Publications of all sorts, shapes and sizes...
2012
-
S. DiBenedetto, P. Gasti, G. Tsudik and E. Uzun,
ANDaNA: Anonymous Named Data Networking Application,
ISOC Symposium on Network and Distributed System Security (NDSS), 2012.
andana.pdf
-
K. Eldefrawy, A. Francillon, D. Perito and G. Tsudik,
SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust,
ISOC Symposium on Network and Distributed System Security (NDSS), 2012.
smart.pdf
-
E. De Cristofaro, C. Soriente and G. Tsudik,
Hummingbird: Privacy at the time of Twitter,
IEEE Symposium on Research in Security and Privacy (S&P), 2012.
hummingbird.pdf
-
E. De Cristofaro and G. Tsudik,
Experimenting with Fast Private Set Intersection,
International Conference on Trust and Trustworthy Computing (TRUST), 2012.
-
Z. Erkin and G. Tsudik,
Private Computation of Spatial and Temporal Power Consumption with Smart Meters,
Applied Cryptography and Network Security (ACNS), 2012.
ACNS12.pdf
-
M. Almishari and G. Tsudik,
Exploring Linkability of Community Reviewing,
European Symposium on Research in Computer Security (ESORICS), 2012.
reviewlink.pdf
-
E. De Cristofaro, S. Faber, P. Gasti and G. Tsudik,
GenoDroid: Are Privacy-Preserving Genomic Tests Ready for Prime Time?,
ACM CCS Workshop on Privacy in the Electronic Society (WPES), 2012.
genodroid.pdf
-
E. De Cristofaro, P. Gasti and G. Tsudik,
Fast and Private Computation of Cardinality of Set Intersection and Union,
Conference on Cryptology and Network Security (CANS), 2012.
psi-ca.pdf
-
M. Conti, S. Das, C. Bisdikian, M. Kumar, L. Ni, A. Passarella, G. Roussos, G. Trster, G. Tsudik and F. Zambonelli,
Looking Ahead in Pervasive Computing: Challenges and Opportunities in the Era of Cyber-Physical Convergence,
Pervasive and Mobile Computing, Vol. 8, No. 12, February 2012.
-
R. Di Pietro, D. Ma, C. Soriente and G. Tsudik,
Self-Healing in Unattended Wireless Sensor Networks,
ACM Transactions on Sensor Networks, to appear.
-
J. Cheon, C. Lim and G. Tsudik,
Reducing RFID Reader Load with the Meet-in-the-Middle Strategy,
Journal of Communications and Networks, Vol. 14, No. 1, February 2012.
-
R. Di Pietro, G. Oligeri, C. Soriente and G. Tsudik,
United We Stand: Intrusion-Resilience in Mobile Unattended WSNs,
IEEE Transactions on Mobile Computing, to appear.
-
M. Al Mishari, E. De Cristofaro, K. El Defrawy and G. Tsudik,
Harvesting SSL Certificate Data to Mitigate Web-Fraud,
International Journal of Network Security, Vol. 14, No. 6, 2012.
2011
-
G. Ateniese, E. De Cristofaro and G. Tsudik,
(If) Size Matters: Size-Hiding Private Set Intersection,
IACR Public Key Cryptography (PKC), 2011.
-
Y. Lu and G. Tsudik,
Enhancing Data Privacy in the Cloud,
IFIP International Conference on Trust Management (IFIPTM), 2011.
-
K. El Defrawy, S. Capkun and G. Tsudik,
Group Distance Bounding Protocols,
International Conference on Trust and Trustworthy Computing (TRUST), 2011.
-
E. De Cristofaro, Y. Lu and G. Tsudik,
Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information,
International Conference on Trust and Trustworthy Computing (TRUST), 2011.
-
A. Kobsa, R. Nithyanand, G. Tsudik and E. Uzun,
Usability of Display-Equipped RFID Tags for Security Purposes,
European Symposium on Research in Computer Security (ESORICS), 2011.
-
P. Baldi, R. Baronio, E. De Cristofaro, P. Gasti and G. Tsudik,
Countering GATTACA: Efficient and Secure Testing of Fully-Sequenced Human Genomes,
ACM Computer and Communication Security Conference (CCS), 2011.
-
K. El Defrawy and G. Tsudik,
ALARM: Anonymous Location-Aided Routing in Suspicious MANETs,
IEEE Transactions on Mobile Computing, Vol. 10, No. 9, September 2011.
-
R. Di Pietro, C. Soriente, A. Spognardi and G. Tsudik,
Intrusion-Resilient Integrity in Data-Centric Unattended WSNs,
Pervasive and Mobile Computing, Vol. 7, No. 4, August 2011.
-
R. Nithyanand, G. Tsudik and E. Uzun,
User-aided Reader Revocation in PKI-Based RFID Systems,
Journal of Computer Security, Vol. 19, No. 6, December 2011.
-
K. El Defrawy and G. Tsudik,
PRISM: Privacy-friendly Routing In Suspicious MANETs,
IEEE JSAC, Special Issue on Advances in Military Communications and Networking, Vol. 29, No. 10, December 2011.
