Publications of all sorts, shapes and sizes...
2018
-
M. Ambrosin, A. Compagno, M. Conti, C. Ghali and G. Tsudik,
Security and Privacy Analysis of Prominent Future Internet Architectures,
IEEE Communications Surveys and Tutorials, accepted; to appear in 2018.
fia-survey18.pdf
-
G. Acs, M. Conti, C. Ghali, P. Gasti, G. Tsudik and C. Wood,
Privacy-Aware Caching in Information-Centric Networking,
IEEE Transactions on Dependable and Secure Computing, accepted; to appear in 2018.
caching-tdsc18.pdf
-
X. Carpent, N. Rattanavipanon and G. Tsudik,
ERASMUS: Efficient Remote Attestation via Self-Measurements for Unattended Settings,
IEEE/ACM Design, Automation, and Test in Europe (DATE), 2018.
erasmus-date18.pdf
2017
-
I. Martinovic, K. Rasmussen, M. Roeschlin and G. Tsudik,
Authentication Using Pulse-Response Biometrics,
Communications of the ACM (CACM): Research Highlights, Vol. 60, No. 1, January 2017.
contatt-CACM16.pdf
-
G. Tsudik,
Authorship Integrity and Attacks,
IEEE Security & Privacy, Vol. 15, No. 4, July/August 2017.
authorship17.pdf
-
T. Bradley, X. Ding and G. Tsudik,
Genomic Security (Lest We Forget),
IEEE Security & Privacy, Vol. 50, No. 5, September/October 2017.
gen-sec17.pdf
-
B. Berg, T. Kaczmarek, A. Kobsa and G. Tsudik,
An Exploration of the Effects of Sensory Stimuli on the Completion of Security Tasks,
IEEE Security & Privacy, Vol. 50, No. 6, November/December 2017.
sensor17.pdf
-
X. Carpent, K. ElDefrawy, N. Rattanavipanon and G. Tsudik,
LIghtweight Swarm Attestation: A Tale of Two LISAs,
ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2017.
lisas-asiaccs17.pdf
-
A. Compagno, M. Conti, D. Lain and G. Tsudik,
Don’t Skype & Type! Acoustic Eavesdropping in Voice-Over-IP,
ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2017.
skype-asiaccs17.pdf
-
M. Conti, G. Lovisotto, I. Martinovic and G Tsudik,
FADEWICH: Fast Deauthentication over the Wireless Channel,
IEEE International Conference on Distributed Computing Systems (ICDCS), 2017.
fadewich-icdcs17.pdf
-
K. ElDefrawy, N. Rattanavipanon and G. Tsudik,
Fusing Hybrid Remote Attestation with a Formally Verified Microkernel: Lessons Learned,
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Industry Track, 2017.
hydra-dsn17.pdf
-
C. Ghali, G. Tsudik, E. Uzun and C. Wood,
Closing the Floodgates with Stateless Content-Centric Networking,
IEEE Conference on Computer Communications and Networks (ICCCN), 2017. Best Paper Award.
stateless-icccn17.pdf
-
K. ElDefrawy, N. Rattanavipanon and G. Tsudik,
HYDRA: HYbrid Design for Remote Attestation (Using a Formally Verified Microkernel),
ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSEC), 2017.
hydra-wisec17.pdf
-
B. Berg, T. Kaczmarek, A. Kobsa and G. Tsudik,
Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks,
Applied Cryptography and Network Security (ACNS), 2017.
visual-acns17.pdf
-
A. Compagno, M. Conti, D. Lain and G. Tsudik,
Skype & Type: Keystroke Leakage over VoIP,
BlackHat USA, 2017.
skype-bhat17.pdf
-
S. Jha, H. Tan and G. Tsudik,
MTRA: Multiple-Tier Remote Attestations in the Internet of Things,
IEEE Conference on Communications and Network Security (CNS), 2017.
mtra-cns17.pdf
-
I. Oliveira-Nunes, G. Tsudik and C. Wood,
Namespace Tunnels in Content-Centric Networks,
IEEE Conference on Local Computer Networks (LCN), 2017.
vpn-lcn17.pdf
-
C. Ghali, G. Tsudik and C. Wood,
Mitigating On-Path Adversaries in Content-Centric Networks,
IEEE Conference on Local Computer Networks (LCN), 2017.
