Conference/Workshop Publications

    2010

  1. E. De Cristofaro and G. Tsudik,
    Practical Private Set Intersection Protocols,
    Financial Cryptography and Data Security Conference (FC), 2010.

  2. R. Di Pietro, G. Oligeri, C. Soriente and G. Tsudik
    Intrusion-Resilience in Mobile Unattended WSNs,
    IEEE INFOCOM, 2010.

  3. C. Catellucia, K. El Defrawy and G. Tsudik
    Link-Layer Encryption Effect on the Capacity of Network Coding in Wireless Networks,
    IEEE INFOCOM WiP Session, 2010.

  4. D. Ma and G. Tsudik
    IRRES: Intrusion Resilient Remote Email Storage,
    ICDCS Workshop on Security and Privacy in Cloud Computing (SPCC), 2010.

  5. M. Manulis, B. Poettering and G. Tsudik
    Affiliation-Hiding Key Exchange with Untrusted Group Authorities,
    Applied Cryptography and Network Security (ACNS), 2010.

  6. M. Manulis, B. Poettering and G. Tsudik
    Taming Big Brother Ambitions: More Privacy for Secret Handshakes,
    Privacy Enhancing Technologies Symposium (PETS), 2010.

  7. R. Nithyanand, N. Saxena, G. Tsudik and E. Uzun
    Groupthink: On the Usability of Secure Group Association of Wireless Devices,
    ACM International Conference on Ubiquitous Computing (UBICOMP), 2010.

  8. R. Nithyanand, G. Tsudik and E. Uzun
    Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems,
    European Symposium on Research in Computer Security (ESORICS), 2010.

  9. D. Perito and G. Tsudik
    Secure Code Update for Embedded Devices via Proofs of Secure Erasure,
    European Symposium on Research in Computer Security (ESORICS), 2010.

  10. Y. Lu and G. Tsudik
    Towards Plugging Privacy Leaks in Domain Name System,
    IEEE International Conference on Peer-to-Peer Computing (P2P), 2010.

  11. R. Di Pietro, G. Oligeri, C. Soriente and G. Tsudik
    Securing Mobile Unattended WSNs against a Mobile Adversary,
    IEEE Symposium on Reliable Distributed Systems (SRDS), 2010.

  12. E. De Cristofaro, J. Kim and G. Tsudik
    Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model,
    IACR ASIACRYPT, 2010.

  13. C. Badea, M. Cesarano, A. Nicolau, G. Tsudik and A. Veidenbaum
    Leveraging Virtualization Towards Improving Cloud Security for Compute-Intensive Applications,
    International Conference on Cloud Computing (CloudComp), 2010.

    2009

  14. E. De Cristofaro, X.Ding and G.Tsudik
    Privacy-Preserving Querying in Sensor Networks,
    IEEE Conference on Computer Communications and Networks (ICCCN), 2009.

  15. F. Massacci, G. Tsudik and A. Yautsiukhin
    Extended Abstract: Logging Key Assurance Indicators in an Enterprise,
    ACM Symposium on Information, Computer & Communication Security (ASIACCS), 2009.

  16. A. Kumar, N. Saxena, G. Tsudik and E. Uzun
    Caveat Emptor: A Comparative Study of Secure Device Pairing Methods,
    IEEE Conference on Pervasive Computing and Communications (PERCOM), 2009.

  17. R. Di Pietro, C. Soriente, A. Spognardi and G. Tsudik
    Intrusion-Resilience via Collaborative Authentication in Unattended WSNs,
    ACM Conference on Wireless Network Security (WiSec), 2009.

  18. K. El Defrawy, J. Solis and G. Tsudik
    Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks,
    IEEE Computer Software and Applications Conference (COMPSAC), 2009.

  19. E. De Cristofaro, S. Jarecki, J. Kim and G. Tsudik
    Privacy-Preserving Policy-based Information Transfer,
    Privacy Enhancing Technologies Symposium (PETS), 2009.