-
Y. Lu and G. Tsudik,
Privacy-Preserving Cloud Database Querying,
Journal of Internet Services and Information Security (JISIS), Vol. 1 No. 4, November 2011.
2010
-
E. De Cristofaro and G. Tsudik,
Practical Private Set Intersection Protocols,
Financial Cryptography and Data Security Conference (FC), 2010.
-
R. Di Pietro, G. Oligeri, C. Soriente and G. Tsudik
Intrusion-Resilience in Mobile Unattended WSNs,
IEEE INFOCOM, 2010.
-
C. Catellucia, K. El Defrawy and G. Tsudik
Link-Layer Encryption Effect on the Capacity of Network Coding in Wireless Networks,
IEEE INFOCOM WiP Session, 2010.
-
D. Ma and G. Tsudik
IRRES: Intrusion Resilient Remote Email Storage,
ICDCS Workshop on Security and Privacy in Cloud Computing (SPCC), 2010.
-
M. Manulis, B. Poettering and G. Tsudik
Affiliation-Hiding Key Exchange with Untrusted Group Authorities,
Applied Cryptography and Network Security (ACNS), 2010.
-
M. Manulis, B. Poettering and G. Tsudik
Taming Big Brother Ambitions: More Privacy for Secret Handshakes,
Privacy Enhancing Technologies Symposium (PETS), 2010.
-
R. Nithyanand, N. Saxena, G. Tsudik and E. Uzun
Groupthink: On the Usability of Secure Group Association of Wireless Devices,
ACM International Conference on Ubiquitous Computing (UBICOMP), 2010.
-
R. Nithyanand, G. Tsudik and E. Uzun
Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems,
European Symposium on Research in Computer Security (ESORICS), 2010.
-
D. Perito and G. Tsudik
Secure Code Update for Embedded Devices via Proofs of Secure Erasure,
European Symposium on Research in Computer Security (ESORICS), 2010.
-
Y. Lu and G. Tsudik
Towards Plugging Privacy Leaks in Domain Name System,
IEEE International Conference on Peer-to-Peer Computing (P2P), 2010.
-
R. Di Pietro, G. Oligeri, C. Soriente and G. Tsudik
Securing Mobile Unattended WSNs against a Mobile Adversary,
IEEE Symposium on Reliable Distributed Systems (SRDS), 2010.
-
E. De Cristofaro, J. Kim and G. Tsudik
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model,
IACR ASIACRYPT, 2010.
-
C. Badea, M. Cesarano, A. Nicolau, G. Tsudik and A. Veidenbaum
Leveraging Virtualization Towards Improving Cloud Security for Compute-Intensive Applications,
International Conference on Cloud Computing (CloudComp), 2010.
-
S. Jarecki, J. Kim and G. Tsudik,
Flexible Robust Group Key Agreement,
IEEE Transactions on Parallel and Distributed Systems, to appear in 2010.
-
D. Ma and G. Tsudik,
Security and Privacy in Emerging Wireless Networks,
IEEE Wireless Communications, to appear in October 2010.
-
K. El Defrawy and G. Tsudik
ALARM: Anonymous Location-Aided Routing in Suspicious MANETs,
IEEE Transactions on Mobile Computing, to appear in 2011.
2009
-
E. De Cristofaro, X.Ding and G.Tsudik
Privacy-Preserving Querying in Sensor Networks,
IEEE Conference on Computer Communications and Networks (ICCCN), 2009.
-
F. Massacci, G. Tsudik and A. Yautsiukhin
Extended Abstract: Logging Key Assurance Indicators in an Enterprise,
ACM Symposium on Information, Computer & Communication Security (ASIACCS), 2009.
-
A. Kumar, N. Saxena, G. Tsudik and E. Uzun
Caveat Emptor: A Comparative Study of Secure Device Pairing Methods,
IEEE Conference on Pervasive Computing and Communications (PERCOM), 2009.
-
R. Di Pietro, C. Soriente, A. Spognardi and G. Tsudik
Intrusion-Resilience via Collaborative Authentication in Unattended WSNs,
ACM Conference on Wireless Network Security (WiSec), 2009.
-
K. El Defrawy, J. Solis and G. Tsudik
Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks,
IEEE Computer Software and Applications Conference (COMPSAC), 2009.
-
E. De Cristofaro, S. Jarecki, J. Kim and G. Tsudik
Privacy-Preserving Policy-based Information Transfer,
Privacy Enhancing Technologies Symposium (PETS), 2009.
-
A. Kobsa, R. Sonawalla, G. Tsudik, E. Uzun and Y. Wang
Serial Hook-Ups: A Comparative Usability Study of Secure Device Pairing Methods,
Symposium On Usable Privacy and Security (SOUPS), 2009.
-
N. Saxena, G. Tsudik and J. Yi
Efficient Node Admission and Certificate-less Secure Communication in Short-Lived MANETs,
IEEE Transactions on Parallel and Distributed Systems, Vol. 20, No. 2. 2009.