onpath-lcn17.pdf
-
S. Mirzamohammadi, J. Chen, A. Amiri Sani, S. Mehrotra, and G. Tsudik,
Ditio: Trustworthy Auditing of Sensor Activities in Mobile & IoT Devices,
ACM Conference on Embedded Networked Sensor Systems (SenSys), 2017.
ditio-sensys17.pdf
-
C. Ghali, G. Tsudik and C. Wood,
When Encryption is Not Enough: Privacy Attacks in Content-Centric Networking,
ACM Conference on Information-Centric Networking (ICN), 2017.
ccnpriv-icn17.pdf
-
Z. Zhang, X. Ding, G. Tsudik, J. Cui and Z. Li,
Presence Attestation: The Missing Link In Dynamic Trust Bootstrapping,
ACM Conference on Computer and Communications Security (CCS), 2017.
pres-ccs17.pdf
-
X. Carpent, S. Faber, T. Sander and G. Tsudik,
Private Set Projections & Variants,
ACM Workshop on Privacy in the Electronic Society (WPES), 2017.
proj-wpes17.pdf
2016
-
G. Tsudik, E. Uzun, and C. Wood,
AC3N: An API and Service for Anonymous Communication in Content-Centric Networking,
IEEE Consumer Communications and Networking Conference (CCNC), 2016.
ac3n-ccnc16.pdf
-
G. Tsudik, E. Uzun, C. Wood and E. Yeh,
Practical Accounting in Content-Centric Networking,
IEEE/IFIP Network Operations and Management Symposium (NOMS), 2016.
acct-noms16.pdf
-
F. Brasser, K. Rasmussen, A. Sadeghi and G. Tsudik,
Low-End Device Attestation: the Prover's Perspective,
ACM Design Automation Conference (DAC), 2016.
prover-dac16.pdf
-
T. Abera, N. Asokan, L. Davi, F. Koushanfar, A. Paverd, A. Sadeghi and G. Tsudik,
INVITED: Things, Trouble, Trust: On Building Trust in IoT Systems,
ACM Design Automation Conference (DAC), 2016.
invited-dac16.pdf
-
C. Ghali, G. Tsudik and C. Wood.
BEAD: Best Effort Autonomous Deletion in Content-Centric Networking,
IFIP Networking Conference (NETWORKING), 2016.
bead-ifip16.pdf
-
A. Ibrahim, A. Sadeghi, G. Tsudik and S. Zeitouni,
DARPA: Device Attestation Resilient against Physical Attacks,
ACM Conference on Wireless Network Security (WiSEC), 2016.
darpa-wisec16.pdf
-
T. Bradley, S. Faber and G. Tsudik,
Bounded Size-Hiding Private Set Intersection,
Security and Cryptography for Networks (SCN), 2016.
bshipsi-scn16.pdf
-
G. Tsudik (aka Trotta Gnam),
Zero Knowledge Made Easy, So It Won't Make You Dizzy,
Security and Cryptography for Networks (SCN), 2016.
zk-scn16.pdf
-
C. Ghali, G. Tsudik and C. Wood,
Network Names in Content-Centric Networking: the Joys of Being Nameless,
ACM Conference on Information-Centric Networking (ICN), 2016.
nameless-icn16.pdf
-
T. Abera, N. Asokan, L. Davi, J. Ekberg T. Nyman, A. Paverd, A. Sadeghi and G. Tsudik,
C-FLAT: Control-FLow ATtestation for Embedded Systems Software,
ACM Conference on Computer and Communications Security (CCS), 2016.
cflat-ccs16.pdf
-
M. Almishari, E. Oguz and G. Tsudik,
Trilateral Large-Scale OSN Account Linkability Study,
AAAI Fall Symposium on Privacy and Language Technologies (PLT), 2016.
aaai-link16.pdf
-
I. Martinovic, K. Rasmussen, M. Roeschlin, I. Sluganovic and G. Tsudik,
Generating Secret Keys from Biometric Body Impedance Measurement,
ACM Workshop on Privacy in the Electronic Society (WPES), 2016.
imped-wpes16.pdf
-
C. Ghali, G. Tsudik and C. Wood,
(The Futility of) Data Privacy in Content-Centric Networking,
ACM Workshop on Privacy in the Electronic Society (WPES), 2016.
ccn-wpes16.pdf
2015
-
E. Ayday, E. De Cristofaro, JP Hubaux and G. Tsudik,
Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare?,
IEEE Computer, Vol 48, No. 2, February 2015.