  20. A. Kobsa, R. Sonawalla, G. Tsudik, E. Uzun and Y. Wang
    Serial Hook-Ups: A Comparative Usability Study of Secure Device Pairing Methods,
    Symposium On Usable Privacy and Security (SOUPS), 2009.

    2008:

  21. D. Ma and G. Tsudik
    A New Approach to Secure Logging,
    IFIP WG11.3 Working Conference on Data and Applications Security (DBSec), 2008.

  22. C. Soriente, G. Tsudik and E. Uzun
    HAPADEP: Human-Assisted Pure Audio Device Pairing,
    Information Security Conference (ISC), 2008.

  23. G. Ateniese, R. Di Pietro, L. Mancini and G. Tsudik
    Scalable and Efficient Provable Data Possession,
    Conference on Security and Privacy in Communication Networks (Securecomm), 2008.

  24. R. Di Pietro, D. Ma, C. Soriente and G. Tsudik
    POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks,
    IEEE Symposium on Reliable Distributed Systems (SRDS), 2008.

  25. K. Eldefrawy and G. Tsudik
    PRISM: Private Routing In Suspicious MANETs,
    IEEE International Conference on Network Protocols (ICNP), 2008.

  26. D. Ma and G. Tsudik,
    DISH: Distributed Self-Healing (in Unattended Sensor Networks)
    Symposium on Stabilization, Safety and Security of Distributed Systems (SSS), 2008.

  27. J. Kim and G. Tsudik
    Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks,
    International Conference on Information Security and Cryptology (ICISC), 2008.

  28. R. di Pietro, L. Mancini, C.Soriente, A. Spognardi and G. Tsudik
    Catch Me (If You Can): Data Survival in Unattended Sensor Networks,
    IEEE International Conference on Pervasive Computing and Communications (PERCOM), 2008.
    dmsst08.pdf

  29. S. Jarecki, J. Kim and G. Tsudik
    Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Agreement,
    RSA Conference, Cryptographers' Track (CT-RSA), 2008.
    jkt08.pdf

    2007:

  30. S. Jarecki, J. Kim and G. Tsudik
    Group Secret Handshakes or Affiliation-Hiding Authenticated Group Key Agreement,
    RSA Conference, Cryptographers' Track (CT-RSA), 2007.
    jkt07.pdf

  31. D. Ma and G. Tsudik
    Forward-Secure Aggregate Authentication,
    IEEE Symposium on Research in Security and Privacy (S&P), 2007.
    mt07.pdf

  32. K. Eldefrawy and G. Tsudik
    ALARM: Anonymous Location-Aided Routing in MANETs,
    IEEE International Conference on Network Protocols (ICNP), 2007.
    alarm07.pdf

  33. S. Jarecki, J. Kim and G. Tsudik
    Robust Group Key Agreement using Short Broadcasts,
    ACM Computer and Communication Security Conference (CCS), 2007.
    rbd07.pdf

  34. G. Tsudik,
    A Family of Dunces: Trivial RFID Identification and Authentication Protocols,
    Symposium on Privacy-Enhancing Technologies (PET'07), 2007.
    t07.pdf

  35. M. Narasimha and G. Tsudik
    Privacy-Preserving Revocation Checking with Modified CRLs,
    European PKI Workshop: Theory and Practice (EuroPKI), 2007.

    2006:

  36. M. Goodrich, M. Sirivianos, J. Solis, G. Tsudik and E. Uzun
    Loud And Clear: Human Verifiable Authentication Based on Audio,
    IEEE ICDCS'06, 2006.
    gsstu.pdf

  37. S. Jarecki, J. Kim and G. Tsudik
    Authentication for Paranoids: Multi-Party Secret Handshakes
    ACNS'06, 2006.
    jkt06.pdf

  38. E. Mykletun and G. Tsudik
    Aggregation Queries in the Database-As-a-Service Model
    IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC), 2006.
    mt06.pdf

  39. G. Tsudik
    YA-TRAP: Yet Another Trivial RFID Authentication Protocol (WiP paper)
    IEEE PerCom, 2006.
    t-2006.pdf

