Publications of all sorts, shapes and sizes...

    2018

  1. M. Ambrosin, A. Compagno, M. Conti, C. Ghali and G. Tsudik,
    Security and Privacy Analysis of Prominent Future Internet Architectures,
    IEEE Communications Surveys and Tutorials, accepted; to appear in 2018.
    fia-survey18.pdf  

  2. G. Acs, M. Conti, C. Ghali, P. Gasti, G. Tsudik and C. Wood,
    Privacy-Aware Caching in Information-Centric Networking,
    IEEE Transactions on Dependable and Secure Computing, accepted; to appear in 2018.
    caching-tdsc18.pdf  

  3. X. Carpent, N. Rattanavipanon and G. Tsudik,
    ERASMUS: Efficient Remote Attestation via Self-Measurements for Unattended Settings,
    IEEE/ACM Design, Automation, and Test in Europe (DATE), 2018.
    erasmus-date18.pdf  

    2017

  4. I. Martinovic, K. Rasmussen, M. Roeschlin and G. Tsudik, 
    Authentication Using Pulse-Response Biometrics, 
    Communications of the ACM (CACM): Research Highlights, Vol. 60, No. 1, January 2017.
    contatt-CACM16.pdf  

  5. G. Tsudik,
    Authorship Integrity and Attacks,
    IEEE Security & Privacy, Vol. 15, No. 4, July/August 2017.
    authorship17.pdf    

  6. T. Bradley, X. Ding and G. Tsudik,
    Genomic Security (Lest We Forget),
    IEEE Security & Privacy, Vol. 50, No. 5, September/October 2017.
    gen-sec17.pdf    

  7. B. Berg, T. Kaczmarek, A. Kobsa and G. Tsudik,
    An Exploration of the Effects of Sensory Stimuli on the Completion of Security Tasks,
    IEEE Security & Privacy, Vol. 50, No. 6, November/December 2017.
    sensor17.pdf  

  8. X. Carpent, K. ElDefrawy, N. Rattanavipanon and G. Tsudik,
    LIghtweight Swarm Attestation: A Tale of Two LISAs,
    ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2017.
    lisas-asiaccs17.pdf    

  9. A. Compagno, M. Conti, D. Lain and G. Tsudik,
    Don’t Skype & Type! Acoustic Eavesdropping in Voice-Over-IP,
    ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2017.
    skype-asiaccs17.pdf    

  10. M. Conti, G. Lovisotto, I. Martinovic and G Tsudik,
    FADEWICH: Fast Deauthentication over the Wireless Channel,
    IEEE International Conference on Distributed Computing Systems (ICDCS), 2017.
    fadewich-icdcs17.pdf    

  11. K. ElDefrawy, N. Rattanavipanon and G. Tsudik,
    Fusing Hybrid Remote Attestation with a Formally Verified Microkernel: Lessons Learned,
    IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Industry Track, 2017.
    hydra-dsn17.pdf    

  12. C. Ghali, G. Tsudik, E. Uzun and C. Wood,
    Closing the Floodgates with Stateless Content-Centric Networking,
    IEEE Conference on Computer Communications and Networks (ICCCN), 2017. Best Paper Award.
    stateless-icccn17.pdf    

  13. K. ElDefrawy, N. Rattanavipanon and G. Tsudik,
    HYDRA: HYbrid Design for Remote Attestation (Using a Formally Verified Microkernel),
    ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSEC), 2017.
    hydra-wisec17.pdf    

  14. B. Berg, T. Kaczmarek, A. Kobsa and G. Tsudik,
    Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks,
    Applied Cryptography and Network Security (ACNS), 2017.
    visual-acns17.pdf    

  15. A. Compagno, M. Conti, D. Lain and G. Tsudik,
    Skype & Type: Keystroke Leakage over VoIP,
    BlackHat USA, 2017.
    skype-bhat17.pdf    

  16. S. Jha, H. Tan and G. Tsudik,
    MTRA: Multiple-Tier Remote Attestations in the Internet of Things,
    IEEE Conference on Communications and Network Security (CNS), 2017.
    mtra-cns17.pdf    

  17. I. Oliveira-Nunes, G. Tsudik and C. Wood,
    Namespace Tunnels in Content-Centric Networks,
    IEEE Conference on Local Computer Networks (LCN), 2017.
    vpn-lcn17.pdf    

  18. C. Ghali, G. Tsudik and C. Wood,
    Mitigating On-Path Adversaries in Content-Centric Networks,
    IEEE Conference on Local Computer Networks (LCN), 2017.
    onpath-lcn17.pdf    

  19. S. Mirzamohammadi, J. Chen, A. Amiri Sani, S. Mehrotra, and G. Tsudik,
    Ditio: Trustworthy Auditing of Sensor Activities in Mobile & IoT Devices,
    ACM Conference on Embedded Networked Sensor Systems (SenSys), 2017.
    ditio-sensys17.pdf    

  20. C. Ghali, G. Tsudik and C. Wood,
    When Encryption is Not Enough: Privacy Attacks in Content-Centric Networking,
    ACM Conference on Information-Centric Networking (ICN), 2017.
    ccnpriv-icn17.pdf    

  21. Z. Zhang, X. Ding, G. Tsudik, J. Cui and Z. Li,
    Presence Attestation: The Missing Link In Dynamic Trust Bootstrapping,
    ACM Conference on Computer and Communications Security (CCS), 2017.
    pres-ccs17.pdf  

  22. X. Carpent, S. Faber, T. Sander and G. Tsudik,
    Private Set Projections & Variants,
    ACM Workshop on Privacy in the Electronic Society (WPES), 2017.
    proj-wpes17.pdf  

    2016

  23. G. Tsudik, E. Uzun, and C. Wood,
    AC3N: An API and Service for Anonymous Communication in Content-Centric Networking,
    IEEE Consumer Communications and Networking Conference (CCNC), 2016.
    ac3n-ccnc16.pdf    

  24. G. Tsudik, E. Uzun, C. Wood and E. Yeh,
    Practical Accounting in Content-Centric Networking,
    IEEE/IFIP Network Operations and Management Symposium (NOMS), 2016.
    acct-noms16.pdf    

  25. F. Brasser, K. Rasmussen, A. Sadeghi and G. Tsudik,
    Low-End Device Attestation: the Prover's Perspective,
    ACM Design Automation Conference (DAC), 2016.
    prover-dac16.pdf    

  26. T. Abera, N. Asokan, L. Davi,  F. Koushanfar, A. Paverd, A. Sadeghi and G. Tsudik,
    INVITED: Things, Trouble, Trust: On Building Trust in IoT Systems,
    ACM Design Automation Conference (DAC), 2016.
    invited-dac16.pdf    

  27. C. Ghali, G. Tsudik and C. Wood.
    BEAD: Best Effort Autonomous Deletion in Content-Centric Networking,
    IFIP Networking Conference (NETWORKING), 2016.
    bead-ifip16.pdf    

  28. A. Ibrahim, A. Sadeghi, G. Tsudik and S. Zeitouni,
    DARPA: Device Attestation Resilient against Physical Attacks,
    ACM Conference on Wireless Network Security (WiSEC), 2016.
    darpa-wisec16.pdf    

