Conference/Workshop Publications
2010
-
E. De Cristofaro and G. Tsudik,
Practical Private Set Intersection Protocols,
Financial Cryptography and Data Security Conference (FC), 2010.
-
R. Di Pietro, G. Oligeri, C. Soriente and G. Tsudik
Intrusion-Resilience in Mobile Unattended WSNs,
IEEE INFOCOM, 2010.
-
C. Catellucia, K. El Defrawy and G. Tsudik
Link-Layer Encryption Effect on the Capacity of Network Coding in Wireless Networks,
IEEE INFOCOM WiP Session, 2010.
-
D. Ma and G. Tsudik
IRRES: Intrusion Resilient Remote Email Storage,
ICDCS Workshop on Security and Privacy in Cloud Computing (SPCC), 2010.
-
M. Manulis, B. Poettering and G. Tsudik
Affiliation-Hiding Key Exchange with Untrusted Group Authorities,
Applied Cryptography and Network Security (ACNS), 2010.
-
M. Manulis, B. Poettering and G. Tsudik
Taming Big Brother Ambitions: More Privacy for Secret Handshakes,
Privacy Enhancing Technologies Symposium (PETS), 2010.
-
R. Nithyanand, N. Saxena, G. Tsudik and E. Uzun
Groupthink: On the Usability of Secure Group Association of Wireless Devices,
ACM International Conference on Ubiquitous Computing (UBICOMP), 2010.
-
R. Nithyanand, G. Tsudik and E. Uzun
Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems,
European Symposium on Research in Computer Security (ESORICS), 2010.
-
D. Perito and G. Tsudik
Secure Code Update for Embedded Devices via Proofs of Secure Erasure,
European Symposium on Research in Computer Security (ESORICS), 2010.
-
Y. Lu and G. Tsudik
Towards Plugging Privacy Leaks in Domain Name System,
IEEE International Conference on Peer-to-Peer Computing (P2P), 2010.
-
R. Di Pietro, G. Oligeri, C. Soriente and G. Tsudik
Securing Mobile Unattended WSNs against a Mobile Adversary,
IEEE Symposium on Reliable Distributed Systems (SRDS), 2010.
-
E. De Cristofaro, J. Kim and G. Tsudik
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model,
IACR ASIACRYPT, 2010.
-
C. Badea, M. Cesarano, A. Nicolau, G. Tsudik and A. Veidenbaum
Leveraging Virtualization Towards Improving Cloud Security for Compute-Intensive Applications,
International Conference on Cloud Computing (CloudComp), 2010.
2009
-
E. De Cristofaro, X.Ding and G.Tsudik
Privacy-Preserving Querying in Sensor Networks,
IEEE Conference on Computer Communications and Networks (ICCCN), 2009.
-
F. Massacci, G. Tsudik and A. Yautsiukhin
Extended Abstract: Logging Key Assurance Indicators in an Enterprise,
ACM Symposium on Information, Computer & Communication Security (ASIACCS), 2009.
-
A. Kumar, N. Saxena, G. Tsudik and E. Uzun
Caveat Emptor: A Comparative Study of Secure Device Pairing Methods,
IEEE Conference on Pervasive Computing and Communications (PERCOM), 2009.
-
R. Di Pietro, C. Soriente, A. Spognardi and G. Tsudik
Intrusion-Resilience via Collaborative Authentication in Unattended WSNs,
ACM Conference on Wireless Network Security (WiSec), 2009.
-
K. El Defrawy, J. Solis and G. Tsudik
Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks,
IEEE Computer Software and Applications Conference (COMPSAC), 2009.
-
E. De Cristofaro, S. Jarecki, J. Kim and G. Tsudik
Privacy-Preserving Policy-based Information Transfer,
Privacy Enhancing Technologies Symposium (PETS), 2009.
-
A. Kobsa, R. Sonawalla, G. Tsudik, E. Uzun and Y. Wang
Serial Hook-Ups: A Comparative Usability Study of Secure Device Pairing Methods,
Symposium On Usable Privacy and Security (SOUPS), 2009.
2008:
-
D. Ma and G. Tsudik
A New Approach to Secure Logging,
IFIP WG11.3 Working Conference on Data and Applications Security (DBSec), 2008.
-
C. Soriente, G. Tsudik and E. Uzun
HAPADEP: Human-Assisted Pure Audio Device Pairing,
Information Security Conference (ISC), 2008.
-
G. Ateniese, R. Di Pietro, L. Mancini and G. Tsudik
Scalable and Efficient Provable Data Possession,
Conference on Security and Privacy in Communication Networks (Securecomm), 2008.