  40. M. Narasimha and G. Tsudik
    Authentication of Outsourced Databases using Signature Aggregation and Chaining
    International Conference on Database Systems for Advanced Applications (DASFAA), 2006.
    nt-2006.pdf

  41. C. Castelluccia, E. Mykletun and G. Tsudik
    Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes
    ACM AsiaCCS, 2006.
    cmt-2006.pdf

  42. J. Solis and G. Tsudik
    Simple and Flexible Private Revocation Checking
    Privacy-Enhancing Technologies (PETS), 2006.
    st-2006.pdf

  43. G. Tsudik and S. Xu
    A Flexible Framework for Secret Handshakes
    Privacy-Enhancing Technologies (PETS), 2006.
    tx-2006.pdf

  44. X. Li, G. Tsudik and X. Yang
    A Technical Approach to Net Neutrality
    ACM Workshop on Hot Topics in Networks (Hotnets-V), 2006.
    lty-2006.pdf

    2005:

  45. E. Mykletun and G. Tsudik
    On using Secure Hardware in Outsourced Databases
    International Workshop on Innovative Architecture for Future Generation High-Performance Processors and Systems (IWIA), 2005.
    iwia-2005.pdf

  46. C. Castelluccia, E. Mykletun and G. Tsudik,
    Efficient Aggregation of Encrypted Data in Wireless Sensor Networks
    IEEE Mobiquitous, 2005.
    mobiq-2005.pdf

  47. J. Kim and G. Tsudik,
    Securing Route Discovery in DSR
    IEEE Mobiquitous, 2005.
    sdsr-2005.pdf

  48. G. Tsudik and S. Xu,
    A Flexible Framework for Secret Handshakes (Short Paper / Brief Announcement)
    ACM Conference on Principles of Distributed Computing (PODC), 2005.
    podc-2005.pdf

  49. G. Ateniese, D. Chou, B. de Medeiros and G. Tsudik,
    Sanitizable Signatures
    European Symposium on Research in Computer Security (ESORICS), 2005.
    esorics-2005.pdf

  50. N. Saxena, G. Tsudik and J. Yi
    Efficient Node Admission for Short-lived Mobile Ad Hoc Networks
    IEEE International Conference on Network Protocols (ICNP), 2005.
    icnp-2005.pdf

  51. M. Narasimha and G. Tsudik
    DSAC: Integrity of Outsourced Databases with Signature Aggregation and Chaining (Short Paper/Poster)
    ACM Conference on Information and Knowledge Management (CIKM), 2005.
    cikm-2005.pdf

    2004:

  52. B. Hore, S. Mehrotra and G. Tsudik
    A Privacy-Preserving Index for Range Queries
    International Conference on Very Large Databases (VLDB), August 2004.
    vldb-2004.pdf

  53. E. Mykletun, M. Narasimha and G. Tsudik
    Signature "Bouquets": Immutability of Aggregated Signatures
    European Symposium on Research in Computer Security (ESORICS), 2004.
    esorics-2004.pdf

  54. C. Castelluccia, S. Jarecki and G. Tsudik
    Secret Handshakes from CA-oblivious Encryption
    IACR ASIACRYPT, 2004.
    asiacrypt-2004.pdf

  55. C. Castelluccia, S. Jarecki and G. Tsudik
    Verifiable and Secure Acknowledgement Aggregation
    Security in Computer Networks Conference (SCN), 2004.
    scn-2004.pdf

  56. C. Castelluccia, S. Jarecki and G. Tsudik
    Secret Handshakes from CA-oblivious Encryption (Short paper)
    ACM Conference on Principles of Distributed Computing (PODC), 2004.
    podc-2004.pdf

  57. N. Saxena, G. Tsudik and J. Yi
    Identity-based Access Control for Ad Hoc Groups
    International Conference on Information Security and Cryptology (ICISC'04), December 2004.
    icisc-2004.pdf

  58. S. Mehrotra, E. Mykletun, G. Tsudik and Y. Wu
    A Framework for Efficient Storage Security in RDBMS
    International Conference on Extending Database Technology (EDBT), 2004.
    edbt.pdf