-
M. Goodrich, M. Sirivianos, J. Solis, C. Soriente, G. Tsudik and E. Uzun
Loud and Clear: Human-Verifiable Authentication Based on Audio,
International Journal of Security and Networks, Vol. 4, No. 1, 2009.
-
C. Soriente, G. Tsudik and E. Uzun
Secure Pairing of Interface-Constrained Devices,
International Journal of Security and Networks, Vol. 4, No. 1, 2009.
-
M. Narasimha, J. Solis and G. Tsudik
Privacy-Preserving Revocation Checking,
International Journal of Information Security, Vol. 8, No. 1, 2009.
-
A. Chan, C. Castelluccia, E. Mykletun and G. Tsudik
Efficient and Provably Secure Aggregation of Encrypted Data in WSN-s,
ACM Transactions on Sensor Networks, Vol. 5, No. 3., 2009.
-
X. Ding, G. Tsudik and S. Xu
Leak-Free Group Signatures: Definitions and Construction,
Journal of Computer Security, Vol. 17, No. 4, 2009.
-
J. Kim and G. Tsudik
SRDP: Secure Route Discovery for Dynamic Source Routing in MANETs,
Ad Hoc Networks, Vol. 7, No. 6, 2009.
-
D. Ma and G. Tsudik
A New Approach to Secure Logging,
ACM Transactions on Storage, Vol. 5, No. 1, 2009.
-
M. Burmester, T. Van Le, B. de Medeiros and G. Tsudik
Universally Composable RFID Identification and Authentication Protocols,
ACM Transactions on Information Systems Security, Vol. 12, No. 4, 2009.
-
R. Di Pietro, L. Mancini, C. Soriente, A. Spognardi and G. Tsudik
Data Security in Unattended Wireless Sensor Networks,
IEEE Transactions on Computers, Special Issue on Autonomic Network Computing, Vol. 7, No. 8, 2009.
-
D. Ma, C. Soriente and G. Tsudik
New Adversary and New Threats in Unattended Sensors Networks,
IEEE Network, Vol. 23 No. 2, 2009.
-
R. Di Pietro, L. Mancini, C. Soriente, A. Spognardi and G. Tsudik,
Maximizing Data Survival in Unattended Wireless Sensor Networks against a Focused Mobile Adversary,
Ad Hoc Networks, Vol. 7, No. 8, 2009.
-
G. Ateniese, J. Camenisch, M. Joye and G. Tsudik,
Remarks on "Analysis of One Popular Group Signature Scheme" in Asiacrypt 2006,
Journal of Applied Cryptography, Vol. 1, No. 4, 2009.
-
A. Kumar, N. Saxena, G. Tsudik and E. Uzun,
A Comparative Study of Secure Device Pairing Methods,
Pervasive and Mobile Computing, Vol. 5, No. 6, 2009.
2008:
-
D. Ma and G. Tsudik
A New Approach to Secure Logging,
IFIP WG11.3 Working Conference on Data and Applications Security (DBSec), 2008.
-
C. Soriente, G. Tsudik and E. Uzun
HAPADEP: Human-Assisted Pure Audio Device Pairing,
Information Security Conference (ISC), 2008.
-
G. Ateniese, R. Di Pietro, L. Mancini and G. Tsudik
Scalable and Efficient Provable Data Possession,
Conference on Security and Privacy in Communication Networks (Securecomm), 2008.
-
R. Di Pietro, D. Ma, C. Soriente and G. Tsudik
POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks,
IEEE Symposium on Reliable Distributed Systems (SRDS), 2008.
-
K. Eldefrawy and G. Tsudik
PRISM: Private Routing In Suspicious MANETs,
IEEE International Conference on Network Protocols (ICNP), 2008.
-
D. Ma and G. Tsudik,
DISH: Distributed Self-Healing (in Unattended Sensor Networks)
Symposium on Stabilization, Safety and Security of Distributed Systems (SSS), 2008.
-
J. Kim and G. Tsudik
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks,
International Conference on Information Security and Cryptology (ICISC), 2008.
-
R. di Pietro, L. Mancini, C.Soriente, A. Spognardi and G. Tsudik
Catch Me (If You Can): Data Survival in Unattended Sensor Networks,
IEEE International Conference on Pervasive Computing and Communications (PERCOM), 2008.
dmsst08.pdf
-
S. Jarecki, J. Kim and G. Tsudik
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Agreement,
RSA Conference, Cryptographers' Track (CT-RSA), 2008.
jkt08.pdf
2007:
-
S. Jarecki, J. Kim and G. Tsudik
Group Secret Handshakes or Affiliation-Hiding Authenticated Group Key Agreement,
RSA Conference, Cryptographers' Track (CT-RSA), 2007.
jkt07.pdf
-
D. Ma and G. Tsudik
Forward-Secure Aggregate Authentication,
IEEE Symposium on Research in Security and Privacy (S&P), 2007.
