Publications of all sorts, shapes and sizes...

    2016

  1. I. Martinovic, K. Rasmussen, M. Roeschlin and G. Tsudik,
    Authentication Using Pulse-Response Biometrics,
    Communications of the ACM (CACM): Research Highlights, to appear in February 2015.
    contatt-CACM16.pdf

    2015

  2. E. Ayday, E. De Cristofaro, JP Hubaux and G. Tsudik,
    Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare?,
    IEEE Computer, Vol 48, No. 2, February 2015.
    WGS-Computer15.pdf

  3. T. Kaczmarek, A. Kobsa, R. Sy and G. Tsudik,
    An Unattended Study of Users Performing Security Critical Tasks Under Adversarial Noise,
    NDSS Workshop on Usable Security (USEC), 2015.
    noise-USEC15.pdf

  4. A. Compagno, M. Conti, P. Gasti, L. Mancini and G. Tsudik,
    Violating Consumer Anonymity: Geo-locating Nodes in Named Data Networking,
    Applied Cryptography and Network Security (ACNS), 2015. Best Student Paper Award.
    geoloc-ACNS15.pdf

  5. K. El Defrawy, G. Holland and G. Tsudik,
    Remote Attestation of Heterogeneous Cyber-Physical Systems: The Automotive Use Case,
    Conference on Embedded Security in Cars (ESCAR), 2015.
    attest-ESCAR15.pdf

  6. A. Compagno, M. Conti, C. Ghali, G. Tsudik,
    To NACK or not to NACK? Negative Acknowledgments in Information-Centric Networking,
    IEEE Conference on Computer Communications and Networks (ICCCN), 2015.
    ndn-nacks-ICCCN15.pdf

  7. S. Faber, R. Petrlic and G. Tsudik,
    UnLinked: Private Proximity-based Oline OSN Interaction,
    ACM Workshop on Privacy in the Electronic Society (WPES), 2015.
    unlinked-WPES15.pdf

  8. C. Ghali, M. Schlosberg, G. Tsudik and C. Wood,
    Interest-Based Access Control for Content Centric Networks,
    ACM Conference on Information-Centric Networking (ICN), 2015.
    ibac-ICN15.pdf

  9. N. Asokan, F. Brasser, A. Ibrahim, A. Sadeghi, M. Schunter, G. Tsudik and C. Wachsmann,
    SEDA: Scalable Embedded Device Attestation,
    ACM Conference on Computer and Communications Security (CCS), 2015.
    seda-CCS15.pdf

  10. C. Ghali, A. Narayanan, D. Oran, G. Tsudik and C. Wood,
    Secure Fragmentation for Content-Centric Networks,
    IEEE Symposium on Network Computing and Applications (NCA), 2015. Best Paper Award.
    frag-NCA15.pdf

    2014

  11. M. Almishari, P. Gasti, N. Nathan and G. Tsudik,
    Optimizing Bi-Directional Low-Latency Communication in Named-Data Networking,
    ACM Computer Communications Review, Vol. 44, No. 1, January 2014.
    bidir-CCR14.pdf

  12. C. Ghali, G. Tsudik and E. Uzun,
    Elements of Trust in Named-Data Networking,
    ACM Computer Communications Review, Vol. 44, No. 3, October 2014.
    ndn-trust-CCR14.pdf

  13. S. Ali, S. Jha, D. Ostry, V. Sivaraman and G. Tsudik,
    Securing First-Hop Data Provenance for Bodyworn Devices using Wireless Link Fingerprints,
    IEEE Transactions on Information Forensics and Security, Vol. 9, No. 12, September 2014.
    prov-TIFS14.pdf

  14. I. Martinovic, K. Rasmussen, M. Roeschlin and G. Tsudik,
    Authentication Using Pulse-Response Biometrics,
    ISOC Symposium on Network and Distributed System Security (NDSS), 2014. Distinguished Paper Award.
    contatt-NDSS14.pdf

  15. A. Francillon, Q. Nguyen, K. Rasmussen and G. Tsudik,
    A Minimalist Approach to Remote Attestation,
    IEEE/ACM Design, Automation, and Test in Europe (DATE), 2014.
    minimal-DATE14.pdf

  16. C. Ghali, G. Tsudik and E. Uzun,
    Needle in a Haystack: Mitigating Content Poisoning in Named-Data Networking,
    NDSS Workshop on Security of Emerging Networking Technologies (SENT), 2014.
    needle-SENT14.pdf

  17. M. Ambrosin, M. Conti, P. Gasti and G. Tsudik,
    Covert Ephemeral Communication in Named Data Networking,
    ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2014.
    covert-ASIACCS14.pdf

  18. J. Burke, P. Gasti, N. Nathan and G. Tsudik,
    Secure Sensing over Named Data Networking,
    IEEE Symposium on Network Computing and Applications (NCA), 2014.
    ndn-sense-NCA14.pdf

  19. M. Almishari, E. Oguz and G. Tsudik,
    Fighting Authorship Linkability with Crowdsourcing,
    ACM Conference on Online Social Networks (COSN), 2014.
    crowd-COSN14.pdf

  20. M. Almishari, E. Oguz, D. Kaafar and G. Tsudik,
    Stylometric Linkability of Tweets,
    ACM Workshop on Privacy in the Electronic Society (WPES), 2014.
    tweet-WPES14.pdf

    2013

  21. R. Di Pietro, G. Oligeri, C. Soriente and G. Tsudik,
    United We Stand: Intrusion-Resilience in Mobile Unattended WSNs,
    IEEE Transactions on Mobile Computing, Vol. 12, No. 7, July 2013.
    united-TMC13.pdf

  22. A. Kobsa, R. Nithyanand, G. Tsudik and E. Uzun,
    Can Jannie Verify: Usability of Display-Equipped RFID Tags for Security Purposes,
    Journal of Computer Security, Vol. 21, No. 3, July 2013.
    jannie-JCS13.pdf

  23. J. Burke, P. Gasti, N. Nathan and G. Tsudik,
    Securing Instrumented Environments over Content-Centric Networking,
    IEEE Workshop on Emerging Design Choices in Name-Oriented Networking (NOMEN), 2013.
    ndn-inst-NOMEN13.pdf

