBibTeXDownload
135A comparative study of secure device pairing methods. Arun Kumar, Nitesh Saxena, Gene Tsudik, Ersin Uzun. Pervasive and Mobile Computing (5): 734-749 (2009). Web SearchBibTeXDownload
134Privacy-Preserving Policy-Based Information Transfer. Emiliano De Cristofaro, Stanislaw Jarecki, Jihye Kim, Gene Tsudik. Privacy Enhancing Technologies 2009, 164-184. Web SearchBibTeXDownload
133Serial hook-ups: a comparative usability study of secure device pairing methods. Alfred Kobsa, Rahim Sonawalla, Gene Tsudik, Ersin Uzun, Yang Wang. SOUPS 2009. Web SearchBibTeXDownload
132A new approach to secure logging. Di Ma, Gene Tsudik. TOS (5) (2009). Web SearchBibTeXDownload
131Efficient and provably secure aggregation of encrypted data in wireless sensor networks. Claude Castelluccia, Aldar C.-F. Chan, Einar Mykletun, Gene Tsudik. TOSN (5) (2009). Web SearchBibTeXDownload
130Collaborative authentication in unattended WSNs. Roberto Di Pietro, Claudio Soriente, Angelo Spognardi, Gene Tsudik. WISEC 2009, 237-244. Web SearchBibTeXDownload
2008
129Security and privacy in unattended sensor networks. Gene Tsudik. AINTEC 2008, 7. Web SearchBibTeXDownload
128Confronting a mobile adversary in unattended sensor networks. Gene Tsudik. ASIACCS 2008, 1. Web SearchBibTeXDownload
127Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange. Stanislaw Jarecki, Jihye Kim, Gene Tsudik. CT-RSA 2008, 352-369. Web SearchBibTeXDownload
126A New Approach to Secure Logging. Di Ma, Gene Tsudik. DBSec 2008, 48-63. Web SearchBibTeXDownload
125Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary. Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik. IACR Cryptology ePrint Archive (2008): 293 (2008). Web SearchBibTeXDownload
124DISH: Distributed Self-Healing in Unattended Sensor Networks. Di Ma, Gene Tsudik. IACR Cryptology ePrint Archive (2008): 158 (2008). Web SearchBibTeXDownload
123Scalable and Efficient Provable Data Possession. Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, Gene Tsudik. IACR Cryptology ePrint Archive (2008): 114 (2008). Web SearchBibTeXDownload
122Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks. Jihye Kim, Gene Tsudik. ICISC 2008, 66-83. Web SearchBibTeXDownload
121PRISM: Privacy-friendly routing in suspicious MANETs (and VANETs). Karim M. El Defrawy, Gene Tsudik. ICNP 2008, 258-267. Web SearchBibTeXDownload
120HAPADEP: Human-Assisted Pure Audio Device Pairing. Claudio Soriente, Gene Tsudik, Ersin Uzun. ISC 2008, 385-400. Web SearchBibTeXDownload
119Catch Me (If You Can): Data Survival in Unattended Sensor Networks. Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik. PerCom 2008, 185-194. Web SearchBibTeXDownload
118POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks. Roberto Di Pietro, Di Ma, Claudio Soriente, Gene Tsudik. SRDS 2008, 185-194. Web SearchBibTeXDownload
117DISH: Distributed Self-Healing. Di Ma, Gene Tsudik. SSS 2008, 47-62. Web SearchBibTeXDownload
116RFID security and privacy: long-term research or short-term tinkering?. Gene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, Melanie R. Rieback. WISEC 2008, 160. Web SearchBibTeXDownload
2007
115Robust group key agreement using short broadcasts. Stanislaw Jarecki, Jihye Kim, Gene Tsudik. ACM Conference on Computer and Communications Security 2007, 411-420. Web SearchBibTeXDownload
114Equipping smart devices with public key signatures. Xuhua Ding, Daniele Mazzocchi, Gene Tsudik. ACM Trans. Internet Techn. (7) (2007). Web SearchBibTeXDownload
113Threshold cryptography in P2P and MANETs: The case of access control. Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi. Computer Networks (51): 3632-3649 (2007). Web SearchBibTeXDownload
112Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement. Stanislaw Jarecki, Jihye Kim, Gene Tsudik. CT-RSA 2007, 287-308. Web SearchBibTeXDownload
111Privacy-Preserving Revocation Checking with Modified CRLs. Maithili Narasimha, Gene Tsudik. EuroPKI 2007, 18-33. Web SearchBibTeXDownload
110HAPADEP: Human Asisted Pure Audio Device Pairing. Claudio Soriente, Gene Tsudik, Ersin Uzun. IACR Cryptology ePrint Archive (2007): 93 (2007). Web SearchBibTeXDownload
109BEDA: Button-Enabled Device Pairing. Claudio Soriente, Gene Tsudik, Ersin Uzun. IACR Cryptology ePrint Archive (2007): 246 (2007). Web SearchBibTeXDownload
108Forward-Secure Sequential Aggregate Authentication. Di Ma, Gene Tsudik. IACR Cryptology ePrint Archive (2007): 52 (2007). Web SearchBibTeXDownload
107ALARM: Anonymous Location-Aided Routing in Suspicious MANETs. Karim M. El Defrawy, Gene Tsudik. ICNP 2007, 304-313. Web SearchBibTeXDownload
106Extended Abstract: Forward-Secure Sequential Aggregate Authentication. Di Ma, Gene Tsudik. IEEE Symposium on Security and Privacy 2007, 86-91. Web SearchBibTeXDownload
105Correction to "Exploring Mesh and Tree-Based Multicast Routing Protocols for MANETs". Kumar Viswanath, Katia Obraczka, Gene Tsudik. IEEE Trans. Mob. Comput. (6): 237 (2007). Web SearchBibTeXDownload
104A Family of Dunces: Trivial RFID Identification and Authentication Protocols. Gene Tsudik. Privacy Enhancing Technologies 2007, 45-61. Web SearchBibTeXDownload
2006
103Authentication for Paranoids: Multi-party Secret Handshakes. Stanislaw Jarecki, Jihye Kim, Gene Tsudik. ACNS 2006, 325-339. Web SearchBibTeXDownload
102Improving secure server performance by re-balancing SSL/TLS handshakes. Claude Castelluccia, Einar Mykletun, Gene Tsudik. ASIACCS 2006, 26-34. Web SearchBibTeXDownload
101Secure acknowledgment aggregation and multisignatures with limited robustness. Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik. Computer Networks (50): 1639-1652 (2006). Web SearchBibTeXDownload
100Authentication of Outsourced Databases Using Signature Aggregation and Chaining. Maithili Narasimha, Gene Tsudik. DASFAA 2006, 420-436. Web SearchBibTeXDownload
99Aggregation Queries in the Database-As-a-Service Model. Einar Mykletun, Gene Tsudik. DBSec 2006, 89-103. Web SearchBibTeXDownload
98Revisiting Oblivious Signature-Based Envelopes. Samad Nasserian, Gene Tsudik. Financial Cryptography 2006, 221-235. Web SearchBibTeXDownload
97Simple and Flexible Private Revocation Checking. John Solis, Gene Tsudik. IACR Cryptology ePrint Archive (2006): 66 (2006). Web SearchBibTeXDownload
96Remarks on "Analysis of One Popular Group Signature Scheme" in Asiacrypt 2006. Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik. IACR Cryptology ePrint Archive (2006): 464 (2006). Web SearchBibTeXDownload
95On Security of Sovereign Joins. Einar Mykletun, Gene Tsudik. IACR Cryptology ePrint Archive (2006): 380 (2006). Web SearchBibTeXDownload
94A Family of Dunces: Trivial RFID Identification and Authentication Protocols. Gene Tsudik. IACR Cryptology ePrint Archive (2006): 15 (2006). Web SearchBibTeXDownload
93Loud and Clear: Human-Verifiable Authentication Based on Audio. Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, Ersin Uzun. ICDCS 2006, 10. Web SearchBibTeXDownload
92Exploring Mesh and Tree-Based Multicast Routing Protocols for MANETs. Kumar Viswanath, Katia Obraczka, Gene Tsudik. IEEE Trans. Mob. Comput. (5): 28-42 (2006). Web SearchBibTeXDownload
91YA-TRAP: Yet Another Trivial RFID Authentication Protocol. Gene Tsudik. PerCom Workshops 2006, 640-643. Web SearchBibTeXDownload
90A Flexible Framework for Secret Handshakes. Gene Tsudik, Shouhuai Xu. Privacy Enhancing Technologies 2006, 295-315. Web SearchBibTeXDownload