-
R. Di Pietro, D. Ma, C. Soriente and G. Tsudik
POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks,
IEEE Symposium on Reliable Distributed Systems (SRDS), 2008.
-
K. Eldefrawy and G. Tsudik
PRISM: Private Routing In Suspicious MANETs,
IEEE International Conference on Network Protocols (ICNP), 2008.
-
D. Ma and G. Tsudik,
DISH: Distributed Self-Healing (in Unattended Sensor Networks)
Symposium on Stabilization, Safety and Security of Distributed Systems (SSS), 2008.
-
J. Kim and G. Tsudik
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks,
International Conference on Information Security and Cryptology (ICISC), 2008.
-
R. di Pietro, L. Mancini, C.Soriente, A. Spognardi and G. Tsudik
Catch Me (If You Can): Data Survival in Unattended Sensor Networks,
IEEE International Conference on Pervasive Computing and Communications (PERCOM), 2008.
dmsst08.pdf
-
S. Jarecki, J. Kim and G. Tsudik
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Agreement,
RSA Conference, Cryptographers' Track (CT-RSA), 2008.
jkt08.pdf
2007:
-
S. Jarecki, J. Kim and G. Tsudik
Group Secret Handshakes or Affiliation-Hiding Authenticated Group Key Agreement,
RSA Conference, Cryptographers' Track (CT-RSA), 2007.
jkt07.pdf
-
D. Ma and G. Tsudik
Forward-Secure Aggregate Authentication,
IEEE Symposium on Research in Security and Privacy (S&P), 2007.
mt07.pdf
-
K. Eldefrawy and G. Tsudik
ALARM: Anonymous Location-Aided Routing in MANETs,
IEEE International Conference on Network Protocols (ICNP), 2007.
alarm07.pdf
-
S. Jarecki, J. Kim and G. Tsudik
Robust Group Key Agreement using Short Broadcasts,
ACM Computer and Communication Security Conference (CCS), 2007.
rbd07.pdf
-
G. Tsudik,
A Family of Dunces: Trivial RFID Identification and Authentication Protocols,
Symposium on Privacy-Enhancing Technologies (PET'07), 2007.
t07.pdf
-
M. Narasimha and G. Tsudik
Privacy-Preserving Revocation Checking with Modified CRLs,
European PKI Workshop: Theory and Practice (EuroPKI), 2007.
2006:
-
M. Goodrich, M. Sirivianos, J. Solis, G. Tsudik and E. Uzun
Loud And Clear: Human Verifiable Authentication Based on Audio,
IEEE ICDCS'06, 2006.
gsstu.pdf
-
S. Jarecki, J. Kim and G. Tsudik
Authentication for Paranoids: Multi-Party Secret Handshakes
ACNS'06, 2006.
jkt06.pdf
-
E. Mykletun and G. Tsudik
Aggregation Queries in the Database-As-a-Service Model
IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC), 2006.
mt06.pdf
-
G. Tsudik
YA-TRAP: Yet Another Trivial RFID Authentication Protocol (WiP paper)
IEEE PerCom, 2006.
t-2006.pdf
-
M. Narasimha and G. Tsudik
Authentication of Outsourced Databases using Signature Aggregation and Chaining
International Conference on Database Systems for Advanced Applications (DASFAA), 2006.
nt-2006.pdf
-
C. Castelluccia, E. Mykletun and G. Tsudik
Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes
ACM AsiaCCS, 2006.
cmt-2006.pdf
-
J. Solis and G. Tsudik
Simple and Flexible Private Revocation Checking
Privacy-Enhancing Technologies (PETS), 2006.
st-2006.pdf
-
G. Tsudik and S. Xu
A Flexible Framework for Secret Handshakes
Privacy-Enhancing Technologies (PETS), 2006.
tx-2006.pdf
-
X. Li, G. Tsudik and X. Yang
A Technical Approach to Net Neutrality
ACM Workshop on Hot Topics in Networks (Hotnets-V), 2006.
lty-2006.pdf
2005:
-
E. Mykletun and G. Tsudik
On using Secure Hardware in Outsourced Databases
International Workshop on Innovative Architecture for Future Generation High-Performance Processors and
Systems (IWIA), 2005.
iwia-2005.pdf
-
C. Castelluccia, E. Mykletun and G. Tsudik,
Efficient Aggregation of Encrypted Data in Wireless Sensor Networks
IEEE Mobiquitous, 2005.
mobiq-2005.pdf
-
J. Kim and G. Tsudik,
Securing Route Discovery in DSR
IEEE Mobiquitous, 2005.