  24. G. Acs, M. Conti, C. Ghali, P. Gasti and G. Tsudik,
    Cache Privacy in Name-Data Networking,
    IEEE International Conference on Distributed Computing Systems (ICDCS), 2013.
    ndn-cache-ICDCS13.pdf

  25. P. Gasti, G. Tsudik, E. Uzun and L. Zhang,
    DoS & DDoS in Named Data Networking,
    IEEE Conference on Computer Communications and Networks (ICCCN), 2013.
    ndn-dos-ICCCN13.pdf

  26. M. Almishari, P. Gasti, E. Oguz and G. Tsudik,
    Privacy-Preserving Matching of Community-Contributed Content,
    European Symposium on Research in Computer Security (ESORICS), 2013.
    ppmcc-ESORICS13.pdf

  27. A. Compagno, M. Conti, P. Gasti and G. Tsudik,
    Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data
    Networking, IEEE Local Computer Networks (LCN), 2013.
    poseidon-LCN13.pdf

  28. E. Ayday, E. De Cristofaro, JP Hubaux and G. Tsudik,
    Privacy Considerations of Genome Sequencing,
    USENIX Summit on Hot Topics in Security (HotSec) , 2013.
    wgs-HOTSEC13.pdf

  29. E. De Cristofaro, S. Faber, and G. Tsudik,
    Secure Genomic Testing via Size- and Position-Hiding Private Substring Matching,
    ACM Workshop on Privacy in the Electronic Society (WPES), 2013.
    sphpsm-WPES13.pdf

    2012

  30. S. DiBenedetto, P. Gasti, G. Tsudik and E. Uzun,
    ANDaNA: Anonymous Named Data Networking Application,
    ISOC Symposium on Network and Distributed System Security (NDSS), 2012.
    andana.pdf

  31. K. Eldefrawy, A. Francillon, D. Perito and G. Tsudik,
    SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust,
    ISOC Symposium on Network and Distributed System Security (NDSS), 2012.
    smart.pdf

  32. E. De Cristofaro, C. Soriente and G. Tsudik,
    Hummingbird: Privacy at the time of Twitter,
    IEEE Symposium on Research in Security and Privacy (S&P), 2012.
    hummingbird.pdf

  33. E. De Cristofaro and G. Tsudik,
    Experimenting with Fast Private Set Intersection,
    International Conference on Trust and Trustworthy Computing (TRUST), 2012.
    psi-TRUST12.pdf

  34. Z. Erkin and G. Tsudik,
    Private Computation of Spatial and Temporal Power Consumption with Smart Meters,
    Applied Cryptography and Network Security (ACNS), 2012.
    ACNS12.pdf

  35. M. Almishari and G. Tsudik,
    Exploring Linkability of Community Reviewing,
    European Symposium on Research in Computer Security (ESORICS), 2012.
    reviewlink.pdf

  36. E. De Cristofaro, S. Faber, P. Gasti and G. Tsudik,
    GenoDroid: Are Privacy-Preserving Genomic Tests Ready for Prime Time?,
    ACM CCS Workshop on Privacy in the Electronic Society (WPES), 2012.
    genodroid.pdf

  37. E. De Cristofaro, P. Gasti and G. Tsudik,
    Fast and Private Computation of Cardinality of Set Intersection and Union,
    Conference on Cryptology and Network Security (CANS), 2012.
    psi-ca.pdf

  38. M. Conti, S. Das, C. Bisdikian, M. Kumar, L. Ni, A. Passarella, G. Roussos, G. Trster, G. Tsudik and F. Zambonelli,
    Looking Ahead in Pervasive Computing: Challenges and Opportunities in the Era of Cyber-Physical Convergence,
    Pervasive and Mobile Computing, Vol. 8, No. 12, February 2012.

  39. R. Di Pietro, D. Ma, C. Soriente and G. Tsudik,
    Self-Healing in Unattended Wireless Sensor Networks,
    ACM Transactions on Sensor Networks, Vol. 9, No. 1, February 2012.
    self-healing-TOSN12.pdf

  40. J. Cheon, C. Lim and G. Tsudik,
    Reducing RFID Reader Load with the Meet-in-the-Middle Strategy,
    Journal of Communications and Networks, Vol. 14, No. 1, February 2012.
    rfid-mitm-JCN12.pdf

  41. M. Al Mishari, E. De Cristofaro, K. El Defrawy and G. Tsudik,
    Harvesting SSL Certificate Data to Mitigate Web-Fraud,
    International Journal of Network Security, Vol. 14, No. 6, 2012.
    ssl-IJNS12.pdf

    2011

  42. G. Ateniese, E. De Cristofaro and G. Tsudik,
    (If) Size Matters: Size-Hiding Private Set Intersection,
    IACR Public Key Cryptography (PKC), 2011.

  43. Y. Lu and G. Tsudik,
    Enhancing Data Privacy in the Cloud,
    IFIP International Conference on Trust Management (IFIPTM), 2011.

  44. K. El Defrawy, S. Capkun and G. Tsudik,
    Group Distance Bounding Protocols,
    International Conference on Trust and Trustworthy Computing (TRUST), 2011.

  45. E. De Cristofaro, Y. Lu and G. Tsudik,
    Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information,
    International Conference on Trust and Trustworthy Computing (TRUST), 2011.

  46. A. Kobsa, R. Nithyanand, G. Tsudik and E. Uzun,
    Usability of Display-Equipped RFID Tags for Security Purposes,
    European Symposium on Research in Computer Security (ESORICS), 2011.

  47. P. Baldi, R. Baronio, E. De Cristofaro, P. Gasti and G. Tsudik,
    Countering GATTACA: Efficient and Secure Testing of Fully-Sequenced Human Genomes,
    ACM Computer and Communication Security Conference (CCS), 2011.

  48. K. El Defrawy and G. Tsudik,
    ALARM: Anonymous Location-Aided Routing in Suspicious MANETs,
    IEEE Transactions on Mobile Computing, Vol. 10, No. 9, September 2011.