WGS-Computer15.pdf
-
T. Kaczmarek, A. Kobsa, R. Sy and G. Tsudik,
An Unattended Study of Users Performing Security Critical Tasks Under Adversarial Noise,
NDSS Workshop on Usable Security (USEC), 2015.
noise-USEC15.pdf
-
A. Compagno, M. Conti, P. Gasti, L. Mancini and G. Tsudik,
Violating Consumer Anonymity: Geo-locating Nodes in Named Data Networking,
Applied Cryptography and Network Security (ACNS), 2015. Best Student Paper Award.
geoloc-ACNS15.pdf
-
K. El Defrawy, G. Holland and G. Tsudik,
Remote Attestation of Heterogeneous Cyber-Physical Systems: The Automotive Use Case,
Conference on Embedded Security in Cars (ESCAR), 2015.
attest-ESCAR15.pdf
-
A. Compagno, M. Conti, C. Ghali, G. Tsudik,
To NACK or not to NACK? Negative Acknowledgments in Information-Centric Networking,
IEEE Conference on Computer Communications and Networks (ICCCN), 2015.
ndn-nacks-ICCCN15.pdf
-
S. Faber, R. Petrlic and G. Tsudik,
UnLinked: Private Proximity-based Oline OSN Interaction,
ACM Workshop on Privacy in the Electronic Society (WPES), 2015.
unlinked-WPES15.pdf
-
C. Ghali, M. Schlosberg, G. Tsudik and C. Wood,
Interest-Based Access Control for Content Centric Networks,
ACM Conference on Information-Centric Networking (ICN), 2015.
ibac-ICN15.pdf
-
N. Asokan, F. Brasser, A. Ibrahim, A. Sadeghi, M. Schunter, G. Tsudik and C. Wachsmann,
SEDA: Scalable Embedded Device Attestation,
ACM Conference on Computer and Communications Security (CCS), 2015.
seda-CCS15.pdf
-
C. Ghali, A. Narayanan, D. Oran, G. Tsudik and C. Wood,
Secure Fragmentation for Content-Centric Networks,
IEEE Symposium on Network Computing and Applications (NCA), 2015. Best Paper Award.
frag-NCA15.pdf
2014
-
M. Almishari, P. Gasti, N. Nathan and G. Tsudik,
Optimizing Bi-Directional Low-Latency Communication in Named-Data Networking,
ACM Computer Communications Review, Vol. 44, No. 1, January 2014.
bidir-CCR14.pdf
-
C. Ghali, G. Tsudik and E. Uzun,
Elements of Trust in Named-Data Networking,
ACM Computer Communications Review, Vol. 44, No. 3, October 2014.
ndn-trust-CCR14.pdf
-
S. Ali, S. Jha, D. Ostry, V. Sivaraman and G. Tsudik,
Securing First-Hop Data Provenance for Bodyworn Devices using Wireless Link Fingerprints,
IEEE Transactions on Information Forensics and Security, Vol. 9, No. 12, September 2014.
prov-TIFS14.pdf
-
I. Martinovic, K. Rasmussen, M. Roeschlin and G. Tsudik,
Authentication Using Pulse-Response Biometrics,
ISOC Symposium on Network and Distributed System Security (NDSS), 2014. Distinguished Paper Award.
contatt-NDSS14.pdf
-
A. Francillon, Q. Nguyen, K. Rasmussen and G. Tsudik,
A Minimalist Approach to Remote Attestation,
IEEE/ACM Design, Automation, and Test in Europe (DATE), 2014.
minimal-DATE14.pdf
-
C. Ghali, G. Tsudik and E. Uzun,
Needle in a Haystack: Mitigating Content Poisoning in Named-Data Networking,
NDSS Workshop on Security of Emerging Networking Technologies (SENT), 2014.
needle-SENT14.pdf
-
M. Ambrosin, M. Conti, P. Gasti and G. Tsudik,
Covert Ephemeral Communication in Named Data Networking,
ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2014.
covert-ASIACCS14.pdf
-
J. Burke, P. Gasti, N. Nathan and G. Tsudik,
Secure Sensing over Named Data Networking,
IEEE Symposium on Network Computing and Applications (NCA), 2014.
ndn-sense-NCA14.pdf
-
M. Almishari, E. Oguz and G. Tsudik,
Fighting Authorship Linkability with Crowdsourcing,
ACM Conference on Online Social Networks (COSN), 2014.