  29. T. Bradley, S. Faber and G. Tsudik,
    Bounded Size-Hiding Private Set Intersection,
    Security and Cryptography for Networks (SCN), 2016.
    bshipsi-scn16.pdf    

  30. G. Tsudik (aka Trotta Gnam),
    Zero Knowledge Made Easy, So It Won't Make You Dizzy,
    Security and Cryptography for Networks (SCN), 2016.
    zk-scn16.pdf  

  31. C. Ghali, G. Tsudik and C. Wood,
    Network Names in Content-Centric Networking: the Joys of Being Nameless,
    ACM Conference on Information-Centric Networking (ICN), 2016.
    nameless-icn16.pdf  

  32. T. Abera, N. Asokan, L. Davi, J. Ekberg T. Nyman, A. Paverd, A. Sadeghi and G. Tsudik,
    C-FLAT: Control-FLow ATtestation for Embedded Systems Software,
    ACM Conference on Computer and Communications Security (CCS), 2016.
    cflat-ccs16.pdf  

  33. M. Almishari, E. Oguz and G. Tsudik,
    Trilateral Large-Scale OSN Account Linkability Study,
    AAAI Fall Symposium on Privacy and Language Technologies (PLT), 2016.
    aaai-link16.pdf  

  34. I. Martinovic, K. Rasmussen, M. Roeschlin, I. Sluganovic and G. Tsudik,
    Generating Secret Keys from Biometric Body Impedance Measurement,
    ACM Workshop on Privacy in the Electronic Society (WPES), 2016.
    imped-wpes16.pdf  

  35. C. Ghali, G. Tsudik and C. Wood,
    (The Futility of) Data Privacy in Content-Centric Networking,
    ACM Workshop on Privacy in the Electronic Society (WPES), 2016.
    ccn-wpes16.pdf  

    2015

  36. E. Ayday, E. De Cristofaro, JP Hubaux and G. Tsudik,
    Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare?,
    IEEE Computer, Vol 48, No. 2, February 2015.
    WGS-Computer15.pdf

  37. T. Kaczmarek, A. Kobsa, R. Sy and G. Tsudik,
    An Unattended Study of Users Performing Security Critical Tasks Under Adversarial Noise,
    NDSS Workshop on Usable Security (USEC), 2015.
    noise-USEC15.pdf

  38. A. Compagno, M. Conti, P. Gasti, L. Mancini and G. Tsudik,
    Violating Consumer Anonymity: Geo-locating Nodes in Named Data Networking,
    Applied Cryptography and Network Security (ACNS), 2015. Best Student Paper Award.
    geoloc-ACNS15.pdf

  39. K. El Defrawy, G. Holland and G. Tsudik,
    Remote Attestation of Heterogeneous Cyber-Physical Systems: The Automotive Use Case,
    Conference on Embedded Security in Cars (ESCAR), 2015.
    attest-ESCAR15.pdf

  40. A. Compagno, M. Conti, C. Ghali, G. Tsudik,
    To NACK or not to NACK? Negative Acknowledgments in Information-Centric Networking,
    IEEE Conference on Computer Communications and Networks (ICCCN), 2015.
    ndn-nacks-ICCCN15.pdf

  41. S. Faber, R. Petrlic and G. Tsudik,
    UnLinked: Private Proximity-based Oline OSN Interaction,
    ACM Workshop on Privacy in the Electronic Society (WPES), 2015.
    unlinked-WPES15.pdf

  42. C. Ghali, M. Schlosberg, G. Tsudik and C. Wood,
    Interest-Based Access Control for Content Centric Networks,
    ACM Conference on Information-Centric Networking (ICN), 2015.
    ibac-ICN15.pdf

  43. N. Asokan, F. Brasser, A. Ibrahim, A. Sadeghi, M. Schunter, G. Tsudik and C. Wachsmann,
    SEDA: Scalable Embedded Device Attestation,
    ACM Conference on Computer and Communications Security (CCS), 2015.
    seda-CCS15.pdf

  44. C. Ghali, A. Narayanan, D. Oran, G. Tsudik and C. Wood,
    Secure Fragmentation for Content-Centric Networks,
    IEEE Symposium on Network Computing and Applications (NCA), 2015. Best Paper Award.
    frag-NCA15.pdf

    2014

  45. M. Almishari, P. Gasti, N. Nathan and G. Tsudik,
    Optimizing Bi-Directional Low-Latency Communication in Named-Data Networking,
    ACM Computer Communications Review, Vol. 44, No. 1, January 2014.
    bidir-CCR14.pdf

  46. C. Ghali, G. Tsudik and E. Uzun,
    Elements of Trust in Named-Data Networking,
    ACM Computer Communications Review, Vol. 44, No. 3, October 2014.
    ndn-trust-CCR14.pdf

  47. S. Ali, S. Jha, D. Ostry, V. Sivaraman and G. Tsudik,
    Securing First-Hop Data Provenance for Bodyworn Devices using Wireless Link Fingerprints,
    IEEE Transactions on Information Forensics and Security, Vol. 9, No. 12, September 2014.
    prov-TIFS14.pdf

  48. I. Martinovic, K. Rasmussen, M. Roeschlin and G. Tsudik,
    Authentication Using Pulse-Response Biometrics,
    ISOC Symposium on Network and Distributed System Security (NDSS), 2014. Distinguished Paper Award.
    contatt-NDSS14.pdf

  49. A. Francillon, Q. Nguyen, K. Rasmussen and G. Tsudik,
    A Minimalist Approach to Remote Attestation,
    IEEE/ACM Design, Automation, and Test in Europe (DATE), 2014.
    minimal-DATE14.pdf

  50. C. Ghali, G. Tsudik and E. Uzun,
    Needle in a Haystack: Mitigating Content Poisoning in Named-Data Networking,
    NDSS Workshop on Security of Emerging Networking Technologies (SENT), 2014.
    needle-SENT14.pdf

  51. M. Ambrosin, M. Conti, P. Gasti and G. Tsudik,
    Covert Ephemeral Communication in Named Data Networking,
    ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2014.
    covert-ASIACCS14.pdf

  52. J. Burke, P. Gasti, N. Nathan and G. Tsudik,
    Secure Sensing over Named Data Networking,
    IEEE Symposium on Network Computing and Applications (NCA), 2014.
    ndn-sense-NCA14.pdf

  53. M. Almishari, E. Oguz and G. Tsudik,
    Fighting Authorship Linkability with Crowdsourcing,
    ACM Conference on Online Social Networks (COSN), 2014.
    crowd-COSN14.pdf

  54. M. Almishari, E. Oguz, D. Kaafar and G. Tsudik,
    Stylometric Linkability of Tweets,
    ACM Workshop on Privacy in the Electronic Society (WPES), 2014.
    tweet-WPES14.pdf

    2013

  55. R. Di Pietro, G. Oligeri, C. Soriente and G. Tsudik,
    United We Stand: Intrusion-Resilience in Mobile Unattended WSNs,
    IEEE Transactions on Mobile Computing, Vol. 12, No. 7, July 2013.
    united-TMC13.pdf

  56. A. Kobsa, R. Nithyanand, G. Tsudik and E. Uzun,
    Can Jannie Verify: Usability of Display-Equipped RFID Tags for Security Purposes,
    Journal of Computer Security, Vol. 21, No. 3, July 2013.
    jannie-JCS13.pdf