89Simple and Flexible Revocation Checking with Privacy. John Solis, Gene Tsudik. Privacy Enhancing Technologies 2006, 351-367. Web SearchBibTeXDownload
88Authentication and integrity in outsourced databases. Einar Mykletun, Maithili Narasimha, Gene Tsudik. TOS (2): 107-138 (2006). Web SearchBibTeXDownload
2005
87DSAC: integrity for outsourced databases with signature aggregation and chaining. Maithili Narasimha, Gene Tsudik. CIKM 2005, 235-236. Web SearchBibTeXDownload
86Sanitizable Signatures. Giuseppe Ateniese, Daniel H. Chou, Breno de Medeiros, Gene Tsudik. ESORICS 2005, 159-177. Web SearchBibTeXDownload
85Revisiting Oblivious Signature-Based Envelopes. Samad Nasserian, Gene Tsudik. IACR Cryptology ePrint Archive (2005): 283 (2005). Web SearchBibTeXDownload
84DSAC: An Approach to Ensure Integrity of Outsourced Databases using Signature Aggregation and Chaining. Maithili Narasimha, Gene Tsudik. IACR Cryptology ePrint Archive (2005): 297 (2005). Web SearchBibTeXDownload
83Loud and Clear: Human-Verifiable Authentication Based on Audio. Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, Ersin Uzun. IACR Cryptology ePrint Archive (2005): 428 (2005). Web SearchBibTeXDownload
82Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes. Claude Castelluccia, Einar Mykletun, Gene Tsudik. IACR Cryptology ePrint Archive (2005): 37 (2005). Web SearchBibTeXDownload
81Flexible Framework for Secret Handshakes (Multi-Party Anonymous and Un-observable Authentication). Gene Tsudik, Shouhuai Xu. IACR Cryptology ePrint Archive (2005): 34 (2005). Web SearchBibTeXDownload
80Efficient Node Admission for Short-lived Mobile Ad Hoc Networks. Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi. ICNP 2005, 269-278. Web SearchBibTeXDownload
79Secure Spread: An Integrated Architecture for Secure Group Communication. Yair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton, Gene Tsudik. IEEE Trans. Dependable Sec. Comput. (2): 248-261 (2005). Web SearchBibTeXDownload
78A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks. Kyung Hyune Rhee, Young-Ho Park, Gene Tsudik. J. Inf. Sci. Eng. (21): 415-428 (2005). Web SearchBibTeXDownload
77SRDP: Securing Route Discovery in DSR. Jihye Kim, Gene Tsudik. MobiQuitous 2005, 247-260. Web SearchBibTeXDownload
76E.cient Aggregation of encrypted data in Wireless Sensor Networks. Claude Castelluccia, Einar Mykletun, Gene Tsudik. MobiQuitous 2005, 109-117. Web SearchBibTeXDownload
75Brief announcement: a flexible framework for secret handshakes. Gene Tsudik, Shouhuai Xu. PODC 2005, 39. Web SearchBibTeXDownload
2004
74Tree-based group key agreement. Yongdae Kim, Adrian Perrig, Gene Tsudik. ACM Trans. Inf. Syst. Secur. (7): 60-96 (2004). Web SearchBibTeXDownload
73On the performance of group key agreement protocols. Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene Tsudik. ACM Trans. Inf. Syst. Secur. (7): 457-488 (2004). Web SearchBibTeXDownload
72Fine-grained control of security capabilities. Dan Boneh, Xuhua Ding, Gene Tsudik. ACM Trans. Internet Techn. (4): 60-82 (2004). Web SearchBibTeXDownload
71Secret Handshakes from CA-Oblivious Encryption. Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik. ASIACRYPT 2004, 293-307. Web SearchBibTeXDownload
70A Framework for Efficient Storage Security in RDBMS. Balakrishna R. Iyer, Sharad Mehrotra, Einar Mykletun, Gene Tsudik, Yonghua Wu. EDBT 2004, 147-164. Cited by 41Web SearchBibTeXDownload
69Signature Bouquets: Immutability for Aggregated/Condensed Signatures. Einar Mykletun, Maithili Narasimha, Gene Tsudik. ESORICS 2004, 160-176. Web SearchBibTeXDownload
68Access control in ad hoc groups. Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi. HOT-P2P 2004, 2-7. Web SearchBibTeXDownload
67Leak-Free Group Signatures with Immediate Revocation. Xuhua Ding, Gene Tsudik, Shouhuai Xu. ICDCS 2004, 608-615. Web SearchBibTeXDownload