crowd-COSN14.pdf
-
M. Almishari, E. Oguz, D. Kaafar and G. Tsudik,
Stylometric Linkability of Tweets,
ACM Workshop on Privacy in the Electronic Society (WPES), 2014.
tweet-WPES14.pdf
2013
-
R. Di Pietro, G. Oligeri, C. Soriente and G. Tsudik,
United We Stand: Intrusion-Resilience in Mobile Unattended WSNs,
IEEE Transactions on Mobile Computing, Vol. 12, No. 7, July 2013.
united-TMC13.pdf
-
A. Kobsa, R. Nithyanand, G. Tsudik and E. Uzun,
Can Jannie Verify: Usability of Display-Equipped RFID Tags for Security Purposes,
Journal of Computer Security, Vol. 21, No. 3, July 2013.
jannie-JCS13.pdf
-
J. Burke, P. Gasti, N. Nathan and G. Tsudik,
Securing Instrumented Environments over Content-Centric Networking,
IEEE Workshop on Emerging Design Choices in Name-Oriented Networking (NOMEN), 2013.
ndn-inst-NOMEN13.pdf
-
G. Acs, M. Conti, C. Ghali, P. Gasti and G. Tsudik,
Cache Privacy in Name-Data Networking,
IEEE International Conference on Distributed Computing Systems (ICDCS), 2013.
ndn-cache-ICDCS13.pdf
-
P. Gasti, G. Tsudik, E. Uzun and L. Zhang,
DoS & DDoS in Named Data Networking,
IEEE Conference on Computer Communications and Networks (ICCCN), 2013.
ndn-dos-ICCCN13.pdf
-
M. Almishari, P. Gasti, E. Oguz and G. Tsudik,
Privacy-Preserving Matching of Community-Contributed Content,
European Symposium on Research in Computer Security (ESORICS), 2013.
ppmcc-ESORICS13.pdf
-
A. Compagno, M. Conti, P. Gasti and G. Tsudik,
Poseidon: Mitigating Interest Flooding DDoS Attacks in Named Data
Networking, IEEE Local Computer Networks (LCN), 2013.
poseidon-LCN13.pdf
-
E. Ayday, E. De Cristofaro, JP Hubaux and G. Tsudik,
Privacy Considerations of Genome Sequencing,
USENIX Summit on Hot Topics in Security (HotSec) , 2013.
wgs-HOTSEC13.pdf
-
E. De Cristofaro, S. Faber, and G. Tsudik,
Secure Genomic Testing via Size- and Position-Hiding Private Substring Matching,
ACM Workshop on Privacy in the Electronic Society (WPES), 2013.
sphpsm-WPES13.pdf
2012
-
S. DiBenedetto, P. Gasti, G. Tsudik and E. Uzun,
ANDaNA: Anonymous Named Data Networking Application,
ISOC Symposium on Network and Distributed System Security (NDSS), 2012.
andana.pdf
-
K. Eldefrawy, A. Francillon, D. Perito and G. Tsudik,
SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust,
ISOC Symposium on Network and Distributed System Security (NDSS), 2012.
smart.pdf
-
E. De Cristofaro, C. Soriente and G. Tsudik,
Hummingbird: Privacy at the time of Twitter,
IEEE Symposium on Research in Security and Privacy (S&P), 2012.
hummingbird.pdf
-
E. De Cristofaro and G. Tsudik,
Experimenting with Fast Private Set Intersection,
International Conference on Trust and Trustworthy Computing (TRUST), 2012.
psi-TRUST12.pdf
-
Z. Erkin and G. Tsudik,
Private Computation of Spatial and Temporal Power Consumption with Smart Meters,
Applied Cryptography and Network Security (ACNS), 2012.
ACNS12.pdf
-
M. Almishari and G. Tsudik,
Exploring Linkability of Community Reviewing,
European Symposium on Research in Computer Security (ESORICS), 2012.
reviewlink.pdf
-
E. De Cristofaro, S. Faber, P. Gasti and G. Tsudik,
GenoDroid: Are Privacy-Preserving Genomic Tests Ready for Prime Time?,
ACM CCS Workshop on Privacy in the Electronic Society (WPES), 2012.
genodroid.pdf
-
E. De Cristofaro, P. Gasti and G. Tsudik,
Fast and Private Computation of Cardinality of Set Intersection and Union,
Conference on Cryptology and Network Security (CANS), 2012.
psi-ca.pdf
-
M. Conti, S. Das, C. Bisdikian, M. Kumar, L. Ni, A. Passarella, G. Roussos, G. Trster, G. Tsudik and F. Zambonelli,
Looking Ahead in Pervasive Computing: Challenges and Opportunities in the Era of Cyber-Physical Convergence,
Pervasive and Mobile Computing, Vol. 8, No. 12, February 2012.