  57. J. Burke, P. Gasti, N. Nathan and G. Tsudik,
    Securing Instrumented Environments over Content-Centric Networking,
    IEEE Workshop on Emerging Design Choices in Name-Oriented Networking (NOMEN), 2013.
    ndn-inst-NOMEN13.pdf

  58. G. Acs, M. Conti, C. Ghali, P. Gasti and G. Tsudik,
    Cache Privacy in Name-Data Networking,
    IEEE International Conference on Distributed Computing Systems (ICDCS), 2013.
    ndn-cache-ICDCS13.pdf

  59. P. Gasti, G. Tsudik, E. Uzun and L. Zhang,
    DoS & DDoS in Named Data Networking,
    IEEE Conference on Computer Communications and Networks (ICCCN), 2013.
    ndn-dos-ICCCN13.pdf

  60. M. Almishari, P. Gasti, E. Oguz and G. Tsudik,
    Privacy-Preserving Matching of Community-Contributed Content,
    European Symposium on Research in Computer Security (ESORICS), 2013.
    ppmcc-ESORICS13.pdf

  61. A. Compagno, M. Conti, P. Gasti and G. Tsudik,
    Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data
    Networking, IEEE Local Computer Networks (LCN), 2013.
    poseidon-LCN13.pdf

  62. E. Ayday, E. De Cristofaro, JP Hubaux and G. Tsudik,
    Privacy Considerations of Genome Sequencing,
    USENIX Summit on Hot Topics in Security (HotSec) , 2013.
    wgs-HOTSEC13.pdf

  63. E. De Cristofaro, S. Faber, and G. Tsudik,
    Secure Genomic Testing via Size- and Position-Hiding Private Substring Matching,
    ACM Workshop on Privacy in the Electronic Society (WPES), 2013.
    sphpsm-WPES13.pdf

    2012

  64. S. DiBenedetto, P. Gasti, G. Tsudik and E. Uzun,
    ANDaNA: Anonymous Named Data Networking Application,
    ISOC Symposium on Network and Distributed System Security (NDSS), 2012.
    andana.pdf

  65. K. Eldefrawy, A. Francillon, D. Perito and G. Tsudik,
    SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust,
    ISOC Symposium on Network and Distributed System Security (NDSS), 2012.
    smart.pdf

  66. E. De Cristofaro, C. Soriente and G. Tsudik,
    Hummingbird: Privacy at the time of Twitter,
    IEEE Symposium on Research in Security and Privacy (S&P), 2012.
    hummingbird.pdf

  67. E. De Cristofaro and G. Tsudik,
    Experimenting with Fast Private Set Intersection,
    International Conference on Trust and Trustworthy Computing (TRUST), 2012.
    psi-TRUST12.pdf

  68. Z. Erkin and G. Tsudik,
    Private Computation of Spatial and Temporal Power Consumption with Smart Meters,
    Applied Cryptography and Network Security (ACNS), 2012.
    ACNS12.pdf

  69. M. Almishari and G. Tsudik,
    Exploring Linkability of Community Reviewing,
    European Symposium on Research in Computer Security (ESORICS), 2012.
    reviewlink.pdf

  70. E. De Cristofaro, S. Faber, P. Gasti and G. Tsudik,
    GenoDroid: Are Privacy-Preserving Genomic Tests Ready for Prime Time?,
    ACM CCS Workshop on Privacy in the Electronic Society (WPES), 2012.
    genodroid.pdf

  71. E. De Cristofaro, P. Gasti and G. Tsudik,
    Fast and Private Computation of Cardinality of Set Intersection and Union,
    Conference on Cryptology and Network Security (CANS), 2012.
    psi-ca.pdf

  72. M. Conti, S. Das, C. Bisdikian, M. Kumar, L. Ni, A. Passarella, G. Roussos, G. Trster, G. Tsudik and F. Zambonelli,
    Looking Ahead in Pervasive Computing: Challenges and Opportunities in the Era of Cyber-Physical Convergence,
    Pervasive and Mobile Computing, Vol. 8, No. 12, February 2012.

  73. R. Di Pietro, D. Ma, C. Soriente and G. Tsudik,
    Self-Healing in Unattended Wireless Sensor Networks,
    ACM Transactions on Sensor Networks, Vol. 9, No. 1, February 2012.
    self-healing-TOSN12.pdf

  74. J. Cheon, C. Lim and G. Tsudik,
    Reducing RFID Reader Load with the Meet-in-the-Middle Strategy,
    Journal of Communications and Networks, Vol. 14, No. 1, February 2012.
    rfid-mitm-JCN12.pdf

  75. M. Al Mishari, E. De Cristofaro, K. El Defrawy and G. Tsudik,
    Harvesting SSL Certificate Data to Mitigate Web-Fraud,
    International Journal of Network Security, Vol. 14, No. 6, 2012.
    ssl-IJNS12.pdf

    2011

  76. G. Ateniese, E. De Cristofaro and G. Tsudik,
    (If) Size Matters: Size-Hiding Private Set Intersection,
    IACR Public Key Cryptography (PKC), 2011.

  77. Y. Lu and G. Tsudik,
    Enhancing Data Privacy in the Cloud,
    IFIP International Conference on Trust Management (IFIPTM), 2011.

  78. K. El Defrawy, S. Capkun and G. Tsudik,
    Group Distance Bounding Protocols,
    International Conference on Trust and Trustworthy Computing (TRUST), 2011.

  79. E. De Cristofaro, Y. Lu and G. Tsudik,
    Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information,
    International Conference on Trust and Trustworthy Computing (TRUST), 2011.

  80. A. Kobsa, R. Nithyanand, G. Tsudik and E. Uzun,
    Usability of Display-Equipped RFID Tags for Security Purposes,
    European Symposium on Research in Computer Security (ESORICS), 2011.

  81. P. Baldi, R. Baronio, E. De Cristofaro, P. Gasti and G. Tsudik,
    Countering GATTACA: Efficient and Secure Testing of Fully-Sequenced Human Genomes,
    ACM Computer and Communication Security Conference (CCS), 2011.

  82. K. El Defrawy and G. Tsudik,
    ALARM: Anonymous Location-Aided Routing in Suspicious MANETs,
    IEEE Transactions on Mobile Computing, Vol. 10, No. 9, September 2011.

  83. R. Di Pietro, C. Soriente, A. Spognardi and G. Tsudik,
    Intrusion-Resilient Integrity in Data-Centric Unattended WSNs,
    Pervasive and Mobile Computing, Vol. 7, No. 4, August 2011.

  84. R. Nithyanand, G. Tsudik and E. Uzun,
    User-aided Reader Revocation in PKI-Based RFID Systems,
    Journal of Computer Security, Vol. 19, No. 6, December 2011.

  85. K. El Defrawy and G. Tsudik,
    PRISM: Privacy-friendly Routing In Suspicious MANETs,
    IEEE JSAC, Special Issue on Advances in Military Communications and Networking, Vol. 29, No. 10, December 2011.

  86. Y. Lu and G. Tsudik,
    Privacy-Preserving Cloud Database Querying,
    Journal of Internet Services and Information Security (JISIS), Vol. 1 No. 4, November 2011.