  49. R. Di Pietro, C. Soriente, A. Spognardi and G. Tsudik,
    Intrusion-Resilient Integrity in Data-Centric Unattended WSNs,
    Pervasive and Mobile Computing, Vol. 7, No. 4, August 2011.

  50. R. Nithyanand, G. Tsudik and E. Uzun,
    User-aided Reader Revocation in PKI-Based RFID Systems,
    Journal of Computer Security, Vol. 19, No. 6, December 2011.

  51. K. El Defrawy and G. Tsudik,
    PRISM: Privacy-friendly Routing In Suspicious MANETs,
    IEEE JSAC, Special Issue on Advances in Military Communications and Networking, Vol. 29, No. 10, December 2011.

  52. Y. Lu and G. Tsudik,
    Privacy-Preserving Cloud Database Querying,
    Journal of Internet Services and Information Security (JISIS), Vol. 1 No. 4, November 2011.

    2010

  53. E. De Cristofaro and G. Tsudik,
    Practical Private Set Intersection Protocols,
    Financial Cryptography and Data Security Conference (FC), 2010.

  54. R. Di Pietro, G. Oligeri, C. Soriente and G. Tsudik
    Intrusion-Resilience in Mobile Unattended WSNs,
    IEEE INFOCOM, 2010.

  55. C. Catellucia, K. El Defrawy and G. Tsudik
    Link-Layer Encryption Effect on the Capacity of Network Coding in Wireless Networks,
    IEEE INFOCOM WiP Session, 2010.

  56. D. Ma and G. Tsudik
    IRRES: Intrusion Resilient Remote Email Storage,
    ICDCS Workshop on Security and Privacy in Cloud Computing (SPCC), 2010.

  57. M. Manulis, B. Poettering and G. Tsudik
    Affiliation-Hiding Key Exchange with Untrusted Group Authorities,
    Applied Cryptography and Network Security (ACNS), 2010.

  58. M. Manulis, B. Poettering and G. Tsudik
    Taming Big Brother Ambitions: More Privacy for Secret Handshakes,
    Privacy Enhancing Technologies Symposium (PETS), 2010.

  59. R. Nithyanand, N. Saxena, G. Tsudik and E. Uzun
    Groupthink: On the Usability of Secure Group Association of Wireless Devices,
    ACM International Conference on Ubiquitous Computing (UBICOMP), 2010.

  60. R. Nithyanand, G. Tsudik and E. Uzun
    Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems,
    European Symposium on Research in Computer Security (ESORICS), 2010.

  61. D. Perito and G. Tsudik
    Secure Code Update for Embedded Devices via Proofs of Secure Erasure,
    European Symposium on Research in Computer Security (ESORICS), 2010.

  62. Y. Lu and G. Tsudik
    Towards Plugging Privacy Leaks in Domain Name System,
    IEEE International Conference on Peer-to-Peer Computing (P2P), 2010.

  63. R. Di Pietro, G. Oligeri, C. Soriente and G. Tsudik
    Securing Mobile Unattended WSNs against a Mobile Adversary,
    IEEE Symposium on Reliable Distributed Systems (SRDS), 2010.

  64. E. De Cristofaro, J. Kim and G. Tsudik
    Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model,
    IACR ASIACRYPT, 2010.

  65. C. Badea, M. Cesarano, A. Nicolau, G. Tsudik and A. Veidenbaum
    Leveraging Virtualization Towards Improving Cloud Security for Compute-Intensive Applications,
    International Conference on Cloud Computing (CloudComp), 2010.

  66. S. Jarecki, J. Kim and G. Tsudik,
    Flexible Robust Group Key Agreement,
    IEEE Transactions on Parallel and Distributed Systems, to appear in 2010.

  67. D. Ma and G. Tsudik,
    Security and Privacy in Emerging Wireless Networks,
    IEEE Wireless Communications, to appear in October 2010.

  68. K. El Defrawy and G. Tsudik
    ALARM: Anonymous Location-Aided Routing in Suspicious MANETs,
    IEEE Transactions on Mobile Computing, to appear in 2011.

    2009

  69. E. De Cristofaro, X.Ding and G.Tsudik
    Privacy-Preserving Querying in Sensor Networks,
    IEEE Conference on Computer Communications and Networks (ICCCN), 2009.

  70. F. Massacci, G. Tsudik and A. Yautsiukhin
    Extended Abstract: Logging Key Assurance Indicators in an Enterprise,
    ACM Symposium on Information, Computer & Communication Security (ASIACCS), 2009.

  71. A. Kumar, N. Saxena, G. Tsudik and E. Uzun
    Caveat Emptor: A Comparative Study of Secure Device Pairing Methods,
    IEEE Conference on Pervasive Computing and Communications (PERCOM), 2009.

  72. R. Di Pietro, C. Soriente, A. Spognardi and G. Tsudik
    Intrusion-Resilience via Collaborative Authentication in Unattended WSNs,
    ACM Conference on Wireless Network Security (WiSec), 2009.

  73. K. El Defrawy, J. Solis and G. Tsudik
    Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks,
    IEEE Computer Software and Applications Conference (COMPSAC), 2009.

  74. E. De Cristofaro, S. Jarecki, J. Kim and G. Tsudik
    Privacy-Preserving Policy-based Information Transfer,
    Privacy Enhancing Technologies Symposium (PETS), 2009.

  75. A. Kobsa, R. Sonawalla, G. Tsudik, E. Uzun and Y. Wang
    Serial Hook-Ups: A Comparative Usability Study of Secure Device Pairing Methods,
    Symposium On Usable Privacy and Security (SOUPS), 2009.

  76. N. Saxena, G. Tsudik and J. Yi
    Efficient Node Admission and Certificate-less Secure Communication in Short-Lived MANETs,
    IEEE Transactions on Parallel and Distributed Systems, Vol. 20, No. 2. 2009.

  77. M. Goodrich, M. Sirivianos, J. Solis, C. Soriente, G. Tsudik and E. Uzun
    Loud and Clear: Human-Verifiable Authentication Based on Audio,
    International Journal of Security and Networks, Vol. 4, No. 1, 2009.

  78. C. Soriente, G. Tsudik and E. Uzun
    Secure Pairing of Interface-Constrained Devices,
    International Journal of Security and Networks, Vol. 4, No. 1, 2009.