  59. E. Mykletun, M. Narasimha and G. Tsudik
    Authentication and Integrity in Outsourced Databases
    Symposium on Network and Distributed Systems Security (NDSS), 2004.
    ndss-2004.pdf

  60. X. Ding, G. Tsudik and S. Xu
    Leak-Free Mediated Group Signatures
    IEEE ICDCS, 2004.
    icdcs-2004.pdf

  61. N. Saxena, G. Tsudik and J. Yi
    Access Control Mechanisms for Ad Hoc Networks
    IEEE Workshop on Hot Topics in Peer-to-Peer (HOT-P2P'04), 2004.
    p2p-2004.pdf

    2003:

  62. G. Tsudik and S. Xu
    Accumulating Composites and Improved Group Signing
    IACR ASIACRYPT, 2003.
    tx03.ps.gz

  63. M. Narasimha, G. Tsudik and J. Yi,
    On the Utility of Distributed Cryptography in P2P Settings and MANETs
    IEEE International Conference on Network Protocols (ICNP), 2003.
    nty03.pdf

  64. X. Ding and G. Tsudik
    Simple Identity-Based Cryptography with Mediated RSA
    RSA Conference, Cryptographers' Track, 2003.
    bdt03.pdf

  65. Y. Amir, C. Nita-Rotaru, J. Stanton and G. Tsudik
    Scaling Secure Group Communications: Beyond Peer-to-Peer
    DARPA Information Security Conference and Exposition (DISCEX), 2003.
    anst03.pdf

  66. Y. Kim, D. Mazzocchi and G. Tsudik
    Admission Control in Collaborative Groups
    IEEE Symposium on Network Computing and Applications (NCA), 2003.
    kmt03.pdf

  67. N. Saxena, G. Tsudik and J. Yi
    Experimenting with Peer Group Admission Control
    Workshop on Advanced Developments in Software and Systems Security (WADIS), 2003.
    wadis-2003.pdf

  68. N. Saxena, G. Tsudik and J. Yi
    Admission Control in Peer-to-Peer: Design and Performance Evaluation
    ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), 2003.
    sty03.pdf

  69. Y. Kim and G. Tsudik
    Admission Control in Peer Groups
    NSF/NASA/DOE Workshop on New Directions on Scalable Cyber-Security, 2003.

    2002:

  70. G. Tsudik
    Weak Forward Security in Mediated RSA
    Security in Computer Networks Conference (SCN), 2002.
    t02.pdf

  71. G. Ateniese, D. Song and G. Tsudik
    Quasi-Efficient Revocation in Group Signatures
    Financial Cryptography (FC), 2002.
    ast02.pdf

  72. Y. Amir, Y. Kim, C. Nita-Rotaru, and G. Tsudik
    On the Performance of Group Key Agreement Protocols
    IEEE ICDCS, 2002.
    aknt02.pdf

  73. M. El Zarki, S. Mehrotra, G. Tsudik and N. Venkatasubramanian
    Security Issues in a Future Vehicular Network
    EuroWireless, 2002.
    zmtv02.pdf

  74. X. Ding, D. Mazzocchi and G. Tsudik
    Experimenting with Server-Aided Signatures
    Network and Distributed Systems Security Symposium (NDSS), 2002.
    dmt02.pdf

  75. Y. Park, K. Rhee and G. Tsudik
    Group Key Management in Hierarchical Ad-hoc Wireless Networks
    Workshop on Information Security Applications (WISA), 2002.
    prt02.pdf

  76. Y. Kim, F. Maino, M. Narasimha and G. Tsudik
    Secure Group Services for Storage-Area Networks
    IEEE International Workshop on Storage Security (IWSS), 2002.
    kmnt02.pdf

    2001:

  77. D. Boneh, X. Ding, G. Tsudik and B. Wong
    Fast Revocation of Security Capabilities
    Usenix Security Symposium, 2001.
    bdtw.pdf

  78. D. Agarwal, O. Chevassut, M. Thompson and G. Tsudik
    An Integrated Solution for Secure Group Communication in Wide-Area Networks
    IEEE Symposium on Computers and Communications (ISCC), 2001.
    actt01.pdf