    2010

  87. E. De Cristofaro and G. Tsudik,
    Practical Private Set Intersection Protocols,
    Financial Cryptography and Data Security Conference (FC), 2010.

  88. R. Di Pietro, G. Oligeri, C. Soriente and G. Tsudik
    Intrusion-Resilience in Mobile Unattended WSNs,
    IEEE INFOCOM, 2010.

  89. C. Catellucia, K. El Defrawy and G. Tsudik
    Link-Layer Encryption Effect on the Capacity of Network Coding in Wireless Networks,
    IEEE INFOCOM WiP Session, 2010.

  90. D. Ma and G. Tsudik
    IRRES: Intrusion Resilient Remote Email Storage,
    ICDCS Workshop on Security and Privacy in Cloud Computing (SPCC), 2010.

  91. M. Manulis, B. Poettering and G. Tsudik
    Affiliation-Hiding Key Exchange with Untrusted Group Authorities,
    Applied Cryptography and Network Security (ACNS), 2010.

  92. M. Manulis, B. Poettering and G. Tsudik
    Taming Big Brother Ambitions: More Privacy for Secret Handshakes,
    Privacy Enhancing Technologies Symposium (PETS), 2010.

  93. R. Nithyanand, N. Saxena, G. Tsudik and E. Uzun
    Groupthink: On the Usability of Secure Group Association of Wireless Devices,
    ACM International Conference on Ubiquitous Computing (UBICOMP), 2010.

  94. R. Nithyanand, G. Tsudik and E. Uzun
    Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems,
    European Symposium on Research in Computer Security (ESORICS), 2010.

  95. D. Perito and G. Tsudik
    Secure Code Update for Embedded Devices via Proofs of Secure Erasure,
    European Symposium on Research in Computer Security (ESORICS), 2010.

  96. Y. Lu and G. Tsudik
    Towards Plugging Privacy Leaks in Domain Name System,
    IEEE International Conference on Peer-to-Peer Computing (P2P), 2010.

  97. R. Di Pietro, G. Oligeri, C. Soriente and G. Tsudik
    Securing Mobile Unattended WSNs against a Mobile Adversary,
    IEEE Symposium on Reliable Distributed Systems (SRDS), 2010.

  98. E. De Cristofaro, J. Kim and G. Tsudik
    Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model,
    IACR ASIACRYPT, 2010.

  99. C. Badea, M. Cesarano, A. Nicolau, G. Tsudik and A. Veidenbaum
    Leveraging Virtualization Towards Improving Cloud Security for Compute-Intensive Applications,
    International Conference on Cloud Computing (CloudComp), 2010.

  100. S. Jarecki, J. Kim and G. Tsudik,
    Flexible Robust Group Key Agreement,
    IEEE Transactions on Parallel and Distributed Systems, to appear in 2010.

  101. D. Ma and G. Tsudik,
    Security and Privacy in Emerging Wireless Networks,
    IEEE Wireless Communications, to appear in October 2010.

  102. K. El Defrawy and G. Tsudik
    ALARM: Anonymous Location-Aided Routing in Suspicious MANETs,
    IEEE Transactions on Mobile Computing, to appear in 2011.

    2009

  103. E. De Cristofaro, X.Ding and G.Tsudik
    Privacy-Preserving Querying in Sensor Networks,
    IEEE Conference on Computer Communications and Networks (ICCCN), 2009.

  104. F. Massacci, G. Tsudik and A. Yautsiukhin
    Extended Abstract: Logging Key Assurance Indicators in an Enterprise,
    ACM Symposium on Information, Computer & Communication Security (ASIACCS), 2009.

  105. A. Kumar, N. Saxena, G. Tsudik and E. Uzun
    Caveat Emptor: A Comparative Study of Secure Device Pairing Methods,
    IEEE Conference on Pervasive Computing and Communications (PERCOM), 2009.

  106. R. Di Pietro, C. Soriente, A. Spognardi and G. Tsudik
    Intrusion-Resilience via Collaborative Authentication in Unattended WSNs,
    ACM Conference on Wireless Network Security (WiSec), 2009.

  107. K. El Defrawy, J. Solis and G. Tsudik
    Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks,
    IEEE Computer Software and Applications Conference (COMPSAC), 2009.

  108. E. De Cristofaro, S. Jarecki, J. Kim and G. Tsudik
    Privacy-Preserving Policy-based Information Transfer,
    Privacy Enhancing Technologies Symposium (PETS), 2009.

  109. A. Kobsa, R. Sonawalla, G. Tsudik, E. Uzun and Y. Wang
    Serial Hook-Ups: A Comparative Usability Study of Secure Device Pairing Methods,
    Symposium On Usable Privacy and Security (SOUPS), 2009.

  110. N. Saxena, G. Tsudik and J. Yi
    Efficient Node Admission and Certificate-less Secure Communication in Short-Lived MANETs,
    IEEE Transactions on Parallel and Distributed Systems, Vol. 20, No. 2. 2009.

  111. M. Goodrich, M. Sirivianos, J. Solis, C. Soriente, G. Tsudik and E. Uzun
    Loud and Clear: Human-Verifiable Authentication Based on Audio,
    International Journal of Security and Networks, Vol. 4, No. 1, 2009.

  112. C. Soriente, G. Tsudik and E. Uzun
    Secure Pairing of Interface-Constrained Devices,
    International Journal of Security and Networks, Vol. 4, No. 1, 2009.

  113. M. Narasimha, J. Solis and G. Tsudik
    Privacy-Preserving Revocation Checking,
    International Journal of Information Security, Vol. 8, No. 1, 2009.

  114. A. Chan, C. Castelluccia, E. Mykletun and G. Tsudik
    Efficient and Provably Secure Aggregation of Encrypted Data in WSN-s,
    ACM Transactions on Sensor Networks, Vol. 5, No. 3., 2009.

  115. X. Ding, G. Tsudik and S. Xu
    Leak-Free Group Signatures: Definitions and Construction,
    Journal of Computer Security, Vol. 17, No. 4, 2009.

  116. J. Kim and G. Tsudik
    SRDP: Secure Route Discovery for Dynamic Source Routing in MANETs,
    Ad Hoc Networks, Vol. 7, No. 6, 2009.

  117. D. Ma and G. Tsudik
    A New Approach to Secure Logging,
    ACM Transactions on Storage, Vol. 5, No. 1, 2009.

  118. M. Burmester, T. Van Le, B. de Medeiros and G. Tsudik
    Universally Composable RFID Identification and Authentication Protocols,
    ACM Transactions on Information Systems Security, Vol. 12, No. 4, 2009.

  119. R. Di Pietro, L. Mancini, C. Soriente, A. Spognardi and G. Tsudik
    Data Security in Unattended Wireless Sensor Networks,
    IEEE Transactions on Computers, Special Issue on Autonomic Network Computing, Vol. 7, No. 8, 2009.

  120. D. Ma, C. Soriente and G. Tsudik
    New Adversary and New Threats in Unattended Sensors Networks,
    IEEE Network, Vol. 23 No. 2, 2009.