sdsr-2005.pdf
-
G. Tsudik and S. Xu,
A Flexible Framework for Secret Handshakes (Short Paper / Brief Announcement)
ACM Conference on Principles of Distributed Computing (PODC), 2005.
podc-2005.pdf
-
G. Ateniese, D. Chou, B. de Medeiros and G. Tsudik,
Sanitizable Signatures
European Symposium on Research in Computer Security (ESORICS), 2005.
esorics-2005.pdf
-
N. Saxena, G. Tsudik and J. Yi
Efficient Node Admission for Short-lived Mobile Ad Hoc Networks
IEEE International Conference on Network Protocols (ICNP), 2005.
icnp-2005.pdf
-
M. Narasimha and G. Tsudik
DSAC: Integrity of Outsourced Databases with Signature Aggregation and Chaining (Short Paper/Poster)
ACM Conference on Information and Knowledge Management (CIKM), 2005.
cikm-2005.pdf
2004:
-
B. Hore, S. Mehrotra and G. Tsudik
A Privacy-Preserving Index for Range Queries
International Conference on Very Large Databases (VLDB), August 2004.
vldb-2004.pdf
-
E. Mykletun, M. Narasimha and G. Tsudik
Signature "Bouquets": Immutability of Aggregated Signatures
European Symposium on Research in Computer Security (ESORICS), 2004.
esorics-2004.pdf
-
C. Castelluccia, S. Jarecki and G. Tsudik
Secret Handshakes from CA-oblivious Encryption
IACR ASIACRYPT, 2004.
asiacrypt-2004.pdf
-
C. Castelluccia, S. Jarecki and G. Tsudik
Verifiable and Secure Acknowledgement Aggregation
Security in Computer Networks Conference (SCN), 2004.
scn-2004.pdf
-
C. Castelluccia, S. Jarecki and G. Tsudik
Secret Handshakes from CA-oblivious Encryption (Short paper)
ACM Conference on Principles of Distributed Computing (PODC), 2004.
podc-2004.pdf
-
N. Saxena, G. Tsudik and J. Yi
Identity-based Access Control for Ad Hoc Groups
International Conference on Information Security and Cryptology (ICISC'04), December 2004.
icisc-2004.pdf
-
S. Mehrotra, E. Mykletun, G. Tsudik and Y. Wu
A Framework for Efficient Storage Security in RDBMS
International Conference on Extending Database Technology (EDBT), 2004.
edbt.pdf
-
E. Mykletun, M. Narasimha and G. Tsudik
Authentication and Integrity in Outsourced Databases
Symposium on Network and Distributed Systems Security (NDSS), 2004.
ndss-2004.pdf
-
X. Ding, G. Tsudik and S. Xu
Leak-Free Mediated Group Signatures
IEEE ICDCS, 2004.
icdcs-2004.pdf
-
N. Saxena, G. Tsudik and J. Yi
Access Control Mechanisms for Ad Hoc Networks
IEEE Workshop on Hot Topics in Peer-to-Peer (HOT-P2P'04), 2004.
p2p-2004.pdf
2003:
-
G. Tsudik and S. Xu
Accumulating Composites and Improved Group Signing
IACR ASIACRYPT, 2003.
tx03.ps.gz
-
M. Narasimha, G. Tsudik and J. Yi,
On the Utility of Distributed Cryptography in P2P Settings and MANETs
IEEE International Conference on Network Protocols (ICNP), 2003.
nty03.pdf
-
X. Ding and G. Tsudik
Simple Identity-Based Cryptography with Mediated RSA
RSA Conference, Cryptographers' Track, 2003.
bdt03.pdf
-
Y. Amir, C. Nita-Rotaru, J. Stanton and G. Tsudik
Scaling Secure Group Communications: Beyond Peer-to-Peer
DARPA Information Security Conference and Exposition (DISCEX), 2003.
anst03.pdf
-
Y. Kim, D. Mazzocchi and G. Tsudik
Admission Control in Collaborative Groups
IEEE Symposium on Network Computing and Applications (NCA), 2003.
kmt03.pdf
-
N. Saxena, G. Tsudik and J. Yi
Experimenting with Peer Group Admission Control
Workshop on Advanced Developments in Software and Systems Security (WADIS), 2003.
wadis-2003.pdf
-
N. Saxena, G. Tsudik and J. Yi
Admission Control in Peer-to-Peer: Design and Performance Evaluation
ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), 2003.
sty03.pdf
-
Y. Kim and G. Tsudik
Admission Control in Peer Groups
NSF/NASA/DOE Workshop on New Directions on Scalable Cyber-Security, 2003.