mt07.pdf
-
K. Eldefrawy and G. Tsudik
ALARM: Anonymous Location-Aided Routing in MANETs,
IEEE International Conference on Network Protocols (ICNP), 2007.
alarm07.pdf
-
S. Jarecki, J. Kim and G. Tsudik
Robust Group Key Agreement using Short Broadcasts,
ACM Computer and Communication Security Conference (CCS), 2007.
rbd07.pdf
-
G. Tsudik,
A Family of Dunces: Trivial RFID Identification and Authentication Protocols,
Symposium on Privacy-Enhancing Technologies (PET'07), 2007.
t07.pdf
-
M. Narasimha and G. Tsudik
Privacy-Preserving Revocation Checking with Modified CRLs,
European PKI Workshop: Theory and Practice (EuroPKI), 2007.
-
K. Eldefrawy, M. El Zarki and G. Tsudik,
Incentive-Based Cooperative and Secure Inter-Personal Networking,
ACM Workshop on Mobile Opportunistic Networking (MobiOpp), 2007.
ezt07.pdf
- X. Ding, D. Mazzocchi and G. Tsudik
Equipping "Smart" Devices With Public Key Signatures,
ACM Transactions on Internet Technology, Vol. 7, No. 1, February 2007.
DMT07.pdf
- N. Saxena, G. Tsudik and J. Yi
Threshold Cryptography in P2P and MANETs: the Case of Access Control,
Computer Networks, Vol. 51, No. 13, August 2007, pp. 3632-3649.
COMPNW3557.pdf
2006:
-
M. Goodrich, M. Sirivianos, J. Solis, G. Tsudik and E. Uzun
Loud And Clear: Human Verifiable Authentication Based on Audio,
IEEE ICDCS'06, 2006.
gsstu.pdf
-
S. Jarecki, J. Kim and G. Tsudik
Authentication for Paranoids: Multi-Party Secret Handshakes
ACNS'06, 2006.
jkt06.pdf
-
E. Mykletun and G. Tsudik
Aggregation Queries in the Database-As-a-Service Model
IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC), 2006.
mt06.pdf
-
G. Tsudik
YA-TRAP: Yet Another Trivial RFID Authentication Protocol (WiP paper)
IEEE PerCom, 2006.
t-2006.pdf
-
M. Narasimha and G. Tsudik
Authentication of Outsourced Databases using Signature Aggregation and Chaining
International Conference on Database Systems for Advanced Applications (DASFAA), 2006.
nt-2006.pdf
-
C. Castelluccia, E. Mykletun and G. Tsudik
Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes
ACM AsiaCCS, 2006.
cmt-2006.pdf
-
J. Solis and G. Tsudik
Simple and Flexible Private Revocation Checking
Privacy-Enhancing Technologies (PETS), 2006.
st-2006.pdf
-
G. Tsudik and S. Xu
A Flexible Framework for Secret Handshakes
Privacy-Enhancing Technologies (PETS), 2006.
tx-2006.pdf
-
X. Li, G. Tsudik and X. Yang
A Technical Approach to Net Neutrality
ACM Workshop on Hot Topics in Networks (Hotnets-V), 2006.
lty-2006.pdf
- M. Narasimha, E. Mykletun and G. Tsudik
Authentication and Integrity in Outsourced Databases,
ACM Transactions on Storage, , Vol. 2, No. 2, May 2006. pp. 107-138.
NMT06.pdf
- C. Castelluccia, S. Jarecki, J. Kim and G. Tsudik
Secure Acknowledgement Aggregation and Multisignatures with Limited Robustness,
Computer Networks, Vol. 50, No. 10, July 2006, pp. 1639-1652.
scn04-journal.ps.gz
- K. Obraczka, G. Tsudik and K. Viswanath
Exploring Mesh- and Tree-Based Multicast Routing Protocols for MANETs,
IEEE Transactions on Mobile Computing, Vol. 5, No. 1, pp. 28-42, January 2006.
tmc-2005.ps.gz
2005:
-
E. Mykletun and G. Tsudik
On using Secure Hardware in Outsourced Databases
International Workshop on Innovative Architecture for Future Generation High-Performance Processors and
Systems (IWIA), 2005.
iwia-2005.pdf
-
C. Castelluccia, E. Mykletun and G. Tsudik,
Efficient Aggregation of Encrypted Data in Wireless Sensor Networks
IEEE Mobiquitous, 2005.
mobiq-2005.pdf
-
J. Kim and G. Tsudik,
Securing Route Discovery in DSR
IEEE Mobiquitous, 2005.
sdsr-2005.pdf
-
G. Tsudik and S. Xu,
A Flexible Framework for Secret Handshakes (Short Paper / Brief Announcement)
ACM Conference on Principles of Distributed Computing (PODC), 2005.
podc-2005.pdf
-
G. Ateniese, D. Chou, B. de Medeiros and G. Tsudik,
Sanitizable Signatures
European Symposium on Research in Computer Security (ESORICS), 2005.