  121. R. Di Pietro, L. Mancini, C. Soriente, A. Spognardi and G. Tsudik,
    Maximizing Data Survival in Unattended Wireless Sensor Networks against a Focused Mobile Adversary,
    Ad Hoc Networks, Vol. 7, No. 8, 2009.

  122. G. Ateniese, J. Camenisch, M. Joye and G. Tsudik,
    Remarks on "Analysis of One Popular Group Signature Scheme" in Asiacrypt 2006,
    Journal of Applied Cryptography, Vol. 1, No. 4, 2009.

  123. A. Kumar, N. Saxena, G. Tsudik and E. Uzun,
    A Comparative Study of Secure Device Pairing Methods,
    Pervasive and Mobile Computing, Vol. 5, No. 6, 2009.

    2008:

  124. D. Ma and G. Tsudik
    A New Approach to Secure Logging,
    IFIP WG11.3 Working Conference on Data and Applications Security (DBSec), 2008.

  125. C. Soriente, G. Tsudik and E. Uzun
    HAPADEP: Human-Assisted Pure Audio Device Pairing,
    Information Security Conference (ISC), 2008.

  126. G. Ateniese, R. Di Pietro, L. Mancini and G. Tsudik
    Scalable and Efficient Provable Data Possession,
    Conference on Security and Privacy in Communication Networks (Securecomm), 2008.

  127. R. Di Pietro, D. Ma, C. Soriente and G. Tsudik
    POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks,
    IEEE Symposium on Reliable Distributed Systems (SRDS), 2008.

  128. K. Eldefrawy and G. Tsudik
    PRISM: Private Routing In Suspicious MANETs,
    IEEE International Conference on Network Protocols (ICNP), 2008.

  129. D. Ma and G. Tsudik,
    DISH: Distributed Self-Healing (in Unattended Sensor Networks)
    Symposium on Stabilization, Safety and Security of Distributed Systems (SSS), 2008.

  130. J. Kim and G. Tsudik
    Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks,
    International Conference on Information Security and Cryptology (ICISC), 2008.

  131. R. di Pietro, L. Mancini, C.Soriente, A. Spognardi and G. Tsudik
    Catch Me (If You Can): Data Survival in Unattended Sensor Networks,
    IEEE International Conference on Pervasive Computing and Communications (PERCOM), 2008.
    dmsst08.pdf

  132. S. Jarecki, J. Kim and G. Tsudik
    Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Agreement,
    RSA Conference, Cryptographers' Track (CT-RSA), 2008.
    jkt08.pdf

    2007:

  133. S. Jarecki, J. Kim and G. Tsudik
    Group Secret Handshakes or Affiliation-Hiding Authenticated Group Key Agreement,
    RSA Conference, Cryptographers' Track (CT-RSA), 2007.
    jkt07.pdf

  134. D. Ma and G. Tsudik
    Forward-Secure Aggregate Authentication,
    IEEE Symposium on Research in Security and Privacy (S&P), 2007.
    mt07.pdf

  135. K. Eldefrawy and G. Tsudik
    ALARM: Anonymous Location-Aided Routing in MANETs,
    IEEE International Conference on Network Protocols (ICNP), 2007.
    alarm07.pdf

  136. S. Jarecki, J. Kim and G. Tsudik
    Robust Group Key Agreement using Short Broadcasts,
    ACM Computer and Communication Security Conference (CCS), 2007.
    rbd07.pdf

  137. G. Tsudik,
    A Family of Dunces: Trivial RFID Identification and Authentication Protocols,
    Symposium on Privacy-Enhancing Technologies (PET'07), 2007.
    t07.pdf

  138. M. Narasimha and G. Tsudik
    Privacy-Preserving Revocation Checking with Modified CRLs,
    European PKI Workshop: Theory and Practice (EuroPKI), 2007.

  139. K. Eldefrawy, M. El Zarki and G. Tsudik, Incentive-Based Cooperative and Secure Inter-Personal Networking,
    ACM Workshop on Mobile Opportunistic Networking (MobiOpp), 2007.
    ezt07.pdf

  140. X. Ding, D. Mazzocchi and G. Tsudik
    Equipping "Smart" Devices With Public Key Signatures,
    ACM Transactions on Internet Technology, Vol. 7, No. 1, February 2007.
    DMT07.pdf

  141. N. Saxena, G. Tsudik and J. Yi
    Threshold Cryptography in P2P and MANETs: the Case of Access Control,
    Computer Networks, Vol. 51, No. 13, August 2007, pp. 3632-3649.
    COMPNW3557.pdf

    2006:

  142. M. Goodrich, M. Sirivianos, J. Solis, G. Tsudik and E. Uzun
    Loud And Clear: Human Verifiable Authentication Based on Audio,
    IEEE ICDCS'06, 2006.
    gsstu.pdf

  143. S. Jarecki, J. Kim and G. Tsudik
    Authentication for Paranoids: Multi-Party Secret Handshakes
    ACNS'06, 2006.
    jkt06.pdf

  144. E. Mykletun and G. Tsudik
    Aggregation Queries in the Database-As-a-Service Model
    IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC), 2006.
    mt06.pdf

  145. G. Tsudik
    YA-TRAP: Yet Another Trivial RFID Authentication Protocol (WiP paper)
    IEEE PerCom, 2006.
    t-2006.pdf

  146. M. Narasimha and G. Tsudik
    Authentication of Outsourced Databases using Signature Aggregation and Chaining
    International Conference on Database Systems for Advanced Applications (DASFAA), 2006.
    nt-2006.pdf

  147. C. Castelluccia, E. Mykletun and G. Tsudik
    Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes
    ACM AsiaCCS, 2006.
    cmt-2006.pdf

  148. J. Solis and G. Tsudik
    Simple and Flexible Private Revocation Checking
    Privacy-Enhancing Technologies (PETS), 2006.
    st-2006.pdf

  149. G. Tsudik and S. Xu
    A Flexible Framework for Secret Handshakes
    Privacy-Enhancing Technologies (PETS), 2006.
    tx-2006.pdf

  150. X. Li, G. Tsudik and X. Yang
    A Technical Approach to Net Neutrality
    ACM Workshop on Hot Topics in Networks (Hotnets-V), 2006.
    lty-2006.pdf

  151. M. Narasimha, E. Mykletun and G. Tsudik
    Authentication and Integrity in Outsourced Databases,
    ACM Transactions on Storage, , Vol. 2, No. 2, May 2006. pp. 107-138.
    NMT06.pdf

  152. C. Castelluccia, S. Jarecki, J. Kim and G. Tsudik
    Secure Acknowledgement Aggregation and Multisignatures with Limited Robustness,
    Computer Networks, Vol. 50, No. 10, July 2006, pp. 1639-1652.
    scn04-journal.ps.gz

  153. K. Obraczka, G. Tsudik and K. Viswanath
    Exploring Mesh- and Tree-Based Multicast Routing Protocols for MANETs,
    IEEE Transactions on Mobile Computing, Vol. 5, No. 1, pp. 28-42, January 2006.
    tmc-2005.ps.gz

    2005:

  154. E. Mykletun and G. Tsudik
    On using Secure Hardware in Outsourced Databases
    International Workshop on Innovative Architecture for Future Generation High-Performance Processors and Systems (IWIA), 2005.
    iwia-2005.pdf