2002:
-
G. Tsudik
Weak Forward Security in Mediated RSA
Security in Computer Networks Conference (SCN), 2002.
t02.pdf
-
G. Ateniese, D. Song and G. Tsudik
Quasi-Efficient Revocation in Group Signatures
Financial Cryptography (FC), 2002.
ast02.pdf
-
Y. Amir, Y. Kim, C. Nita-Rotaru, and G. Tsudik
On the Performance of Group Key Agreement Protocols
IEEE ICDCS, 2002.
aknt02.pdf
-
M. El Zarki, S. Mehrotra, G. Tsudik and N. Venkatasubramanian
Security Issues in a Future Vehicular Network
EuroWireless, 2002.
zmtv02.pdf
-
X. Ding, D. Mazzocchi and G. Tsudik
Experimenting with Server-Aided Signatures
Network and Distributed Systems Security Symposium (NDSS), 2002.
dmt02.pdf
-
Y. Park, K. Rhee and G. Tsudik
Group Key Management in Hierarchical Ad-hoc Wireless Networks
Workshop on Information Security Applications (WISA), 2002.
prt02.pdf
-
Y. Kim, F. Maino, M. Narasimha and G. Tsudik
Secure Group Services for Storage-Area Networks
IEEE International Workshop on Storage Security (IWSS), 2002.
kmnt02.pdf
2001:
-
D. Boneh, X. Ding, G. Tsudik and B. Wong
Fast Revocation of Security Capabilities
Usenix Security Symposium, 2001.
bdtw.pdf
-
D. Agarwal, O. Chevassut, M. Thompson and G. Tsudik
An Integrated Solution for Secure Group Communication in Wide-Area Networks
IEEE Symposium on Computers and Communications (ISCC), 2001.
actt01.pdf
-
Y. Kim. A. Perrig and G. Tsudik Communication-Efficient Group Key Agreement
IFIP-SEC, 2001.
kpt2001.pdf
-
Y. Amir, Y. Kim, C. Nita-Rotaru, J. Schultz, J. Stanton and G. Tsudik
Exploring Robustness in Group Key Agreement
IEEE ICDCS, 2001.
aknsst00.pdf
-
K. Obraczka, G. Tsudik and K. Viswanath
Pushing the Limit of Multicast in Ad Hoc Networks
IEEE ICDCS, April 2001.
otv2000.ps.gz
2000:
-
Y. Kim. A. Perrig and G. Tsudik
Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups
ACM CCS, 2000.
kpt2000.pdf
-
G. Ateniese, J. Camenisch, M. Joye and G. Tsudik
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme
IACR CRYPTO. 2000.
acjt00.pdf
-
Bicakci, B. Tung and G. Tsudik
On Constructing Optimal One-Time Signatures
International Symposium on Computer and Information Sciences (ISCIS), 2000.
iscis-2000.pdf
-
Y. Amir, G. Ateniese, D. Hasse, Y. Kim, C. Nita-Rotaru, T. Schlossnagle, J. Schultz, J. Stanton and G. Tsudik
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments
IEEE ICDCS, 2000.
aahknssst99.pdf
-
G. Ateniese, O. Chevassut, D. Hasse, Y. Kim and G. Tsudik
The Design of a Group Key Management API
DARPA DISCEX, 2000.
achkt99.ps.gz
-
C. Landwehr, M. Reed, P. Syverson and G. Tsudik
Towards and Analysis of Onion Routing Security
Workshop on Design Issues in Anonymity and Unobservability, 2000.
lrtst2000.ps.gz
1999 and earlier:
-
G. Ateniese and G. Tsudik
Some Open Issues and New Directions in Group Signatures
Financial Cryptography (FC), 1999.
at98-2.ps.gz
-
G. Ateniese and G. Tsudik
Group Signatures a' la carte
ACM Symposium on Discrete Algorithms (SODA), 1999.
at98-1.ps.gz
-
C. Ho, K. Obraczka, G. Tsudik and K. Viswanath
Flooding for Reliable Multicast in Multi-Hop Ad Hoc Networks
ACM Workshop on Discrete Algorithms for Mobility (DIAL-M), 1999.
hotv99.ps.gz
-
G. Ateniese, M. Joye and G. Tsudik
On the Difficulty of Coalition-Resistance in Group Signature Schemes
Security in Computer Networks (SCN), 1999.
ajt99.ps.gz
-
I. Foster, C. Kesselman, G. Tsudik and S. Tuecke
Security Architecture for Large-Scale Distributed Computations
ACM Conference on Computer and Communications Security (CCS), 1998.
fktt98.ps.gz
-
G. Ateniese, M. Steiner and G. Tsudik
Authenticated Group Key Agreement and Related Issues
ACM Conference on Computer and Communications Security (CCS), 1998.