esorics-2005.pdf
-
N. Saxena, G. Tsudik and J. Yi
Efficient Node Admission for Short-lived Mobile Ad Hoc Networks
IEEE International Conference on Network Protocols (ICNP), 2005.
icnp-2005.pdf
-
M. Narasimha and G. Tsudik
DSAC: Integrity of Outsourced Databases with Signature Aggregation and Chaining (Short Paper/Poster)
ACM Conference on Information and Knowledge Management (CIKM), 2005.
cikm-2005.pdf
- Y. Amir, C. Nita-Rotaru, J. Stanton and G. Tsudik
Secure Spread: An Integrated Architecture for Secure Group Communication,
IEEE Transaction on Dependable and Secure Computing Systems, Vol. 2, No. 3, July-September 2005.
TDSC-0113-0704.pdf
2004:
-
B. Hore, S. Mehrotra and G. Tsudik
A Privacy-Preserving Index for Range Queries
International Conference on Very Large Databases (VLDB), August 2004.
vldb-2004.pdf
-
E. Mykletun, M. Narasimha and G. Tsudik
Signature "Bouquets": Immutability of Aggregated Signatures
European Symposium on Research in Computer Security (ESORICS), 2004.
esorics-2004.pdf
-
C. Castelluccia, S. Jarecki and G. Tsudik
Secret Handshakes from CA-oblivious Encryption
IACR ASIACRYPT, 2004.
asiacrypt-2004.pdf
-
C. Castelluccia, S. Jarecki and G. Tsudik
Verifiable and Secure Acknowledgement Aggregation
Security in Computer Networks Conference (SCN), 2004.
scn-2004.pdf
-
C. Castelluccia, S. Jarecki and G. Tsudik
Secret Handshakes from CA-oblivious Encryption (Short paper)
ACM Conference on Principles of Distributed Computing (PODC), 2004.
podc-2004.pdf
-
N. Saxena, G. Tsudik and J. Yi
Identity-based Access Control for Ad Hoc Groups
International Conference on Information Security and Cryptology (ICISC'04), December 2004.
icisc-2004.pdf
-
S. Mehrotra, E. Mykletun, G. Tsudik and Y. Wu
A Framework for Efficient Storage Security in RDBMS
International Conference on Extending Database Technology (EDBT), 2004.
edbt.pdf
-
E. Mykletun, M. Narasimha and G. Tsudik
Authentication and Integrity in Outsourced Databases
Symposium on Network and Distributed Systems Security (NDSS), 2004.
ndss-2004.pdf
-
X. Ding, G. Tsudik and S. Xu
Leak-Free Mediated Group Signatures
IEEE ICDCS, 2004.
icdcs-2004.pdf
-
N. Saxena, G. Tsudik and J. Yi
Access Control Mechanisms for Ad Hoc Networks
IEEE Workshop on Hot Topics in Peer-to-Peer (HOT-P2P'04), 2004.
p2p-2004.pdf
- K. Bicakci, G. Tsudik and B. Tung
On Constructing Optimal One-Time Signatures,
Computer Networks, Vol. 43, No. 3, pp. 339-349, October 2003.
comnet-2003.pdf
- Y. Kim, F. Maino, M. Narasimha, K. Rhee and G. Tsudik
Secure Group Services for Storage-Area Networks,
IEEE Communications, Vol. 41, No. 8, August 2003.
kmnrt04.pdf
- K. Rhee, Y. Park and G. Tsudik
A Group Key Management Architecture in Mobile Ad-hoc Wireless Networks,
Journal Of Communication and Networks, Vol. 6, No. 2, pp. 156-162, June 2004.
jcn-2004.pdf
- Y. Amir, Y. Kim, C. Nita-Rotaru and G. Tsudik
On the Performance of Group Key Agreement Protocols
ACM Transactions on Information Systems Security, Vol. 7, No. 3, pp. 457-488, August 2004.
tissec-2004.pdf
- D. Boneh, X. Ding and G. Tsudik
A Method for Fast Credentials Revocation,
ACM Transactions on Internet Technology, vol. 4, No. 1, pp. 60-82, February 2004.
bdt04.pdf
- Y. Kim, A. Perrig and G. Tsudik
Communication-Efficient Group Key Agreement,
IEEE Transactions on Computers, Vol. 53, No. 7, July 2004.
kpt04.pdf
- Y. Amir, Y. Kim, C. Nita-Rotaru, J. Stanton, J. Schultz and G.Tsudik
Secure Group Communication Using Robust Contributory Key Agreement,
IEEE Transaction on Parallel and Distributed Systems, Vol. 15, No. 5, pp. 468-480, May 2004.
aknsst04.pdf
- Y. Kim, A. Perrig and G. Tsudik
Tree-Based Group Key Agreement,
ACM Transactions on Information Systems Security, Vol. 7, No. 1, pp. 60-96, May 2004.
kpt04a.pdf
2003:
-
G. Tsudik and S. Xu
Accumulating Composites and Improved Group Signing
IACR ASIACRYPT, 2003.