  79. M. Narasimha, J. Solis and G. Tsudik
    Privacy-Preserving Revocation Checking,
    International Journal of Information Security, Vol. 8, No. 1, 2009.

  80. A. Chan, C. Castelluccia, E. Mykletun and G. Tsudik
    Efficient and Provably Secure Aggregation of Encrypted Data in WSN-s,
    ACM Transactions on Sensor Networks, Vol. 5, No. 3., 2009.

  81. X. Ding, G. Tsudik and S. Xu
    Leak-Free Group Signatures: Definitions and Construction,
    Journal of Computer Security, Vol. 17, No. 4, 2009.

  82. J. Kim and G. Tsudik
    SRDP: Secure Route Discovery for Dynamic Source Routing in MANETs,
    Ad Hoc Networks, Vol. 7, No. 6, 2009.

  83. D. Ma and G. Tsudik
    A New Approach to Secure Logging,
    ACM Transactions on Storage, Vol. 5, No. 1, 2009.

  84. M. Burmester, T. Van Le, B. de Medeiros and G. Tsudik
    Universally Composable RFID Identification and Authentication Protocols,
    ACM Transactions on Information Systems Security, Vol. 12, No. 4, 2009.

  85. R. Di Pietro, L. Mancini, C. Soriente, A. Spognardi and G. Tsudik
    Data Security in Unattended Wireless Sensor Networks,
    IEEE Transactions on Computers, Special Issue on Autonomic Network Computing, Vol. 7, No. 8, 2009.

  86. D. Ma, C. Soriente and G. Tsudik
    New Adversary and New Threats in Unattended Sensors Networks,
    IEEE Network, Vol. 23 No. 2, 2009.

  87. R. Di Pietro, L. Mancini, C. Soriente, A. Spognardi and G. Tsudik,
    Maximizing Data Survival in Unattended Wireless Sensor Networks against a Focused Mobile Adversary,
    Ad Hoc Networks, Vol. 7, No. 8, 2009.

  88. G. Ateniese, J. Camenisch, M. Joye and G. Tsudik,
    Remarks on "Analysis of One Popular Group Signature Scheme" in Asiacrypt 2006,
    Journal of Applied Cryptography, Vol. 1, No. 4, 2009.

  89. A. Kumar, N. Saxena, G. Tsudik and E. Uzun,
    A Comparative Study of Secure Device Pairing Methods,
    Pervasive and Mobile Computing, Vol. 5, No. 6, 2009.

    2008:

  90. D. Ma and G. Tsudik
    A New Approach to Secure Logging,
    IFIP WG11.3 Working Conference on Data and Applications Security (DBSec), 2008.

  91. C. Soriente, G. Tsudik and E. Uzun
    HAPADEP: Human-Assisted Pure Audio Device Pairing,
    Information Security Conference (ISC), 2008.

  92. G. Ateniese, R. Di Pietro, L. Mancini and G. Tsudik
    Scalable and Efficient Provable Data Possession,
    Conference on Security and Privacy in Communication Networks (Securecomm), 2008.

  93. R. Di Pietro, D. Ma, C. Soriente and G. Tsudik
    POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks,
    IEEE Symposium on Reliable Distributed Systems (SRDS), 2008.

  94. K. Eldefrawy and G. Tsudik
    PRISM: Private Routing In Suspicious MANETs,
    IEEE International Conference on Network Protocols (ICNP), 2008.

  95. D. Ma and G. Tsudik,
    DISH: Distributed Self-Healing (in Unattended Sensor Networks)
    Symposium on Stabilization, Safety and Security of Distributed Systems (SSS), 2008.

  96. J. Kim and G. Tsudik
    Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks,
    International Conference on Information Security and Cryptology (ICISC), 2008.

  97. R. di Pietro, L. Mancini, C.Soriente, A. Spognardi and G. Tsudik
    Catch Me (If You Can): Data Survival in Unattended Sensor Networks,
    IEEE International Conference on Pervasive Computing and Communications (PERCOM), 2008.
    dmsst08.pdf

  98. S. Jarecki, J. Kim and G. Tsudik
    Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Agreement,
    RSA Conference, Cryptographers' Track (CT-RSA), 2008.
    jkt08.pdf

    2007:

  99. S. Jarecki, J. Kim and G. Tsudik
    Group Secret Handshakes or Affiliation-Hiding Authenticated Group Key Agreement,
    RSA Conference, Cryptographers' Track (CT-RSA), 2007.
    jkt07.pdf

  100. D. Ma and G. Tsudik
    Forward-Secure Aggregate Authentication,
    IEEE Symposium on Research in Security and Privacy (S&P), 2007.
    mt07.pdf

  101. K. Eldefrawy and G. Tsudik
    ALARM: Anonymous Location-Aided Routing in MANETs,
    IEEE International Conference on Network Protocols (ICNP), 2007.
    alarm07.pdf

  102. S. Jarecki, J. Kim and G. Tsudik
    Robust Group Key Agreement using Short Broadcasts,
    ACM Computer and Communication Security Conference (CCS), 2007.
    rbd07.pdf

  103. G. Tsudik,
    A Family of Dunces: Trivial RFID Identification and Authentication Protocols,
    Symposium on Privacy-Enhancing Technologies (PET'07), 2007.
    t07.pdf

  104. M. Narasimha and G. Tsudik
    Privacy-Preserving Revocation Checking with Modified CRLs,
    European PKI Workshop: Theory and Practice (EuroPKI), 2007.