  155. C. Castelluccia, E. Mykletun and G. Tsudik,
    Efficient Aggregation of Encrypted Data in Wireless Sensor Networks
    IEEE Mobiquitous, 2005.
    mobiq-2005.pdf

  156. J. Kim and G. Tsudik,
    Securing Route Discovery in DSR
    IEEE Mobiquitous, 2005.
    sdsr-2005.pdf

  157. G. Tsudik and S. Xu,
    A Flexible Framework for Secret Handshakes (Short Paper / Brief Announcement)
    ACM Conference on Principles of Distributed Computing (PODC), 2005.
    podc-2005.pdf

  158. G. Ateniese, D. Chou, B. de Medeiros and G. Tsudik,
    Sanitizable Signatures
    European Symposium on Research in Computer Security (ESORICS), 2005.
    esorics-2005.pdf

  159. N. Saxena, G. Tsudik and J. Yi
    Efficient Node Admission for Short-lived Mobile Ad Hoc Networks
    IEEE International Conference on Network Protocols (ICNP), 2005.
    icnp-2005.pdf

  160. M. Narasimha and G. Tsudik
    DSAC: Integrity of Outsourced Databases with Signature Aggregation and Chaining (Short Paper/Poster)
    ACM Conference on Information and Knowledge Management (CIKM), 2005.
    cikm-2005.pdf

  161. Y. Amir, C. Nita-Rotaru, J. Stanton and G. Tsudik
    Secure Spread: An Integrated Architecture for Secure Group Communication,
    IEEE Transaction on Dependable and Secure Computing Systems, Vol. 2, No. 3, July-September 2005.
    TDSC-0113-0704.pdf

    2004:

  162. B. Hore, S. Mehrotra and G. Tsudik
    A Privacy-Preserving Index for Range Queries
    International Conference on Very Large Databases (VLDB), August 2004.
    vldb-2004.pdf

  163. E. Mykletun, M. Narasimha and G. Tsudik
    Signature "Bouquets": Immutability of Aggregated Signatures
    European Symposium on Research in Computer Security (ESORICS), 2004.
    esorics-2004.pdf

  164. C. Castelluccia, S. Jarecki and G. Tsudik
    Secret Handshakes from CA-oblivious Encryption
    IACR ASIACRYPT, 2004.
    asiacrypt-2004.pdf

  165. C. Castelluccia, S. Jarecki and G. Tsudik
    Verifiable and Secure Acknowledgement Aggregation
    Security in Computer Networks Conference (SCN), 2004.
    scn-2004.pdf

  166. C. Castelluccia, S. Jarecki and G. Tsudik
    Secret Handshakes from CA-oblivious Encryption (Short paper)
    ACM Conference on Principles of Distributed Computing (PODC), 2004.
    podc-2004.pdf

  167. N. Saxena, G. Tsudik and J. Yi
    Identity-based Access Control for Ad Hoc Groups
    International Conference on Information Security and Cryptology (ICISC'04), December 2004.
    icisc-2004.pdf

  168. S. Mehrotra, E. Mykletun, G. Tsudik and Y. Wu
    A Framework for Efficient Storage Security in RDBMS
    International Conference on Extending Database Technology (EDBT), 2004.
    edbt.pdf

  169. E. Mykletun, M. Narasimha and G. Tsudik
    Authentication and Integrity in Outsourced Databases
    Symposium on Network and Distributed Systems Security (NDSS), 2004.
    ndss-2004.pdf

  170. X. Ding, G. Tsudik and S. Xu
    Leak-Free Mediated Group Signatures
    IEEE ICDCS, 2004.
    icdcs-2004.pdf

  171. N. Saxena, G. Tsudik and J. Yi
    Access Control Mechanisms for Ad Hoc Networks
    IEEE Workshop on Hot Topics in Peer-to-Peer (HOT-P2P'04), 2004.
    p2p-2004.pdf

  172. K. Bicakci, G. Tsudik and B. Tung
    On Constructing Optimal One-Time Signatures,
    Computer Networks, Vol. 43, No. 3, pp. 339-349, October 2003.
    comnet-2003.pdf

  173. Y. Kim, F. Maino, M. Narasimha, K. Rhee and G. Tsudik
    Secure Group Services for Storage-Area Networks,
    IEEE Communications, Vol. 41, No. 8, August 2003.
    kmnrt04.pdf

  174. K. Rhee, Y. Park and G. Tsudik
    A Group Key Management Architecture in Mobile Ad-hoc Wireless Networks,
    Journal Of Communication and Networks, Vol. 6, No. 2, pp. 156-162, June 2004.
    jcn-2004.pdf

  175. Y. Amir, Y. Kim, C. Nita-Rotaru and G. Tsudik
    On the Performance of Group Key Agreement Protocols
    ACM Transactions on Information Systems Security, Vol. 7, No. 3, pp. 457-488, August 2004.
    tissec-2004.pdf

  176. D. Boneh, X. Ding and G. Tsudik
    A Method for Fast Credentials Revocation,
    ACM Transactions on Internet Technology, vol. 4, No. 1, pp. 60-82, February 2004.
    bdt04.pdf

  177. Y. Kim, A. Perrig and G. Tsudik
    Communication-Efficient Group Key Agreement,
    IEEE Transactions on Computers, Vol. 53, No. 7, July 2004.
    kpt04.pdf

  178. Y. Amir, Y. Kim, C. Nita-Rotaru, J. Stanton, J. Schultz and G.Tsudik
    Secure Group Communication Using Robust Contributory Key Agreement,
    IEEE Transaction on Parallel and Distributed Systems, Vol. 15, No. 5, pp. 468-480, May 2004.
    aknsst04.pdf

  179. Y. Kim, A. Perrig and G. Tsudik
    Tree-Based Group Key Agreement,
    ACM Transactions on Information Systems Security, Vol. 7, No. 1, pp. 60-96, May 2004.
    kpt04a.pdf

    2003:

  180. G. Tsudik and S. Xu
    Accumulating Composites and Improved Group Signing
    IACR ASIACRYPT, 2003.
    tx03.ps.gz

  181. M. Narasimha, G. Tsudik and J. Yi,
    On the Utility of Distributed Cryptography in P2P Settings and MANETs
    IEEE International Conference on Network Protocols (ICNP), 2003.
    nty03.pdf

  182. X. Ding and G. Tsudik
    Simple Identity-Based Cryptography with Mediated RSA
    RSA Conference, Cryptographers' Track, 2003.
    bdt03.pdf

  183. Y. Amir, C. Nita-Rotaru, J. Stanton and G. Tsudik
    Scaling Secure Group Communications: Beyond Peer-to-Peer
    DARPA Information Security Conference and Exposition (DISCEX), 2003.
    anst03.pdf

  184. Y. Kim, D. Mazzocchi and G. Tsudik
    Admission Control in Collaborative Groups
    IEEE Symposium on Network Computing and Applications (NCA), 2003.
    kmt03.pdf

  185. N. Saxena, G. Tsudik and J. Yi
    Experimenting with Peer Group Admission Control
    Workshop on Advanced Developments in Software and Systems Security (WADIS), 2003.
    wadis-2003.pdf

  186. N. Saxena, G. Tsudik and J. Yi
    Admission Control in Peer-to-Peer: Design and Performance Evaluation
    ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), 2003.
    sty03.pdf

  187. Y. Kim and G. Tsudik
    Admission Control in Peer Groups
    NSF/NASA/DOE Workshop on New Directions on Scalable Cyber-Security, 2003.