tx03.ps.gz
-
M. Narasimha, G. Tsudik and J. Yi,
On the Utility of Distributed Cryptography in P2P Settings and MANETs
IEEE International Conference on Network Protocols (ICNP), 2003.
nty03.pdf
-
X. Ding and G. Tsudik
Simple Identity-Based Cryptography with Mediated RSA
RSA Conference, Cryptographers' Track, 2003.
bdt03.pdf
-
Y. Amir, C. Nita-Rotaru, J. Stanton and G. Tsudik
Scaling Secure Group Communications: Beyond Peer-to-Peer
DARPA Information Security Conference and Exposition (DISCEX), 2003.
anst03.pdf
-
Y. Kim, D. Mazzocchi and G. Tsudik
Admission Control in Collaborative Groups
IEEE Symposium on Network Computing and Applications (NCA), 2003.
kmt03.pdf
-
N. Saxena, G. Tsudik and J. Yi
Experimenting with Peer Group Admission Control
Workshop on Advanced Developments in Software and Systems Security (WADIS), 2003.
wadis-2003.pdf
-
N. Saxena, G. Tsudik and J. Yi
Admission Control in Peer-to-Peer: Design and Performance Evaluation
ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), 2003.
sty03.pdf
-
Y. Kim and G. Tsudik
Admission Control in Peer Groups
NSF/NASA/DOE Workshop on New Directions on Scalable Cyber-Security, 2003.
2002:
-
G. Tsudik
Weak Forward Security in Mediated RSA
Security in Computer Networks Conference (SCN), 2002.
t02.pdf
-
G. Ateniese, D. Song and G. Tsudik
Quasi-Efficient Revocation in Group Signatures
Financial Cryptography (FC), 2002.
ast02.pdf
-
Y. Amir, Y. Kim, C. Nita-Rotaru, and G. Tsudik
On the Performance of Group Key Agreement Protocols
IEEE ICDCS, 2002.
aknt02.pdf
-
M. El Zarki, S. Mehrotra, G. Tsudik and N. Venkatasubramanian
Security Issues in a Future Vehicular Network
EuroWireless, 2002.
zmtv02.pdf
-
X. Ding, D. Mazzocchi and G. Tsudik
Experimenting with Server-Aided Signatures
Network and Distributed Systems Security Symposium (NDSS), 2002.
dmt02.pdf
-
Y. Park, K. Rhee and G. Tsudik
Group Key Management in Hierarchical Ad-hoc Wireless Networks
Workshop on Information Security Applications (WISA), 2002.
prt02.pdf
-
Y. Kim, F. Maino, M. Narasimha and G. Tsudik
Secure Group Services for Storage-Area Networks
IEEE International Workshop on Storage Security (IWSS), 2002.
kmnt02.pdf
- Y. Kim, D. Mazzocchi and G. Tsudik
Admission Control in Collaborative Groups,
ACM Mobile Computing and Communications Review, Vol. 6, No. 4, October 2002.
2001:
-
D. Boneh, X. Ding, G. Tsudik and B. Wong
Fast Revocation of Security Capabilities
Usenix Security Symposium, 2001.
bdtw.pdf
-
D. Agarwal, O. Chevassut, M. Thompson and G. Tsudik
An Integrated Solution for Secure Group Communication in Wide-Area Networks
IEEE Symposium on Computers and Communications (ISCC), 2001.
actt01.pdf
-
Y. Kim. A. Perrig and G. Tsudik Communication-Efficient Group Key Agreement
IFIP-SEC, 2001.
kpt2001.pdf
-
Y. Amir, Y. Kim, C. Nita-Rotaru, J. Schultz, J. Stanton and G. Tsudik
Exploring Robustness in Group Key Agreement
IEEE ICDCS, 2001.
aknsst00.pdf
-
K. Obraczka, G. Tsudik and K. Viswanath
Pushing the Limit of Multicast in Ad Hoc Networks
IEEE ICDCS, April 2001.
otv2000.ps.gz
- K. Obraczka, G. Tsudik and K Viswanath
Towards Reliable Multicast in Multi-Hop Ad Hoc Networks,
ACM/Balzer Wireless Networks, Vol. 7, No. 6, 2001.
hotv2000.ps.gz
2000:
-
Y. Kim. A. Perrig and G. Tsudik
Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups
ACM CCS, 2000.
kpt2000.pdf
-
G. Ateniese, J. Camenisch, M. Joye and G. Tsudik
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme
IACR CRYPTO. 2000.
acjt00.pdf
-
Bicakci, B. Tung and G. Tsudik
On Constructing Optimal One-Time Signatures
International Symposium on Computer and Information Sciences (ISCIS), 2000.
iscis-2000.pdf
-
Y. Amir, G. Ateniese, D. Hasse, Y. Kim, C. Nita-Rotaru, T. Schlossnagle, J. Schultz, J. Stanton and G. Tsudik
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments
IEEE ICDCS, 2000.