  79. Y. Kim. A. Perrig and G. Tsudik Communication-Efficient Group Key Agreement
    IFIP-SEC, 2001.
    kpt2001.pdf

  80. Y. Amir, Y. Kim, C. Nita-Rotaru, J. Schultz, J. Stanton and G. Tsudik
    Exploring Robustness in Group Key Agreement
    IEEE ICDCS, 2001.
    aknsst00.pdf

  81. K. Obraczka, G. Tsudik and K. Viswanath
    Pushing the Limit of Multicast in Ad Hoc Networks
    IEEE ICDCS, April 2001.
    otv2000.ps.gz

    2000:

  82. Y. Kim. A. Perrig and G. Tsudik
    Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups
    ACM CCS, 2000.
    kpt2000.pdf

  83. G. Ateniese, J. Camenisch, M. Joye and G. Tsudik
    A Practical and Provably Secure Coalition-Resistant Group Signature Scheme
    IACR CRYPTO. 2000.
    acjt00.pdf

  84. Bicakci, B. Tung and G. Tsudik
    On Constructing Optimal One-Time Signatures
    International Symposium on Computer and Information Sciences (ISCIS), 2000.
    iscis-2000.pdf

  85. Y. Amir, G. Ateniese, D. Hasse, Y. Kim, C. Nita-Rotaru, T. Schlossnagle, J. Schultz, J. Stanton and G. Tsudik
    Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments
    IEEE ICDCS, 2000.
    aahknssst99.pdf

  86. G. Ateniese, O. Chevassut, D. Hasse, Y. Kim and G. Tsudik
    The Design of a Group Key Management API
    DARPA DISCEX, 2000.
    achkt99.ps.gz

  87. C. Landwehr, M. Reed, P. Syverson and G. Tsudik
    Towards and Analysis of Onion Routing Security
    Workshop on Design Issues in Anonymity and Unobservability, 2000.
    lrtst2000.ps.gz

    1999 and earlier:

  88. G. Ateniese and G. Tsudik
    Some Open Issues and New Directions in Group Signatures
    Financial Cryptography (FC), 1999.
    at98-2.ps.gz

  89. G. Ateniese and G. Tsudik
    Group Signatures a' la carte
    ACM Symposium on Discrete Algorithms (SODA), 1999.
    at98-1.ps.gz

  90. C. Ho, K. Obraczka, G. Tsudik and K. Viswanath Flooding for Reliable Multicast in Multi-Hop Ad Hoc Networks
    ACM Workshop on Discrete Algorithms for Mobility (DIAL-M), 1999. hotv99.ps.gz

  91. G. Ateniese, M. Joye and G. Tsudik
    On the Difficulty of Coalition-Resistance in Group Signature Schemes
    Security in Computer Networks (SCN), 1999.
    ajt99.ps.gz

  92. I. Foster, C. Kesselman, G. Tsudik and S. Tuecke
    Security Architecture for Large-Scale Distributed Computations
    ACM Conference on Computer and Communications Security (CCS), 1998.
    fktt98.ps.gz

  93. G. Ateniese, M. Steiner and G. Tsudik
    Authenticated Group Key Agreement and Related Issues
    ACM Conference on Computer and Communications Security (CCS), 1998.
    ast98.ps.gz

  94. M. Franklin and G. Tsudik
    Secure Group Barter
    Financial Cryptography (FC), 1998.
    ft97.ps.gz

  95. M. Steiner, G. Tsudik and M. Waidner
    CLIQUES: A New Approach to Group Key Agreement
    IEEE ICDCS, 1998.
    stw97.ps.gz

  96. K. Obraczka and G. Tsudik
    Multicast Routing Issues in Ad Hoc Networks
    IEEE International Conference on Universal Personal Communication (ICUPC), 1998.
    ot98.ps.gz

  97. R. Hauser, A. Przygienda and G. Tsudik
    Reducing the Cost of Security in Link State Routing
    Symposium on Network and Distributed System Security (NDSS), 1997.
    hpt96.ps.gz

  98. P. Janson, G. Tsudik and M. Yung
    Scalability and Flexibility in Authentication Services: The KryptoKnight Approach
    IEEE INFOCOM, 1997.
    jty94.ps.gz

  99. R. Hauser, A. Przygienda and G. Tsudik
    Low-cost Security in Link State Routing
    Security in Communication Networks, 1996.