  105. K. Eldefrawy, M. El Zarki and G. Tsudik, Incentive-Based Cooperative and Secure Inter-Personal Networking,
    ACM Workshop on Mobile Opportunistic Networking (MobiOpp), 2007.
    ezt07.pdf

  106. X. Ding, D. Mazzocchi and G. Tsudik
    Equipping "Smart" Devices With Public Key Signatures,
    ACM Transactions on Internet Technology, Vol. 7, No. 1, February 2007.
    DMT07.pdf

  107. N. Saxena, G. Tsudik and J. Yi
    Threshold Cryptography in P2P and MANETs: the Case of Access Control,
    Computer Networks, Vol. 51, No. 13, August 2007, pp. 3632-3649.
    COMPNW3557.pdf

    2006:

  108. M. Goodrich, M. Sirivianos, J. Solis, G. Tsudik and E. Uzun
    Loud And Clear: Human Verifiable Authentication Based on Audio,
    IEEE ICDCS'06, 2006.
    gsstu.pdf

  109. S. Jarecki, J. Kim and G. Tsudik
    Authentication for Paranoids: Multi-Party Secret Handshakes
    ACNS'06, 2006.
    jkt06.pdf

  110. E. Mykletun and G. Tsudik
    Aggregation Queries in the Database-As-a-Service Model
    IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC), 2006.
    mt06.pdf

  111. G. Tsudik
    YA-TRAP: Yet Another Trivial RFID Authentication Protocol (WiP paper)
    IEEE PerCom, 2006.
    t-2006.pdf

  112. M. Narasimha and G. Tsudik
    Authentication of Outsourced Databases using Signature Aggregation and Chaining
    International Conference on Database Systems for Advanced Applications (DASFAA), 2006.
    nt-2006.pdf

  113. C. Castelluccia, E. Mykletun and G. Tsudik
    Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes
    ACM AsiaCCS, 2006.
    cmt-2006.pdf

  114. J. Solis and G. Tsudik
    Simple and Flexible Private Revocation Checking
    Privacy-Enhancing Technologies (PETS), 2006.
    st-2006.pdf

  115. G. Tsudik and S. Xu
    A Flexible Framework for Secret Handshakes
    Privacy-Enhancing Technologies (PETS), 2006.
    tx-2006.pdf

  116. X. Li, G. Tsudik and X. Yang
    A Technical Approach to Net Neutrality
    ACM Workshop on Hot Topics in Networks (Hotnets-V), 2006.
    lty-2006.pdf

  117. M. Narasimha, E. Mykletun and G. Tsudik
    Authentication and Integrity in Outsourced Databases,
    ACM Transactions on Storage, , Vol. 2, No. 2, May 2006. pp. 107-138.
    NMT06.pdf

  118. C. Castelluccia, S. Jarecki, J. Kim and G. Tsudik
    Secure Acknowledgement Aggregation and Multisignatures with Limited Robustness,
    Computer Networks, Vol. 50, No. 10, July 2006, pp. 1639-1652.
    scn04-journal.ps.gz

  119. K. Obraczka, G. Tsudik and K. Viswanath
    Exploring Mesh- and Tree-Based Multicast Routing Protocols for MANETs,
    IEEE Transactions on Mobile Computing, Vol. 5, No. 1, pp. 28-42, January 2006.
    tmc-2005.ps.gz

    2005:

  120. E. Mykletun and G. Tsudik
    On using Secure Hardware in Outsourced Databases
    International Workshop on Innovative Architecture for Future Generation High-Performance Processors and Systems (IWIA), 2005.
    iwia-2005.pdf

  121. C. Castelluccia, E. Mykletun and G. Tsudik,
    Efficient Aggregation of Encrypted Data in Wireless Sensor Networks
    IEEE Mobiquitous, 2005.
    mobiq-2005.pdf

  122. J. Kim and G. Tsudik,
    Securing Route Discovery in DSR
    IEEE Mobiquitous, 2005.
    sdsr-2005.pdf

  123. G. Tsudik and S. Xu,
    A Flexible Framework for Secret Handshakes (Short Paper / Brief Announcement)
    ACM Conference on Principles of Distributed Computing (PODC), 2005.
    podc-2005.pdf

  124. G. Ateniese, D. Chou, B. de Medeiros and G. Tsudik,
    Sanitizable Signatures
    European Symposium on Research in Computer Security (ESORICS), 2005.
    esorics-2005.pdf

  125. N. Saxena, G. Tsudik and J. Yi
    Efficient Node Admission for Short-lived Mobile Ad Hoc Networks
    IEEE International Conference on Network Protocols (ICNP), 2005.
    icnp-2005.pdf

  126. M. Narasimha and G. Tsudik
    DSAC: Integrity of Outsourced Databases with Signature Aggregation and Chaining (Short Paper/Poster)
    ACM Conference on Information and Knowledge Management (CIKM), 2005.
    cikm-2005.pdf

  127. Y. Amir, C. Nita-Rotaru, J. Stanton and G. Tsudik
    Secure Spread: An Integrated Architecture for Secure Group Communication,
    IEEE Transaction on Dependable and Secure Computing Systems, Vol. 2, No. 3, July-September 2005.
    TDSC-0113-0704.pdf

    2004:

  128. B. Hore, S. Mehrotra and G. Tsudik
    A Privacy-Preserving Index for Range Queries
    International Conference on Very Large Databases (VLDB), August 2004.
    vldb-2004.pdf

  129. E. Mykletun, M. Narasimha and G. Tsudik
    Signature "Bouquets": Immutability of Aggregated Signatures
    European Symposium on Research in Computer Security (ESORICS), 2004.
    esorics-2004.pdf

  130. C. Castelluccia, S. Jarecki and G. Tsudik
    Secret Handshakes from CA-oblivious Encryption
    IACR ASIACRYPT, 2004.
    asiacrypt-2004.pdf

  131. C. Castelluccia, S. Jarecki and G. Tsudik
    Verifiable and Secure Acknowledgement Aggregation
    Security in Computer Networks Conference (SCN), 2004.
    scn-2004.pdf

  132. C. Castelluccia, S. Jarecki and G. Tsudik
    Secret Handshakes from CA-oblivious Encryption (Short paper)
    ACM Conference on Principles of Distributed Computing (PODC), 2004.
    podc-2004.pdf

  133. N. Saxena, G. Tsudik and J. Yi
    Identity-based Access Control for Ad Hoc Groups
    International Conference on Information Security and Cryptology (ICISC'04), December 2004.
    icisc-2004.pdf

  134. S. Mehrotra, E. Mykletun, G. Tsudik and Y. Wu
    A Framework for Efficient Storage Security in RDBMS
    International Conference on Extending Database Technology (EDBT), 2004.
    edbt.pdf