aahknssst99.pdf
-
G. Ateniese, O. Chevassut, D. Hasse, Y. Kim and G. Tsudik
The Design of a Group Key Management API
DARPA DISCEX, 2000.
achkt99.ps.gz
-
C. Landwehr, M. Reed, P. Syverson and G. Tsudik
Towards and Analysis of Onion Routing Security
Workshop on Design Issues in Anonymity and Unobservability, 2000.
lrtst2000.ps.gz
- M. Bellare, J. Garay, R. Hauser, A. Herzberg, H. Krawczyk,
M. Steiner, G. Tsudik, E. Van Herreweghen, and M. Waidner
Design, Implementation and Deployment of a Secure Account-Based Electronic Payment System,
IEEE JSAC, special issue on Secure Communication, May 2000.
ikpj.pdf
- G. Ateniese, M. Steiner and G. Tsudik
New Multi-party Authentication Services and Key Agreement Protocols,
IEEE JSAC, special issue on Secure Communication, May 2000.
ast99.ps.gz
- M. Steiner, G. Tsudik and M. Waidner
Key Agreement in Dynamic Peer Groups,
IEEE Transactions on Parallel and Distributed Systems, August 2000.
stw99.ps.gz
- T. Hardjono and G. Tsudik
IP Multicast Security: Issues and Directions,
Annales de Telecom, 2000.
ht99.ps.gz
1999 and earlier:
-
G. Ateniese and G. Tsudik
Some Open Issues and New Directions in Group Signatures
Financial Cryptography (FC), 1999.
at98-2.ps.gz
-
G. Ateniese and G. Tsudik
Group Signatures a' la carte
ACM Symposium on Discrete Algorithms (SODA), 1999.
at98-1.ps.gz
-
C. Ho, K. Obraczka, G. Tsudik and K. Viswanath
Flooding for Reliable Multicast in Multi-Hop Ad Hoc Networks,
ACM Workshop on Discrete Algorithms for Mobility (DIAL-M), 1999.
hotv99.ps.gz
-
G. Ateniese, M. Joye and G. Tsudik
On the Difficulty of Coalition-Resistance in Group Signature Schemes
Security in Computer Networks (SCN), 1999.
ajt99.ps.gz
- R. Hauser, A. Przygienda and G. Tsudik
Lowering Security Overhead in Link State Routing,
Computer Networks and ISDN Systems, April 1999.
hpt98.ps.gz
- G. Ateniese, A. Herzberg, H. Krawczyk and G. Tsudik
Untraceable Mobility: On Travelling Incognito,
Computer Networks and ISDN Systems, April 1999.
hkt97.ps.gz
-
I. Foster, C. Kesselman, G. Tsudik and S. Tuecke
Security Architecture for Large-Scale Distributed Computations
ACM Conference on Computer and Communications Security (CCS), 1998.
fktt98.ps.gz
-
G. Ateniese, M. Steiner and G. Tsudik
Authenticated Group Key Agreement and Related Issues
ACM Conference on Computer and Communications Security (CCS), 1998.
ast98.ps.gz
-
M. Franklin and G. Tsudik
Secure Group Barter
Financial Cryptography (FC), 1998.
ft97.ps.gz
-
M. Steiner, G. Tsudik and M. Waidner
CLIQUES: A New Approach to Group Key Agreement
IEEE ICDCS, 1998.
stw97.ps.gz
-
K. Obraczka and G. Tsudik
Multicast Routing Issues in Ad Hoc Networks
IEEE International Conference on Universal Personal Communication (ICUPC), 1998.
ot98.ps.gz
- R. Molva and G. Tsudik
Secret Sets and Applications,
Information Processing Letters, Vol. 65, No. 1, pp. 47-55, 1998.
mt96.ps.gz
-
R. Hauser, A. Przygienda and G. Tsudik
Reducing the Cost of Security in Link State Routing
Symposium on Network and Distributed System Security (NDSS), 1997.
hpt96.ps.gz
- N. Asokan, G. Tsudik and M. Waidner
Server-Supported Signatures,
Journal of Computer Security, November 1997.
atw97.ps.gz
- J. Gray, A. Kshemkalyani, M. Matyas, M. Peyravian and G. Tsudik
ATM Cell Encryption and Key Update Synchronization,
Telecommunication Systems Journal, Vol. 7, No. 4, pp. 391-408, 1997.
gkmpt96.ps.gz
-
P. Janson, G. Tsudik and M. Yung
Scalability and Flexibility in Authentication Services: The KryptoKnight Approach
IEEE INFOCOM, 1997.
jty94.ps.gz
-
R. Hauser, A. Przygienda and G. Tsudik
Low-cost Security in Link State Routing
Security in Communication Networks, 1996.
