Journal Publications


  1. X. Ding, D. Mazzocchi and G. Tsudik
    Equipping "Smart" Devices With Public Key Signatures,
    ACM Transactions on Internet Technology, Vol. 7, No. 1, February 2007. DMT07.pdf

  2. N. Saxena, G. Tsudik and J. Yi
    Threshold Cryptography in P2P and MANETs: the Case of Access Control,
    Computer Networks, Vol. 51, No. 13, August 2007, pp. 3632-3649. COMPNW3557.pdf

  3. M. Narasimha, E. Mykletun and G. Tsudik
    Authentication and Integrity in Outsourced Databases,
    ACM Transactions on Storage, , Vol. 2, No. 2, May 2006. pp. 107-138. NMT06.pdf

  4. C. Castelluccia, S. Jarecki, J. Kim and G. Tsudik
    Secure Acknowledgement Aggregation and Multisignatures with Limited Robustness
    Computer Networks, Vol. 50, No. 10, July 2006, pp. 1639-1652. scn04-journal.ps.gz

  5. K. Obraczka, G. Tsudik and K. Viswanath
    Exploring Mesh- and Tree-Based Multicast Routing Protocols for MANETs
    IEEE Transactions on Mobile Computing, Vol. 5, No. 1, pp. 28-42, January 2006. tmc-2005.ps.gz

  6. Y. Amir, C. Nita-Rotaru, J. Stanton and G. Tsudik
    Secure Spread: An Integrated Architecture for Secure Group Communication
    IEEE Transaction on Dependable and Secure Computing Systems, Vol. 2, No. 3, July-September 2005. TDSC-0113-0704.pdf

  7. K. Rhee, Y. Park and G. Tsudik
    A Group Key Management Architecture in Mobile Ad-hoc Wireless Networks
    Journal Of Communication and Networks, Vol. 6, No. 2, pp. 156-162, June 2004. jcn-2004.pdf

  8. Y. Amir, Y. Kim, C. Nita-Rotaru and G. Tsudik
    On the Performance of Group Key Agreement Protocols
    ACM Transactions on Information Systems Security, Vol. 7, No. 3, pp. 457-488, August 2004. tissec-2004.pdf

  9. D. Boneh, X. Ding and G. Tsudik
    A Method for Fast Credentials Revocation
    ACM Transactions on Internet Technology, vol. 4, No. 1, pp. 60-82, February 2004. bdt04.pdf

  10. Y. Kim, A. Perrig and G. Tsudik,
    Communication-Efficient Group Key Agreement
    IEEE Transactions on Computers, Vol. 53, No. 7, July 2004. kpt04.pdf

  11. Y. Amir, Y. Kim, C. Nita-Rotaru, J. Stanton, J. Schultz and G. Tsudik,
    Secure Group Communication Using Robust Contributory Key Agreement
    IEEE Transaction on Parallel and Distributed Systems, Vol. 15, No. 5, pp. 468-480, May 2004. aknsst04.pdf

  12. Y. Kim, A. Perrig and G. Tsudik,
    Tree-Based Group Key Agreement
    ACM Transactions on Information Systems Security; , Vol. 7, No. 1, pp. 60-96, May 2004. kpt04a.pdf

  13. K. Bicakci, G. Tsudik and B. Tung,
    On Constructing Optimal One-Time Signatures
    Computer Networks, Vol. 43, No. 3, pp. 339-349, October 2003. comnet-2003.pdf

  14. Y. Kim, F. Maino, M. Narasimha, K. Rhee and G. Tsudik,
    Secure Group Services for Storage-Area Networks,
    IEEE Communications, Vol. 41, No. 8, August 2003. kmnrt04.pdf

  15. Y. Kim, D. Mazzocchi and G. Tsudik
    Admission Control in Collaborative Groups (Abstract, weakly refereed),
    ACM Mobile Computing and Communications Review, Vol. 6, No. 4, October 2002. kmt02.pdf

  16. M. Steiner, G. Tsudik and M. Waidner
    Key Agreement in Dynamic Peer Groups
    IEEE Transactions on Parallel and Distributed Systems, August 2000. stw99.ps.gz