  100. C. Gulcu and G. Tsudik
    Mixing E-mail with BABEL
    Symposium on Network and Distributed System Security (NDSS), 1996.
    gguts96.ps.gz

  101. N. Asokan, G. Tsudik and M. Waidner
    Server-Supported Signatures
    European Symposium on Research in Computer Security (ESORICS), 1996.
    atw96.ps.gz

  102. R. Hauser and G. Tsudik
    On Shopping Incognito
    USENIX Conference on Electronic Commerce, 1996.
    hats96.ps.gz

  103. M. Steiner, G. Tsudik and M. Waidner
    Diffie-Hellman Key Distribution Extended to Groups
    ACM Conference on Computer and Communications Security (CCS), 1996.
    stw96.ps.gz

  104. M. Bellare, R. Hauser, A. Herzberg, J. Garay, H. Krawczyk, M. Steiner, G. Tsudik and M. Waidner
    iKP -- A Family of Secure Electronic Payment Protocols
    USENIX Conference on Electronic Commerce, 1995. bhhgkstw95.ps.gz
    bhhgkstw95.ps.gz

  105. R. Molva, D. Samfat and G. Tsudik
    An Authentication Protocol for Mobile Users
    IEE Colloquium on Security and Cryptography Applications to Radio Systems, 1995

  106. R. Hauser, P. Janson, R. Molva, G. Tsudik and E. Van Herreweghen
    Robust and Secure Password/Key Change Method
    European Symposium on Research in Computer Security (ESORICS), 1994.
    hjmtv94.ps.gz

  107. A. Herzberg, H. Krawczyk and G. Tsudik
    On Travelling Incognito
    IEEE Workshop on Mobile Systems and Applications, 1994.
    hkt94.ps.gz

  108. G. Tsudik and E. Van Herreweghen
    Some Remarks on Protecting Weak Secrets and Poorly-Chosen Keys from Guessing Attacks
    IEEE Symposium on Reliable Distributed Systems (SRDS), 1993.
    tv93a.ps.gz

  109. G. Tsudik and E. Van Herreweghen
    On Simple and Secure Key Distribution
    ACM Conference on Computer and Communications Security (CCS), 1993.
    tv93.ps.gz

  110. R. Molva and G. Tsudik
    Authentication Method with Impersonal Token Cards
    IEEE Symposium on Security and Privacy (S&P), 1993.
    mt93.ps.gz

  111. G. Tsudik
    Policy Enforcement in Stub Autonomous Domains
    European Symposium on Research in Computer Security (ESORICS), 1992.
    t92a.ps.gz

  112. R. Molva, G. Tsudik, E. Van Herreweghen and S. Zatti
    KryptoKnight Authentication and Key Distribution System
    European Symposium on Research in Computer Security (ESORICS), 1992.
    mtvz92.ps.gz

  113. G. Tsudik
    Message Authentication with One-Way Hash Functions
    IEEE INFOCOM, 1992.
    t92.ps.gz

  114. R. Summers and G. Tsudik
    AudES: An Expert System for Security Auditing
    AAAI Conference on Innovative Applications in AI, 1990.
    st90.pdf

  115. D. Estrin and G. Tsudik
    Policy Enforcement in Interconnected Autonomous Networks
    DIMACS Workshop on Connections Between Distributed Computing and Cryptography, 1989.

  116. D. Estrin and G. Tsudik
    Security Issues in Policy Routing
    IEEE Symposium on Security and Privacy (S&P), 1989.
    et89.pdf

  117. D. Estrin and G. Tsudik
    VISA Scheme for Inter-Organizational Network Security
    IEEE Symposium on Security and Privacy (S&P), 1987.
    et87.pdf