66Identity-Based Access Control for Ad Hoc Groups. Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi. ICISC 2004, 362-379. Web SearchBibTeXDownload
65Group Key Agreement Efficient in Communication. Yongdae Kim, Adrian Perrig, Gene Tsudik. IEEE Trans. Computers (53): 905-921 (2004). Web SearchBibTeXDownload
64Secure Group Communication Using Robust Contributory Key Agreement. Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Gene Tsudik. IEEE Trans. Parallel Distrib. Syst. (15): 468-480 (2004). Web SearchBibTeXDownload
63Authentication and Integrity in Outsourced Databases. Einar Mykletun, Maithili Narasimha, Gene Tsudik. NDSS 2004. Web SearchBibTeXDownload
62Brief announcement: secret handshakes from CA-oblivious encryption. Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik. PODC 2004, 394. Web SearchBibTeXDownload
61A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation. Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik. SCN 2004, 193-207. Web SearchBibTeXDownload
60A Privacy-Preserving Index for Range Queries. Bijit Hore, Sharad Mehrotra, Gene Tsudik. VLDB 2004, 720-731. Cited by 110Web SearchBibTeXDownload
2003
59Accumulating Composites and Improved Group Signing. Gene Tsudik, Shouhuai Xu. ASIACRYPT 2003, 269-286. Web SearchBibTeXDownload
58How to construct optimal one-time signatures. Kemal Bicakci, Gene Tsudik, Brian Tung. Computer Networks (43): 339-349 (2003). Web SearchBibTeXDownload
57Simple Identity-Based Cryptography with Mediated RSA. Xuhua Ding, Gene Tsudik. CT-RSA 2003, 193-210. Web SearchBibTeXDownload
56Scaling Secure Group Communication Systems: Beyond Peer-to-Peer. Yair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton, Gene Tsudik. DISCEX (1) 2003, 226-237. Web SearchBibTeXDownload
55On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control. Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi. ICNP 2003, 336. Web SearchBibTeXDownload
54Admission Control in Peer Groups. Yongdae Kim, Daniele Mazzocchi, Gene Tsudik. NCA 2003, 131-139. Web SearchBibTeXDownload
53Admission control in Peer-to-Peer: design and performance evaluation. Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi. SASN 2003, 104-113. Web SearchBibTeXDownload
2002
52Quasi-Efficient Revocation in Group Signatures. Giuseppe Ateniese, Dawn Xiaodong Song, Gene Tsudik. Financial Cryptography 2002, 183-197. Web SearchBibTeXDownload
51Tree-based Group Key Agreement. Yongdae Kim, Adrian Perrig, Gene Tsudik. IACR Cryptology ePrint Archive (2002): 9 (2002). Web SearchBibTeXDownload
50On the Performance of Group Key Agreement Protocols. Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene Tsudik. ICDCS 2002, 463-464. Web SearchBibTeXDownload
49Secure Group Services for Storage Area Networks. Yongdae Kim, Maithili Narasimha, Fabio Maino, Gene Tsudik. IEEE Security in Storage Workshop 2002, 80-93. Web SearchBibTeXDownload
48Experimenting with Server-Aided Signatures. Xuhua Ding, Daniele Mazzocchi, Gene Tsudik. NDSS 2002. Web SearchBibTeXDownload
47Weak Forward Security in Mediated RSA. Gene Tsudik. SCN 2002, 45-54. Web SearchBibTeXDownload
2001
46Quasi-Efficient Revocation of Group Signatures. Giuseppe Ateniese, Dawn Song, Gene Tsudik. IACR Cryptology ePrint Archive (2001): 101 (2001). Web SearchBibTeXDownload
45Exploring Robustness in Group Key Agreement. Yair Amir, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Yongdae Kim, Gene Tsudik. ICDCS 2001, 399-408. Web SearchBibTeXDownload
44Pushing the Limits of Multicast in Ad Hoc Networks. Katia Obraczka, Gene Tsudik, Kumar Viswanath. ICDCS 2001, 719-722. Web SearchBibTeXDownload