    2002:

  188. G. Tsudik
    Weak Forward Security in Mediated RSA
    Security in Computer Networks Conference (SCN), 2002.
    t02.pdf

  189. G. Ateniese, D. Song and G. Tsudik
    Quasi-Efficient Revocation in Group Signatures
    Financial Cryptography (FC), 2002.
    ast02.pdf

  190. Y. Amir, Y. Kim, C. Nita-Rotaru, and G. Tsudik
    On the Performance of Group Key Agreement Protocols
    IEEE ICDCS, 2002.
    aknt02.pdf

  191. M. El Zarki, S. Mehrotra, G. Tsudik and N. Venkatasubramanian
    Security Issues in a Future Vehicular Network
    EuroWireless, 2002.
    zmtv02.pdf

  192. X. Ding, D. Mazzocchi and G. Tsudik
    Experimenting with Server-Aided Signatures
    Network and Distributed Systems Security Symposium (NDSS), 2002.
    dmt02.pdf

  193. Y. Park, K. Rhee and G. Tsudik
    Group Key Management in Hierarchical Ad-hoc Wireless Networks
    Workshop on Information Security Applications (WISA), 2002.
    prt02.pdf

  194. Y. Kim, F. Maino, M. Narasimha and G. Tsudik
    Secure Group Services for Storage-Area Networks
    IEEE International Workshop on Storage Security (IWSS), 2002.
    kmnt02.pdf

  195. Y. Kim, D. Mazzocchi and G. Tsudik
    Admission Control in Collaborative Groups,
    ACM Mobile Computing and Communications Review, Vol. 6, No. 4, October 2002.

    2001:

  196. D. Boneh, X. Ding, G. Tsudik and B. Wong
    Fast Revocation of Security Capabilities
    Usenix Security Symposium, 2001.
    bdtw.pdf

  197. D. Agarwal, O. Chevassut, M. Thompson and G. Tsudik
    An Integrated Solution for Secure Group Communication in Wide-Area Networks
    IEEE Symposium on Computers and Communications (ISCC), 2001.
    actt01.pdf

  198. Y. Kim. A. Perrig and G. Tsudik Communication-Efficient Group Key Agreement
    IFIP-SEC, 2001.
    kpt2001.pdf

  199. Y. Amir, Y. Kim, C. Nita-Rotaru, J. Schultz, J. Stanton and G. Tsudik
    Exploring Robustness in Group Key Agreement
    IEEE ICDCS, 2001.
    aknsst00.pdf

  200. K. Obraczka, G. Tsudik and K. Viswanath
    Pushing the Limit of Multicast in Ad Hoc Networks
    IEEE ICDCS, April 2001.
    otv2000.ps.gz

  201. K. Obraczka, G. Tsudik and K Viswanath
    Towards Reliable Multicast in Multi-Hop Ad Hoc Networks,
    ACM/Balzer Wireless Networks, Vol. 7, No. 6, 2001.
    hotv2000.ps.gz

    2000:

  202. Y. Kim. A. Perrig and G. Tsudik
    Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups
    ACM CCS, 2000.
    kpt2000.pdf

  203. G. Ateniese, J. Camenisch, M. Joye and G. Tsudik
    A Practical and Provably Secure Coalition-Resistant Group Signature Scheme
    IACR CRYPTO. 2000.
    acjt00.pdf

  204. Bicakci, B. Tung and G. Tsudik
    On Constructing Optimal One-Time Signatures
    International Symposium on Computer and Information Sciences (ISCIS), 2000.
    iscis-2000.pdf

  205. Y. Amir, G. Ateniese, D. Hasse, Y. Kim, C. Nita-Rotaru, T. Schlossnagle, J. Schultz, J. Stanton and G. Tsudik
    Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments
    IEEE ICDCS, 2000.
    aahknssst99.pdf

  206. G. Ateniese, O. Chevassut, D. Hasse, Y. Kim and G. Tsudik
    The Design of a Group Key Management API
    DARPA DISCEX, 2000.
    achkt99.ps.gz

  207. C. Landwehr, M. Reed, P. Syverson and G. Tsudik
    Towards and Analysis of Onion Routing Security
    Workshop on Design Issues in Anonymity and Unobservability, 2000.
    lrtst2000.ps.gz

  208. M. Bellare, J. Garay, R. Hauser, A. Herzberg, H. Krawczyk, M. Steiner, G. Tsudik, E. Van Herreweghen, and M. Waidner
    Design, Implementation and Deployment of a Secure Account-Based Electronic Payment System,
    IEEE JSAC, special issue on Secure Communication, May 2000.
    ikpj.pdf

  209. G. Ateniese, M. Steiner and G. Tsudik
    New Multi-party Authentication Services and Key Agreement Protocols,
    IEEE JSAC, special issue on Secure Communication, May 2000.
    ast99.ps.gz

  210. M. Steiner, G. Tsudik and M. Waidner
    Key Agreement in Dynamic Peer Groups,
    IEEE Transactions on Parallel and Distributed Systems, August 2000.
    stw99.ps.gz

  211. T. Hardjono and G. Tsudik
    IP Multicast Security: Issues and Directions,
    Annales de Telecom, 2000.
    ht99.ps.gz

    1999 and earlier:

  212. G. Ateniese and G. Tsudik
    Some Open Issues and New Directions in Group Signatures
    Financial Cryptography (FC), 1999.
    at98-2.ps.gz

  213. G. Ateniese and G. Tsudik
    Group Signatures a' la carte
    ACM Symposium on Discrete Algorithms (SODA), 1999.
    at98-1.ps.gz

  214. C. Ho, K. Obraczka, G. Tsudik and K. Viswanath
    Flooding for Reliable Multicast in Multi-Hop Ad Hoc Networks,
    ACM Workshop on Discrete Algorithms for Mobility (DIAL-M), 1999.
    hotv99.ps.gz

  215. G. Ateniese, M. Joye and G. Tsudik
    On the Difficulty of Coalition-Resistance in Group Signature Schemes
    Security in Computer Networks (SCN), 1999.
    ajt99.ps.gz

  216. R. Hauser, A. Przygienda and G. Tsudik
    Lowering Security Overhead in Link State Routing,
    Computer Networks and ISDN Systems, April 1999.
    hpt98.ps.gz

  217. G. Ateniese, A. Herzberg, H. Krawczyk and G. Tsudik
    Untraceable Mobility: On Travelling Incognito,
    Computer Networks and ISDN Systems, April 1999.
    hkt97.ps.gz

  218. I. Foster, C. Kesselman, G. Tsudik and S. Tuecke
    Security Architecture for Large-Scale Distributed Computations
    ACM Conference on Computer and Communications Security (CCS), 1998.
    fktt98.ps.gz

  219. G. Ateniese, M. Steiner and G. Tsudik
    Authenticated Group Key Agreement and Related Issues
    ACM Conference on Computer and Communications Security (CCS), 1998.
    ast98.ps.gz