-
R. Di Pietro, D. Ma, C. Soriente and G. Tsudik,
Self-Healing in Unattended Wireless Sensor Networks,
ACM Transactions on Sensor Networks, Vol. 9, No. 1, February 2012.
self-healing-TOSN12.pdf
-
J. Cheon, C. Lim and G. Tsudik,
Reducing RFID Reader Load with the Meet-in-the-Middle Strategy,
Journal of Communications and Networks, Vol. 14, No. 1, February 2012.
rfid-mitm-JCN12.pdf
-
M. Al Mishari, E. De Cristofaro, K. El Defrawy and G. Tsudik,
Harvesting SSL Certificate Data to Mitigate Web-Fraud,
International Journal of Network Security, Vol. 14, No. 6, 2012.
ssl-IJNS12.pdf
2011
-
G. Ateniese, E. De Cristofaro and G. Tsudik,
(If) Size Matters: Size-Hiding Private Set Intersection,
IACR Public Key Cryptography (PKC), 2011.
-
Y. Lu and G. Tsudik,
Enhancing Data Privacy in the Cloud,
IFIP International Conference on Trust Management (IFIPTM), 2011.
-
K. El Defrawy, S. Capkun and G. Tsudik,
Group Distance Bounding Protocols,
International Conference on Trust and Trustworthy Computing (TRUST), 2011.
-
E. De Cristofaro, Y. Lu and G. Tsudik,
Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information,
International Conference on Trust and Trustworthy Computing (TRUST), 2011.
-
A. Kobsa, R. Nithyanand, G. Tsudik and E. Uzun,
Usability of Display-Equipped RFID Tags for Security Purposes,
European Symposium on Research in Computer Security (ESORICS), 2011.
-
P. Baldi, R. Baronio, E. De Cristofaro, P. Gasti and G. Tsudik,
Countering GATTACA: Efficient and Secure Testing of Fully-Sequenced Human Genomes,
ACM Computer and Communication Security Conference (CCS), 2011.
-
K. El Defrawy and G. Tsudik,
ALARM: Anonymous Location-Aided Routing in Suspicious MANETs,
IEEE Transactions on Mobile Computing, Vol. 10, No. 9, September 2011.
-
R. Di Pietro, C. Soriente, A. Spognardi and G. Tsudik,
Intrusion-Resilient Integrity in Data-Centric Unattended WSNs,
Pervasive and Mobile Computing, Vol. 7, No. 4, August 2011.
-
R. Nithyanand, G. Tsudik and E. Uzun,
User-aided Reader Revocation in PKI-Based RFID Systems,
Journal of Computer Security, Vol. 19, No. 6, December 2011.
-
K. El Defrawy and G. Tsudik,
PRISM: Privacy-friendly Routing In Suspicious MANETs,
IEEE JSAC, Special Issue on Advances in Military Communications and Networking, Vol. 29, No. 10, December 2011.
-
Y. Lu and G. Tsudik,
Privacy-Preserving Cloud Database Querying,
Journal of Internet Services and Information Security (JISIS), Vol. 1 No. 4, November 2011.
2010
-
E. De Cristofaro and G. Tsudik,
Practical Private Set Intersection Protocols,
Financial Cryptography and Data Security Conference (FC), 2010.
-
R. Di Pietro, G. Oligeri, C. Soriente and G. Tsudik
Intrusion-Resilience in Mobile Unattended WSNs,
IEEE INFOCOM, 2010.
-
C. Catellucia, K. El Defrawy and G. Tsudik
Link-Layer Encryption Effect on the Capacity of Network Coding in Wireless Networks,
IEEE INFOCOM WiP Session, 2010.
-
D. Ma and G. Tsudik
IRRES: Intrusion Resilient Remote Email Storage,
ICDCS Workshop on Security and Privacy in Cloud Computing (SPCC), 2010.