43An Integrated Solution for Secure Group Communication in Wide-Area Networks. Deborah A. Agarwal, Olivier Chevassut, Mary R. Thompson, Gene Tsudik. ISCC 2001, 22-28. Web SearchBibTeXDownload
42Communication-Efficient Group Key Agreement. Yongdae Kim, Adrian Perrig, Gene Tsudik. SEC 2001, 229-244. Web SearchBibTeX
41A Method for Fast Revocation of Public Key Certificates and Security Capabilities. Dan Boneh, Xuhua Ding, Gene Tsudik, Chi-Ming Wong. USENIX Security Symposium 2001. Web SearchBibTeXDownload
40Flooding for Reliable Multicast in Multi-Hop Ad Hoc Networks. Katia Obraczka, Kumar Viswanath, Gene Tsudik. Wireless Networks (7): 627-634 (2001). Web SearchBibTeXDownload
2000
39Simple and fault-tolerant key agreement for dynamic collaborative groups. Yongdae Kim, Adrian Perrig, Gene Tsudik. ACM Conference on Computer and Communications Security 2000, 235-244. Web SearchBibTeXDownload
38IP multicast security: Issues and directions. Thomas Hardjono, Gene Tsudik. Annales des Télécommunications (55): 324-340 (2000). Web SearchBibTeXDownload
37A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik. CRYPTO 2000, 255-270. Web SearchBibTeXDownload
36Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments. Jonathan Robert Stanton, Yair Amir, Damian Hasse, Giuseppe Ateniese, Yongdae Kim, Cristina Nita-Rotaru, Theo Schlossnagle, John L. Schultz, Gene Tsudik. ICDCS 2000, 330-343. Web SearchBibTeXDownload
35New multiparty authentication services and key agreement protocols. Giuseppe Ateniese, Michael Steiner, Gene Tsudik. IEEE Journal on Selected Areas in Communications (18): 628-639 (2000). Web SearchBibTeXDownload
34Design, implementation, and deployment of the iKP secure electronic payment system. Mihir Bellare, Juan A. Garay, Ralf C. Hauser, Amir Herzberg, Hugo Krawczyk, Michael Steiner, Gene Tsudik, Els Van Herreweghen, Michael Waidner. IEEE Journal on Selected Areas in Communications (18): 611-627 (2000). Web SearchBibTeXDownload
33Key Agreement in Dynamic Peer Groups. Michael Steiner, Gene Tsudik, Michael Waidner. IEEE Trans. Parallel Distrib. Syst. (11): 769-780 (2000). Web SearchBibTeXDownload
32Towards an Analysis of Onion Routing Security. Paul F. Syverson, Gene Tsudik, Michael G. Reed, Carl E. Landwehr. Workshop on Design Issues in Anonymity and Unobservability 2000, 96-114. Web SearchBibTeXDownload
1999
31Untraceable mobility or how to travel incognito. Giuseppe Ateniese, Amir Herzberg, Hugo Krawczyk, Gene Tsudik. Computer Networks (31): 871-884 (1999). Web SearchBibTeXDownload
30Lowering security overhead in link state routing. Ralf C. Hauser, Tony Przygienda, Gene Tsudik. Computer Networks (31): 885-894 (1999). Web SearchBibTeXDownload
29Flooding for reliable multicast in multi-hop ad hoc networks. Christopher Ho, Katia Obraczka, Gene Tsudik, Kumar Viswanath. DIAL-M 1999, 64-71. Web SearchBibTeXDownload
28Some Open Issues and New Directions in Group Signatures. Giuseppe Ateniese, Gene Tsudik. Financial Cryptography 1999, 196-211. Web SearchBibTeXDownload
27Group Signatures Á la carte. Giuseppe Ateniese, Gene Tsudik. SODA 1999, 848-849. Web SearchBibTeXDownload
1998
26A Security Architecture for Computational Grids. Ian T. Foster, Carl Kesselman, Gene Tsudik, Steven Tuecke. ACM Conference on Computer and Communications Security 1998, 83-92. Cited by 1302Web SearchBibTeXDownload
25Authenticated Group Key Agreement and Friends. Giuseppe Ateniese, Michael Steiner, Gene Tsudik. ACM Conference on Computer and Communications Security 1998, 17-26. Web SearchBibTeXDownload
24Secure Group Barter: Multi-party Fair Exchange with Semi-Trusted Neutral Parties. Matthew K. Franklin, Gene Tsudik. Financial Cryptography 1998, 90-102. Web SearchBibTeXDownload
23CLIQUES: A New Approach to Group Key Agreement. Michael Steiner, Gene Tsudik, Michael Waidner. ICDCS 1998, 380-387. Web SearchBibTeXDownload