ast98.ps.gz
-
M. Franklin and G. Tsudik
Secure Group Barter
Financial Cryptography (FC), 1998.
ft97.ps.gz
-
M. Steiner, G. Tsudik and M. Waidner
CLIQUES: A New Approach to Group Key Agreement
IEEE ICDCS, 1998.
stw97.ps.gz
-
K. Obraczka and G. Tsudik
Multicast Routing Issues in Ad Hoc Networks
IEEE International Conference on Universal Personal Communication (ICUPC), 1998.
ot98.ps.gz
-
R. Hauser, A. Przygienda and G. Tsudik
Reducing the Cost of Security in Link State Routing
Symposium on Network and Distributed System Security (NDSS), 1997.
hpt96.ps.gz
-
P. Janson, G. Tsudik and M. Yung
Scalability and Flexibility in Authentication Services: The KryptoKnight Approach
IEEE INFOCOM, 1997.
jty94.ps.gz
-
R. Hauser, A. Przygienda and G. Tsudik
Low-cost Security in Link State Routing
Security in Communication Networks, 1996.
-
C. Gulcu and G. Tsudik
Mixing E-mail with BABEL
Symposium on Network and Distributed System Security (NDSS), 1996.
gguts96.ps.gz
-
N. Asokan, G. Tsudik and M. Waidner
Server-Supported Signatures
European Symposium on Research in Computer Security (ESORICS), 1996.
atw96.ps.gz
-
R. Hauser and G. Tsudik
On Shopping Incognito
USENIX Conference on Electronic Commerce, 1996.
hats96.ps.gz
-
M. Steiner, G. Tsudik and M. Waidner
Diffie-Hellman Key Distribution Extended to Groups
ACM Conference on Computer and Communications Security (CCS), 1996.
stw96.ps.gz
-
M. Bellare, R. Hauser, A. Herzberg, J. Garay, H. Krawczyk, M. Steiner, G. Tsudik and M. Waidner
iKP -- A Family of Secure Electronic Payment Protocols
USENIX Conference on Electronic Commerce, 1995. bhhgkstw95.ps.gz
bhhgkstw95.ps.gz
-
R. Molva, D. Samfat and G. Tsudik
An Authentication Protocol for Mobile Users
IEE Colloquium on Security and Cryptography Applications to Radio Systems, 1995
-
R. Hauser, P. Janson, R. Molva, G. Tsudik and E. Van Herreweghen
Robust and Secure Password/Key Change Method
European Symposium on Research in Computer Security (ESORICS), 1994.
hjmtv94.ps.gz
-
A. Herzberg, H. Krawczyk and G. Tsudik
On Travelling Incognito
IEEE Workshop on Mobile Systems and Applications, 1994.
hkt94.ps.gz
-
G. Tsudik and E. Van Herreweghen
Some Remarks on Protecting Weak Secrets and Poorly-Chosen Keys from Guessing Attacks
IEEE Symposium on Reliable Distributed Systems (SRDS), 1993.
tv93a.ps.gz
-
G. Tsudik and E. Van Herreweghen
On Simple and Secure Key Distribution
ACM Conference on Computer and Communications Security (CCS), 1993.
tv93.ps.gz
-
R. Molva and G. Tsudik
Authentication Method with Impersonal Token Cards
IEEE Symposium on Security and Privacy (S&P), 1993.
mt93.ps.gz
-
G. Tsudik
Policy Enforcement in Stub Autonomous Domains
European Symposium on Research in Computer Security (ESORICS), 1992.
t92a.ps.gz
-
R. Molva, G. Tsudik, E. Van Herreweghen and S. Zatti
KryptoKnight Authentication and Key Distribution System
European Symposium on Research in Computer Security (ESORICS), 1992.
mtvz92.ps.gz
-
G. Tsudik
Message Authentication with One-Way Hash Functions
IEEE INFOCOM, 1992.
t92.ps.gz
-
R. Summers and G. Tsudik
AudES: An Expert System for Security Auditing
AAAI Conference on Innovative Applications in AI, 1990.
st90.pdf
-
D. Estrin and G. Tsudik
Policy Enforcement in Interconnected Autonomous Networks
DIMACS Workshop on Connections Between Distributed Computing and Cryptography, 1989.
-
D. Estrin and G. Tsudik
Security Issues in Policy Routing
IEEE Symposium on Security and Privacy (S&P), 1989.
et89.pdf
-
D. Estrin and G. Tsudik
VISA Scheme for Inter-Organizational Network Security
IEEE Symposium on Security and Privacy (S&P), 1987.
et87.pdf