  17. T. Hardjono and G. Tsudik
    IP Multicast Security: Issues and Directions
    Annales de Telecom, 2000. ht99.ps.gz

  18. K. Obraczka, G. Tsudik and K Viswanath
    Towards Reliable Multicast in Multi-Hop Ad Hoc Networks
    ACM/Balzer Wireless Networks, Vol. 7, No. 6, 2001. hotv2000.ps.gz

  19. M. Bellare, J. Garay, R. Hauser, A. Herzberg, H. Krawczyk, M. Steiner, G. Tsudik, E. Van Herreweghen, and M. Waidner
    Design, Implementation and Deployment of a Secure Account-Based Electronic Payment System
    IEEE JSAC, special issue on Secure Communication, May 2000. ikpj.pdf

  20. G. Ateniese, M. Steiner and G. Tsudik
    New Multi-party Authentication Services and Key Agreement Protocols
    IEEE JSAC, special issue on Secure Communication, May 2000. ast99.ps.gz

  21. R. Hauser, A. Przygienda and G. Tsudik
    Lowering Security Overhead in Link State Routing
    Computer Networks and ISDN Systems , April 1999. hpt98.ps.gz

  22. G. Ateniese, A. Herzberg, H. Krawczyk and G. Tsudik
    Untraceable Mobility: On Travelling Incognito
    Computer Networks and ISDN Systems, April 1999. hkt97.ps.gz

  23. R. Molva and G. Tsudik
    Secret Sets and Applications
    Information Processing Letters , Vol. 65, No. 1, pp. 47-55, 1998. mt96.ps.gz

  24. N. Asokan, G. Tsudik and M. Waidner
    Server-Supported Signatures
    Journal of Computer Security , November 1997. atw97.ps.gz

  25. J. Gray, A. Kshemkalyani, M. Matyas, M. Peyravian and G. Tsudik
    ATM Cell Encryption and Key Update Synchronization
    Telecommunication Systems Journal , Vol. 7, No. 4, pp. 391-408, 1997. gkmpt96.ps.gz

  26. R. Hauser, P. Janson, R. Molva, G. Tsudik and E. Van Herreweghen
    Robust and Secure Password/Key Change Method
    Journal of Computer Security , November 1996. hjmtv96.ps.gz

  27. D. Chess, B. Grosof, C. Harrison, D. Levine, C. Parris and G. Tsudik
    Itinerant Programs for Mobile Computing
    IEEE Personal Communication Systems , September 1995. cghlpt95.ps.gz

  28. P. Janson and G. Tsudik
    Secure and Minimal Protocols for Authenticated Key Distribution
    Computer Communications Journal , September 1995. jt94.ps.gz

  29. R. Molva, D. Samfat and G. Tsudik
    Authentication of Mobile Users
    IEEE Network, Special Issue on Mobile Communications , March/April 1994. mst94.ps.gz

  30. D. Estrin, M. Steenstrup and G. Tsudik
    Protocols for Route Establishment and Packet Forwarding Across Multi-Domain Internetworks
    ACM/IEEE Transactions on Networking , February 1993.

  31. R. Summers and G. Tsudik
    AudES: An Expert System for Security Auditing
    Computer Security Journal Vol. 6, No. 1 , June 1991.

  32. D. Estrin and G. Tsudik
    An End-to-End Argument for Network Layer Inter-Domain Access Controls
    Journal of Internetworking: Research and Experience , June 1991. et91.ps.gz

  33. D. Estrin and G. Tsudik
    Secure Control of Transit Internetwork Traffic
    Computer Networks and ISDN Systems , October 1991.

  34. D. Estrin, J. Mogul and G. Tsudik
    VISA Protocols for Controlling Inter-Organizational Datagram Flow
    IEEE Journal on Selected Areas in Communications , May 1989.

  35. G. Tsudik
    Datagram Authentication in Internet Gateways
    IEEE Journal on Selected Areas in Communications , May 1989.