22Secret Sets and Applications. Refik Molva, Gene Tsudik. Inf. Process. Lett. (65): 47-55 (1998). Web SearchBibTeXDownload
1997
21Scalability and Flexibility in Authentication Services: The KryptoKnight Approach. Philippe A. Janson, Gene Tsudik, Moti Yung. INFOCOM 1997, 725-736. Web SearchBibTeX
20Server-Supported Signatures. N. Asokan, Gene Tsudik, Michael Waidner. Journal of Computer Security (5): 91-108 (1997). Web SearchBibTeXDownload
19Reducing the Cost of Security in Link-State Routing. Ralf C. Hauser, Tony Przygienda, Gene Tsudik. NDSS 1997. Web SearchBibTeXDownload
18ATM cell encryption and key update synchronization. James P. Gray, Ajay D. Kshemkalyani, Stephen M. Matyas, Mohammad Peyravian, Gene Tsudik. Telecommunication Systems (7): 391-408 (1997). Web SearchBibTeXDownload
1996
17Diffie-Hellman Key Distribution Extended to Group Communication. Michael Steiner, Gene Tsudik, Michael Waidner. ACM Conference on Computer and Communications Security 1996, 31-37. Web SearchBibTeXDownload
16Server-Supported Signatures. N. Asokan, Gene Tsudik, Michael Waidner. ESORICS 1996, 131-143. Web SearchBibTeXDownload
15Limitations of the Approach of Solving a Network's Security Problem with a Firewall. Stefano Zatti, Refik Molva, Angelo Tosi, Gene Tsudik, Helmut Kurth. ESORICS 1996, 144-145. Web SearchBibTeXDownload
14Robust and Secure Password and Key Change Method. Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen. Journal of Computer Security (4): 97-112 (1996). Cited by 7Web SearchBibTeXDownload
1995
13Secure and minimal protocols for authenticated key distribution. Philippe A. Janson, Gene Tsudik. Computer Communications (18): 645-653 (1995). Web SearchBibTeXDownload
12Refinement and Extension of Encrypted Key Exchange. Michael Steiner, Gene Tsudik, Michael Waidner. Operating Systems Review (29): 22-30 (1995). Web SearchBibTeXDownload
1994
11Robust and Secure Password and Key Change Method. Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen. ESORICS 1994, 107-122. Cited by 7Web SearchBibTeXDownload
1993
10On Simple and Secure Key Distribution. Gene Tsudik, Els Van Herreweghen. ACM Conference on Computer and Communications Security 1993, 49-57. Cited by 14Web SearchBibTeXDownload
9A protocol for route establishment and packet forwarding across multidomain internets. Deborah Estrin, Martha Steenstrup, Gene Tsudik. IEEE/ACM Trans. Netw. (1): 56-70 (1993). Web SearchBibTeXDownload
8Some Remarks on Protecting Weak Keys and Poorly-Chosen Secrets from Guessing Attacks. Gene Tsudik, Els Van Herreweghen. SRDS 1993, 136-142. Cited by 22Web SearchBibTeX
1992
7KryptoKnight Authentication and Key Distribution System. Refik Molva, Gene Tsudik, Els Van Herreweghen, Stefano Zatti. ESORICS 1992, 155-174. Cited by 112Web SearchBibTeXDownload
6Policy Enforcement in Stub Autonomous Domains. Gene Tsudik. ESORICS 1992, 229-257. Web SearchBibTeXDownload
5Message Authentication with One-Way Hash Functions. Gene Tsudik. INFOCOM 1992, 2055-2059. Web SearchBibTeX
1991
4Secure Control of Transit Internetwork Traffic. Deborah Estrin, Gene Tsudik. Computer Networks and ISDN Systems (22): 363-382 (1991). Web SearchBibTeXDownload
1990
3AudES - An Expert System for Security Auditing. Gene Tsudik, Rita C. Summers. IAAI 1990, 221-232. Web SearchBibTeXDownload
1989
2Security Issues in Policy Routing. Deborah Estrin, Gene Tsudik. IEEE Symposium on Security and Privacy 1989, 183-193. Web SearchBibTeXDownload
1987
1Visa Scheme for Inter-Organization Network Security. Deborah Estrin, Gene Tsudik. IEEE Symposium on Security and Privacy 1987, 174-183. Web SearchBibTeX
from DBLP and Google Scholar
Developed by the Database Group at the University of Wisconsin and Yahoo! Research