  135. E. Mykletun, M. Narasimha and G. Tsudik
    Authentication and Integrity in Outsourced Databases
    Symposium on Network and Distributed Systems Security (NDSS), 2004.
    ndss-2004.pdf

  136. X. Ding, G. Tsudik and S. Xu
    Leak-Free Mediated Group Signatures
    IEEE ICDCS, 2004.
    icdcs-2004.pdf

  137. N. Saxena, G. Tsudik and J. Yi
    Access Control Mechanisms for Ad Hoc Networks
    IEEE Workshop on Hot Topics in Peer-to-Peer (HOT-P2P'04), 2004.
    p2p-2004.pdf

  138. K. Bicakci, G. Tsudik and B. Tung
    On Constructing Optimal One-Time Signatures,
    Computer Networks, Vol. 43, No. 3, pp. 339-349, October 2003.
    comnet-2003.pdf

  139. Y. Kim, F. Maino, M. Narasimha, K. Rhee and G. Tsudik
    Secure Group Services for Storage-Area Networks,
    IEEE Communications, Vol. 41, No. 8, August 2003.
    kmnrt04.pdf

  140. K. Rhee, Y. Park and G. Tsudik
    A Group Key Management Architecture in Mobile Ad-hoc Wireless Networks,
    Journal Of Communication and Networks, Vol. 6, No. 2, pp. 156-162, June 2004.
    jcn-2004.pdf

  141. Y. Amir, Y. Kim, C. Nita-Rotaru and G. Tsudik
    On the Performance of Group Key Agreement Protocols
    ACM Transactions on Information Systems Security, Vol. 7, No. 3, pp. 457-488, August 2004.
    tissec-2004.pdf

  142. D. Boneh, X. Ding and G. Tsudik
    A Method for Fast Credentials Revocation,
    ACM Transactions on Internet Technology, vol. 4, No. 1, pp. 60-82, February 2004.
    bdt04.pdf

  143. Y. Kim, A. Perrig and G. Tsudik
    Communication-Efficient Group Key Agreement,
    IEEE Transactions on Computers, Vol. 53, No. 7, July 2004.
    kpt04.pdf

  144. Y. Amir, Y. Kim, C. Nita-Rotaru, J. Stanton, J. Schultz and G.Tsudik
    Secure Group Communication Using Robust Contributory Key Agreement,
    IEEE Transaction on Parallel and Distributed Systems, Vol. 15, No. 5, pp. 468-480, May 2004.
    aknsst04.pdf

  145. Y. Kim, A. Perrig and G. Tsudik
    Tree-Based Group Key Agreement,
    ACM Transactions on Information Systems Security, Vol. 7, No. 1, pp. 60-96, May 2004.
    kpt04a.pdf

    2003:

  146. G. Tsudik and S. Xu
    Accumulating Composites and Improved Group Signing
    IACR ASIACRYPT, 2003.
    tx03.ps.gz

  147. M. Narasimha, G. Tsudik and J. Yi,
    On the Utility of Distributed Cryptography in P2P Settings and MANETs
    IEEE International Conference on Network Protocols (ICNP), 2003.
    nty03.pdf

  148. X. Ding and G. Tsudik
    Simple Identity-Based Cryptography with Mediated RSA
    RSA Conference, Cryptographers' Track, 2003.
    bdt03.pdf

  149. Y. Amir, C. Nita-Rotaru, J. Stanton and G. Tsudik
    Scaling Secure Group Communications: Beyond Peer-to-Peer
    DARPA Information Security Conference and Exposition (DISCEX), 2003.
    anst03.pdf

  150. Y. Kim, D. Mazzocchi and G. Tsudik
    Admission Control in Collaborative Groups
    IEEE Symposium on Network Computing and Applications (NCA), 2003.
    kmt03.pdf

  151. N. Saxena, G. Tsudik and J. Yi
    Experimenting with Peer Group Admission Control
    Workshop on Advanced Developments in Software and Systems Security (WADIS), 2003.
    wadis-2003.pdf

  152. N. Saxena, G. Tsudik and J. Yi
    Admission Control in Peer-to-Peer: Design and Performance Evaluation
    ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), 2003.
    sty03.pdf

  153. Y. Kim and G. Tsudik
    Admission Control in Peer Groups
    NSF/NASA/DOE Workshop on New Directions on Scalable Cyber-Security, 2003.

    2002:

  154. G. Tsudik
    Weak Forward Security in Mediated RSA
    Security in Computer Networks Conference (SCN), 2002.
    t02.pdf

  155. G. Ateniese, D. Song and G. Tsudik
    Quasi-Efficient Revocation in Group Signatures
    Financial Cryptography (FC), 2002.
    ast02.pdf

  156. Y. Amir, Y. Kim, C. Nita-Rotaru, and G. Tsudik
    On the Performance of Group Key Agreement Protocols
    IEEE ICDCS, 2002.
    aknt02.pdf

  157. M. El Zarki, S. Mehrotra, G. Tsudik and N. Venkatasubramanian
    Security Issues in a Future Vehicular Network
    EuroWireless, 2002.
    zmtv02.pdf

  158. X. Ding, D. Mazzocchi and G. Tsudik
    Experimenting with Server-Aided Signatures
    Network and Distributed Systems Security Symposium (NDSS), 2002.
    dmt02.pdf

  159. Y. Park, K. Rhee and G. Tsudik
    Group Key Management in Hierarchical Ad-hoc Wireless Networks
    Workshop on Information Security Applications (WISA), 2002.
    prt02.pdf

  160. Y. Kim, F. Maino, M. Narasimha and G. Tsudik
    Secure Group Services for Storage-Area Networks
    IEEE International Workshop on Storage Security (IWSS), 2002.
    kmnt02.pdf

  161. Y. Kim, D. Mazzocchi and G. Tsudik
    Admission Control in Collaborative Groups,
    ACM Mobile Computing and Communications Review, Vol. 6, No. 4, October 2002.