  220. M. Franklin and G. Tsudik
    Secure Group Barter
    Financial Cryptography (FC), 1998.
    ft97.ps.gz

  221. M. Steiner, G. Tsudik and M. Waidner
    CLIQUES: A New Approach to Group Key Agreement
    IEEE ICDCS, 1998.
    stw97.ps.gz

  222. K. Obraczka and G. Tsudik
    Multicast Routing Issues in Ad Hoc Networks
    IEEE International Conference on Universal Personal Communication (ICUPC), 1998.
    ot98.ps.gz

  223. R. Molva and G. Tsudik
    Secret Sets and Applications,
    Information Processing Letters, Vol. 65, No. 1, pp. 47-55, 1998.
    mt96.ps.gz

  224. R. Hauser, A. Przygienda and G. Tsudik
    Reducing the Cost of Security in Link State Routing
    Symposium on Network and Distributed System Security (NDSS), 1997.
    hpt96.ps.gz

  225. N. Asokan, G. Tsudik and M. Waidner
    Server-Supported Signatures,
    Journal of Computer Security, November 1997.
    atw97.ps.gz

  226. J. Gray, A. Kshemkalyani, M. Matyas, M. Peyravian and G. Tsudik
    ATM Cell Encryption and Key Update Synchronization,
    Telecommunication Systems Journal, Vol. 7, No. 4, pp. 391-408, 1997.
    gkmpt96.ps.gz

  227. P. Janson, G. Tsudik and M. Yung
    Scalability and Flexibility in Authentication Services: The KryptoKnight Approach
    IEEE INFOCOM, 1997.
    jty94.ps.gz

  228. R. Hauser, A. Przygienda and G. Tsudik
    Low-cost Security in Link State Routing
    Security in Communication Networks, 1996.

  229. C. Gulcu and G. Tsudik
    Mixing E-mail with BABEL
    Symposium on Network and Distributed System Security (NDSS), 1996.
    gguts96.ps.gz

  230. N. Asokan, G. Tsudik and M. Waidner
    Server-Supported Signatures
    European Symposium on Research in Computer Security (ESORICS), 1996.
    atw96.ps.gz

  231. R. Hauser and G. Tsudik
    On Shopping Incognito
    USENIX Conference on Electronic Commerce, 1996.
    hats96.ps.gz

  232. M. Steiner, G. Tsudik and M. Waidner
    Diffie-Hellman Key Distribution Extended to Groups
    ACM Conference on Computer and Communications Security (CCS), 1996.
    stw96.ps.gz

  233. R. Hauser, P. Janson, R. Molva, G. Tsudik and E. Van Herreweghen,
    Robust and Secure Password/Key Change Method,
    Journal of Computer Security, November 1996.
    hjmtv96.ps.gz

  234. M. Bellare, R. Hauser, A. Herzberg, J. Garay, H. Krawczyk, M. Steiner, G. Tsudik and M. Waidner
    iKP -- A Family of Secure Electronic Payment Protocols
    USENIX Conference on Electronic Commerce, 1995.
    bhhgkstw95.ps.gz

  235. R. Molva, D. Samfat and G. Tsudik
    An Authentication Protocol for Mobile Users
    IEE Colloquium on Security and Cryptography Applications to Radio Systems, 1995

  236. D. Chess, B. Grosof, C. Harrison, D. Levine, C. Parris and G. Tsudik
    Itinerant Programs for Mobile Computing,
    IEEE Personal Communication Systems, September 1995.
    cghlpt95.ps.gz

  237. P. Janson and G. Tsudik
    Secure and Minimal Protocols for Authenticated Key Distribution
    Computer Communications Journal, September 1995.
    jt94.ps.gz

  238. R. Hauser, P. Janson, R. Molva, G. Tsudik and E. Van Herreweghen
    Robust and Secure Password/Key Change Method
    European Symposium on Research in Computer Security (ESORICS), 1994.
    hjmtv94.ps.gz

  239. A. Herzberg, H. Krawczyk and G. Tsudik
    On Travelling Incognito
    IEEE Workshop on Mobile Systems and Applications, 1994.
    hkt94.ps.gz

  240. R. Molva, D. Samfat and G. Tsudik
    Authentication of Mobile Users,
    IEEE Network, Special Issue on Mobile Communications, March/April 1994.
    mst94.ps.gz

  241. G. Tsudik and E. Van Herreweghen
    Some Remarks on Protecting Weak Secrets and Poorly-Chosen Keys from Guessing Attacks
    IEEE Symposium on Reliable Distributed Systems (SRDS), 1993.
    tv93a.ps.gz

  242. G. Tsudik and E. Van Herreweghen
    On Simple and Secure Key Distribution
    ACM Conference on Computer and Communications Security (CCS), 1993.
    tv93.ps.gz

  243. R. Molva and G. Tsudik
    Authentication Method with Impersonal Token Cards
    IEEE Symposium on Security and Privacy (S&P), 1993.
    mt93.ps.gz

  244. D. Estrin, M. Steenstrup and G. Tsudik
    Protocols for Route Establishment and Packet Forwarding Across Multi-Domain Internetworks
    ACM/IEEE Transactions on Networking, February 1993.

  245. G. Tsudik
    Policy Enforcement in Stub Autonomous Domains
    European Symposium on Research in Computer Security (ESORICS), 1992.
    t92a.ps.gz

  246. R. Molva, G. Tsudik, E. Van Herreweghen and S. Zatti
    KryptoKnight Authentication and Key Distribution System
    European Symposium on Research in Computer Security (ESORICS), 1992.
    mtvz92.ps.gz

  247. G. Tsudik
    Message Authentication with One-Way Hash Functions
    IEEE INFOCOM, 1992.
    t92.ps.gz

  248. R. Summers and G. Tsudik
    AudES: An Expert System for Security Auditing,
    Computer Security Journal Vol. 6, No. 1, June 1991.

  249. D. Estrin and G. Tsudik
    An End-to-End Argument for Network Layer Inter-Domain Access Controls,
    Journal of Internetworking: Research and Experience, June 1991.
    et91.ps.gz

  250. D. Estrin and G. Tsudik
    Secure Control of Transit Internetwork Traffic,
    Computer Networks and ISDN Systems, October 1991.

  251. R. Summers and G. Tsudik
    AudES: An Expert System for Security Auditing
    AAAI Conference on Innovative Applications in AI, 1990.
    st90.pdf

  252. D. Estrin, J. Mogul and G. Tsudik
    VISA Protocols for Controlling Inter-Organizational Datagram Flow
    IEEE Journal on Selected Areas in CommunicationsMay 1989.

  253. G. Tsudik
    Datagram Authentication in Internet Gateways
    IEEE Journal on Selected Areas in Communications, May 1989.

  254. D. Estrin and G. Tsudik
    Policy Enforcement in Interconnected Autonomous Networks
    DIMACS Workshop on Connections Between Distributed Computing and Cryptography, 1989.

  255. D. Estrin and G. Tsudik
    Security Issues in Policy Routing
    IEEE Symposium on Security and Privacy (S&P), 1989.
    et89.pdf

  256. D. Estrin and G. Tsudik
    VISA Scheme for Inter-Organizational Network Security
    IEEE Symposium on Security and Privacy (S&P), 1987.
    et87.pdf