-
C. Gulcu and G. Tsudik
Mixing E-mail with BABEL
Symposium on Network and Distributed System Security (NDSS), 1996.
gguts96.ps.gz
-
N. Asokan, G. Tsudik and M. Waidner
Server-Supported Signatures
European Symposium on Research in Computer Security (ESORICS), 1996.
atw96.ps.gz
-
R. Hauser and G. Tsudik
On Shopping Incognito
USENIX Conference on Electronic Commerce, 1996.
hats96.ps.gz
-
M. Steiner, G. Tsudik and M. Waidner
Diffie-Hellman Key Distribution Extended to Groups
ACM Conference on Computer and Communications Security (CCS), 1996.
stw96.ps.gz
- R. Hauser, P. Janson, R. Molva, G. Tsudik and E. Van Herreweghen,
Robust and Secure Password/Key Change Method,
Journal of Computer Security, November 1996.
hjmtv96.ps.gz
-
M. Bellare, R. Hauser, A. Herzberg, J. Garay, H. Krawczyk, M. Steiner, G. Tsudik and M. Waidner
iKP -- A Family of Secure Electronic Payment Protocols
USENIX Conference on Electronic Commerce, 1995.
bhhgkstw95.ps.gz
-
R. Molva, D. Samfat and G. Tsudik
An Authentication Protocol for Mobile Users
IEE Colloquium on Security and Cryptography Applications to Radio Systems, 1995
- D. Chess, B. Grosof, C. Harrison, D. Levine, C. Parris and G. Tsudik
Itinerant Programs for Mobile Computing,
IEEE Personal Communication Systems, September 1995.
cghlpt95.ps.gz
- P. Janson and G. Tsudik
Secure and Minimal Protocols for Authenticated Key Distribution
Computer Communications Journal, September 1995.
jt94.ps.gz
-
R. Hauser, P. Janson, R. Molva, G. Tsudik and E. Van Herreweghen
Robust and Secure Password/Key Change Method
European Symposium on Research in Computer Security (ESORICS), 1994.
hjmtv94.ps.gz
-
A. Herzberg, H. Krawczyk and G. Tsudik
On Travelling Incognito
IEEE Workshop on Mobile Systems and Applications, 1994.
hkt94.ps.gz
- R. Molva, D. Samfat and G. Tsudik
Authentication of Mobile Users,
IEEE Network, Special Issue on Mobile Communications, March/April 1994.
mst94.ps.gz
-
G. Tsudik and E. Van Herreweghen
Some Remarks on Protecting Weak Secrets and Poorly-Chosen Keys from Guessing Attacks
IEEE Symposium on Reliable Distributed Systems (SRDS), 1993.
tv93a.ps.gz
-
G. Tsudik and E. Van Herreweghen
On Simple and Secure Key Distribution
ACM Conference on Computer and Communications Security (CCS), 1993.
tv93.ps.gz
-
R. Molva and G. Tsudik
Authentication Method with Impersonal Token Cards
IEEE Symposium on Security and Privacy (S&P), 1993.
mt93.ps.gz
- D. Estrin, M. Steenstrup and G. Tsudik
Protocols for Route Establishment and Packet Forwarding Across Multi-Domain Internetworks
ACM/IEEE Transactions on Networking, February 1993.
-
G. Tsudik
Policy Enforcement in Stub Autonomous Domains
European Symposium on Research in Computer Security (ESORICS), 1992.
t92a.ps.gz
-
R. Molva, G. Tsudik, E. Van Herreweghen and S. Zatti
KryptoKnight Authentication and Key Distribution System
European Symposium on Research in Computer Security (ESORICS), 1992.
mtvz92.ps.gz
-
G. Tsudik
Message Authentication with One-Way Hash Functions
IEEE INFOCOM, 1992.
t92.ps.gz
- R. Summers and G. Tsudik
AudES: An Expert System for Security Auditing,
Computer Security Journal Vol. 6, No. 1, June 1991.
- D. Estrin and G. Tsudik
An End-to-End Argument for Network Layer Inter-Domain Access Controls,
Journal of Internetworking: Research and Experience, June 1991.
et91.ps.gz
- D. Estrin and G. Tsudik
Secure Control of Transit Internetwork Traffic,
Computer Networks and ISDN Systems, October 1991.
-
R. Summers and G. Tsudik
AudES: An Expert System for Security Auditing
AAAI Conference on Innovative Applications in AI, 1990.
st90.pdf
- D. Estrin, J. Mogul and G. Tsudik
VISA Protocols for Controlling Inter-Organizational Datagram Flow
IEEE Journal on Selected Areas in CommunicationsMay 1989.
- G. Tsudik
Datagram Authentication in Internet Gateways
IEEE Journal on Selected Areas in Communications, May 1989.
-
D. Estrin and G. Tsudik
Policy Enforcement in Interconnected Autonomous Networks
DIMACS Workshop on Connections Between Distributed Computing and Cryptography, 1989.
-
D. Estrin and G. Tsudik
Security Issues in Policy Routing
IEEE Symposium on Security and Privacy (S&P), 1989.
et89.pdf
-
D. Estrin and G. Tsudik
VISA Scheme for Inter-Organizational Network Security
IEEE Symposium on Security and Privacy (S&P), 1987.
et87.pdf