    2001:

  162. D. Boneh, X. Ding, G. Tsudik and B. Wong
    Fast Revocation of Security Capabilities
    Usenix Security Symposium, 2001.
    bdtw.pdf

  163. D. Agarwal, O. Chevassut, M. Thompson and G. Tsudik
    An Integrated Solution for Secure Group Communication in Wide-Area Networks
    IEEE Symposium on Computers and Communications (ISCC), 2001.
    actt01.pdf

  164. Y. Kim. A. Perrig and G. Tsudik Communication-Efficient Group Key Agreement
    IFIP-SEC, 2001.
    kpt2001.pdf

  165. Y. Amir, Y. Kim, C. Nita-Rotaru, J. Schultz, J. Stanton and G. Tsudik
    Exploring Robustness in Group Key Agreement
    IEEE ICDCS, 2001.
    aknsst00.pdf

  166. K. Obraczka, G. Tsudik and K. Viswanath
    Pushing the Limit of Multicast in Ad Hoc Networks
    IEEE ICDCS, April 2001.
    otv2000.ps.gz

  167. K. Obraczka, G. Tsudik and K Viswanath
    Towards Reliable Multicast in Multi-Hop Ad Hoc Networks,
    ACM/Balzer Wireless Networks, Vol. 7, No. 6, 2001.
    hotv2000.ps.gz

    2000:

  168. Y. Kim. A. Perrig and G. Tsudik
    Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups
    ACM CCS, 2000.
    kpt2000.pdf

  169. G. Ateniese, J. Camenisch, M. Joye and G. Tsudik
    A Practical and Provably Secure Coalition-Resistant Group Signature Scheme
    IACR CRYPTO. 2000.
    acjt00.pdf

  170. Bicakci, B. Tung and G. Tsudik
    On Constructing Optimal One-Time Signatures
    International Symposium on Computer and Information Sciences (ISCIS), 2000.
    iscis-2000.pdf

  171. Y. Amir, G. Ateniese, D. Hasse, Y. Kim, C. Nita-Rotaru, T. Schlossnagle, J. Schultz, J. Stanton and G. Tsudik
    Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments
    IEEE ICDCS, 2000.
    aahknssst99.pdf

  172. G. Ateniese, O. Chevassut, D. Hasse, Y. Kim and G. Tsudik
    The Design of a Group Key Management API
    DARPA DISCEX, 2000.
    achkt99.ps.gz

  173. C. Landwehr, M. Reed, P. Syverson and G. Tsudik
    Towards and Analysis of Onion Routing Security
    Workshop on Design Issues in Anonymity and Unobservability, 2000.
    lrtst2000.ps.gz

  174. M. Bellare, J. Garay, R. Hauser, A. Herzberg, H. Krawczyk, M. Steiner, G. Tsudik, E. Van Herreweghen, and M. Waidner
    Design, Implementation and Deployment of a Secure Account-Based Electronic Payment System,
    IEEE JSAC, special issue on Secure Communication, May 2000.
    ikpj.pdf

  175. G. Ateniese, M. Steiner and G. Tsudik
    New Multi-party Authentication Services and Key Agreement Protocols,
    IEEE JSAC, special issue on Secure Communication, May 2000.
    ast99.ps.gz

  176. M. Steiner, G. Tsudik and M. Waidner
    Key Agreement in Dynamic Peer Groups,
    IEEE Transactions on Parallel and Distributed Systems, August 2000.
    stw99.ps.gz

  177. T. Hardjono and G. Tsudik
    IP Multicast Security: Issues and Directions,
    Annales de Telecom, 2000.
    ht99.ps.gz

    1999 and earlier:

  178. G. Ateniese and G. Tsudik
    Some Open Issues and New Directions in Group Signatures
    Financial Cryptography (FC), 1999.
    at98-2.ps.gz

  179. G. Ateniese and G. Tsudik
    Group Signatures a' la carte
    ACM Symposium on Discrete Algorithms (SODA), 1999.
    at98-1.ps.gz

  180. C. Ho, K. Obraczka, G. Tsudik and K. Viswanath
    Flooding for Reliable Multicast in Multi-Hop Ad Hoc Networks,
    ACM Workshop on Discrete Algorithms for Mobility (DIAL-M), 1999.
    hotv99.ps.gz

  181. G. Ateniese, M. Joye and G. Tsudik
    On the Difficulty of Coalition-Resistance in Group Signature Schemes
    Security in Computer Networks (SCN), 1999.
    ajt99.ps.gz

  182. R. Hauser, A. Przygienda and G. Tsudik
    Lowering Security Overhead in Link State Routing,
    Computer Networks and ISDN Systems, April 1999.
    hpt98.ps.gz

  183. G. Ateniese, A. Herzberg, H. Krawczyk and G. Tsudik
    Untraceable Mobility: On Travelling Incognito,
    Computer Networks and ISDN Systems, April 1999.
    hkt97.ps.gz

  184. I. Foster, C. Kesselman, G. Tsudik and S. Tuecke
    Security Architecture for Large-Scale Distributed Computations
    ACM Conference on Computer and Communications Security (CCS), 1998.
    fktt98.ps.gz

  185. G. Ateniese, M. Steiner and G. Tsudik
    Authenticated Group Key Agreement and Related Issues
    ACM Conference on Computer and Communications Security (CCS), 1998.
    ast98.ps.gz

  186. M. Franklin and G. Tsudik
    Secure Group Barter
    Financial Cryptography (FC), 1998.
    ft97.ps.gz

  187. M. Steiner, G. Tsudik and M. Waidner
    CLIQUES: A New Approach to Group Key Agreement
    IEEE ICDCS, 1998.
    stw97.ps.gz

  188. K. Obraczka and G. Tsudik
    Multicast Routing Issues in Ad Hoc Networks
    IEEE International Conference on Universal Personal Communication (ICUPC), 1998.
    ot98.ps.gz

  189. R. Molva and G. Tsudik
    Secret Sets and Applications,
    Information Processing Letters, Vol. 65, No. 1, pp. 47-55, 1998.
    mt96.ps.gz

  190. R. Hauser, A. Przygienda and G. Tsudik
    Reducing the Cost of Security in Link State Routing
    Symposium on Network and Distributed System Security (NDSS), 1997.
    hpt96.ps.gz

  191. N. Asokan, G. Tsudik and M. Waidner
    Server-Supported Signatures,
    Journal of Computer Security, November 1997.
    atw97.ps.gz

  192. J. Gray, A. Kshemkalyani, M. Matyas, M. Peyravian and G. Tsudik
    ATM Cell Encryption and Key Update Synchronization,
    Telecommunication Systems Journal, Vol. 7, No. 4, pp. 391-408, 1997.
    gkmpt96.ps.gz

  193. P. Janson, G. Tsudik and M. Yung
    Scalability and Flexibility in Authentication Services: The KryptoKnight Approach
    IEEE INFOCOM, 1997.
    jty94.ps.gz

  194. R. Hauser, A. Przygienda and G. Tsudik
    Low-cost Security in Link State Routing
    Security in Communication Networks, 1996.

  195. C. Gulcu and G. Tsudik
    Mixing E-mail with BABEL
    Symposium on Network and Distributed System Security (NDSS), 1996.
    gguts96.ps.gz

  196. N. Asokan, G. Tsudik and M. Waidner
    Server-Supported Signatures
    European Symposium on Research in Computer Security (ESORICS), 1996.
    atw96.ps.gz

  197. R. Hauser and G. Tsudik
    On Shopping Incognito
    USENIX Conference on Electronic Commerce, 1996.
    hats96.ps.gz

  198. M. Steiner, G. Tsudik and M. Waidner
    Diffie-Hellman Key Distribution Extended to Groups
    ACM Conference on Computer and Communications Security (CCS), 1996.
    stw96.ps.gz

  199. R. Hauser, P. Janson, R. Molva, G. Tsudik and E. Van Herreweghen,
    Robust and Secure Password/Key Change Method,
    Journal of Computer Security, November 1996.
    hjmtv96.ps.gz

  200. M. Bellare, R. Hauser, A. Herzberg, J. Garay, H. Krawczyk, M. Steiner, G. Tsudik and M. Waidner
    iKP -- A Family of Secure Electronic Payment Protocols
    USENIX Conference on Electronic Commerce, 1995.
    bhhgkstw95.ps.gz

  201. R. Molva, D. Samfat and G. Tsudik
    An Authentication Protocol for Mobile Users
    IEE Colloquium on Security and Cryptography Applications to Radio Systems, 1995

  202. D. Chess, B. Grosof, C. Harrison, D. Levine, C. Parris and G. Tsudik
    Itinerant Programs for Mobile Computing,
    IEEE Personal Communication Systems, September 1995.
    cghlpt95.ps.gz

  203. P. Janson and G. Tsudik
    Secure and Minimal Protocols for Authenticated Key Distribution
    Computer Communications Journal, September 1995.
    jt94.ps.gz

  204. R. Hauser, P. Janson, R. Molva, G. Tsudik and E. Van Herreweghen
    Robust and Secure Password/Key Change Method
    European Symposium on Research in Computer Security (ESORICS), 1994.
    hjmtv94.ps.gz

  205. A. Herzberg, H. Krawczyk and G. Tsudik
    On Travelling Incognito
    IEEE Workshop on Mobile Systems and Applications, 1994.
    hkt94.ps.gz

  206. R. Molva, D. Samfat and G. Tsudik
    Authentication of Mobile Users,
    IEEE Network, Special Issue on Mobile Communications, March/April 1994.
    mst94.ps.gz

  207. G. Tsudik and E. Van Herreweghen
    Some Remarks on Protecting Weak Secrets and Poorly-Chosen Keys from Guessing Attacks
    IEEE Symposium on Reliable Distributed Systems (SRDS), 1993.
    tv93a.ps.gz

  208. G. Tsudik and E. Van Herreweghen
    On Simple and Secure Key Distribution
    ACM Conference on Computer and Communications Security (CCS), 1993.
    tv93.ps.gz

  209. R. Molva and G. Tsudik
    Authentication Method with Impersonal Token Cards
    IEEE Symposium on Security and Privacy (S&P), 1993.
    mt93.ps.gz

  210. D. Estrin, M. Steenstrup and G. Tsudik
    Protocols for Route Establishment and Packet Forwarding Across Multi-Domain Internetworks
    ACM/IEEE Transactions on Networking, February 1993.

  211. G. Tsudik
    Policy Enforcement in Stub Autonomous Domains
    European Symposium on Research in Computer Security (ESORICS), 1992.
    t92a.ps.gz

  212. R. Molva, G. Tsudik, E. Van Herreweghen and S. Zatti
    KryptoKnight Authentication and Key Distribution System
    European Symposium on Research in Computer Security (ESORICS), 1992.
    mtvz92.ps.gz

  213. G. Tsudik
    Message Authentication with One-Way Hash Functions
    IEEE INFOCOM, 1992.
    t92.ps.gz

  214. R. Summers and G. Tsudik
    AudES: An Expert System for Security Auditing,
    Computer Security Journal Vol. 6, No. 1, June 1991.

  215. D. Estrin and G. Tsudik
    An End-to-End Argument for Network Layer Inter-Domain Access Controls,
    Journal of Internetworking: Research and Experience, June 1991.
    et91.ps.gz

  216. D. Estrin and G. Tsudik
    Secure Control of Transit Internetwork Traffic,
    Computer Networks and ISDN Systems, October 1991.

  217. R. Summers and G. Tsudik
    AudES: An Expert System for Security Auditing
    AAAI Conference on Innovative Applications in AI, 1990.
    st90.pdf

  218. D. Estrin, J. Mogul and G. Tsudik
    VISA Protocols for Controlling Inter-Organizational Datagram Flow
    IEEE Journal on Selected Areas in CommunicationsMay 1989.

  219. G. Tsudik
    Datagram Authentication in Internet Gateways
    IEEE Journal on Selected Areas in Communications, May 1989.

  220. D. Estrin and G. Tsudik
    Policy Enforcement in Interconnected Autonomous Networks
    DIMACS Workshop on Connections Between Distributed Computing and Cryptography, 1989.

  221. D. Estrin and G. Tsudik
    Security Issues in Policy Routing
    IEEE Symposium on Security and Privacy (S&P), 1989.
    et89.pdf

  222. D. Estrin and G. Tsudik
    VISA Scheme for Inter-Organizational Network Security
    IEEE Symposium on Security and Privacy (S&P), 1987.
    et87.pdf