-
M. Manulis, B. Poettering and G. Tsudik
Affiliation-Hiding Key Exchange with Untrusted Group Authorities,
Applied Cryptography and Network Security (ACNS), 2010.
-
M. Manulis, B. Poettering and G. Tsudik
Taming Big Brother Ambitions: More Privacy for Secret Handshakes,
Privacy Enhancing Technologies Symposium (PETS), 2010.
-
R. Nithyanand, N. Saxena, G. Tsudik and E. Uzun
Groupthink: On the Usability of Secure Group Association of Wireless Devices,
ACM International Conference on Ubiquitous Computing (UBICOMP), 2010.
-
R. Nithyanand, G. Tsudik and E. Uzun
Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems,
European Symposium on Research in Computer Security (ESORICS), 2010.
-
D. Perito and G. Tsudik
Secure Code Update for Embedded Devices via Proofs of Secure Erasure,
European Symposium on Research in Computer Security (ESORICS), 2010.
-
Y. Lu and G. Tsudik
Towards Plugging Privacy Leaks in Domain Name System,
IEEE International Conference on Peer-to-Peer Computing (P2P), 2010.
-
R. Di Pietro, G. Oligeri, C. Soriente and G. Tsudik
Securing Mobile Unattended WSNs against a Mobile Adversary,
IEEE Symposium on Reliable Distributed Systems (SRDS), 2010.
-
E. De Cristofaro, J. Kim and G. Tsudik
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model,
IACR ASIACRYPT, 2010.
-
C. Badea, M. Cesarano, A. Nicolau, G. Tsudik and A. Veidenbaum
Leveraging Virtualization Towards Improving Cloud Security for Compute-Intensive Applications,
International Conference on Cloud Computing (CloudComp), 2010.
-
S. Jarecki, J. Kim and G. Tsudik,
Flexible Robust Group Key Agreement,
IEEE Transactions on Parallel and Distributed Systems, to appear in 2010.
-
D. Ma and G. Tsudik,
Security and Privacy in Emerging Wireless Networks,
IEEE Wireless Communications, to appear in October 2010.
-
K. El Defrawy and G. Tsudik
ALARM: Anonymous Location-Aided Routing in Suspicious MANETs,
IEEE Transactions on Mobile Computing, to appear in 2011.
2009
-
E. De Cristofaro, X.Ding and G.Tsudik
Privacy-Preserving Querying in Sensor Networks,
IEEE Conference on Computer Communications and Networks (ICCCN), 2009.
-
F. Massacci, G. Tsudik and A. Yautsiukhin
Extended Abstract: Logging Key Assurance Indicators in an Enterprise,
ACM Symposium on Information, Computer & Communication Security (ASIACCS), 2009.
-
A. Kumar, N. Saxena, G. Tsudik and E. Uzun
Caveat Emptor: A Comparative Study of Secure Device Pairing Methods,
IEEE Conference on Pervasive Computing and Communications (PERCOM), 2009.
-
R. Di Pietro, C. Soriente, A. Spognardi and G. Tsudik
Intrusion-Resilience via Collaborative Authentication in Unattended WSNs,
ACM Conference on Wireless Network Security (WiSec), 2009.
-
K. El Defrawy, J. Solis and G. Tsudik
Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks,
IEEE Computer Software and Applications Conference (COMPSAC), 2009.
-
E. De Cristofaro, S. Jarecki, J. Kim and G. Tsudik
Privacy-Preserving Policy-based Information Transfer,
Privacy Enhancing Technologies Symposium (PETS), 2009.
-
A. Kobsa, R. Sonawalla, G. Tsudik, E. Uzun and Y. Wang
Serial Hook-Ups: A Comparative Usability Study of Secure Device Pairing Methods,
Symposium On Usable Privacy and Security (SOUPS), 2009.
-
N. Saxena, G. Tsudik and J. Yi
Efficient Node Admission and Certificate-less Secure Communication in Short-Lived MANETs,
IEEE Transactions on Parallel and Distributed Systems, Vol. 20, No. 2. 2009.
-
M. Goodrich, M. Sirivianos, J. Solis, C. Soriente, G. Tsudik and E. Uzun
Loud and Clear: Human-Verifiable Authentication Based on Audio,
International Journal of Security and Networks, Vol. 4, No. 1, 2009.
-
C. Soriente, G. Tsudik and E. Uzun
Secure Pairing of Interface-Constrained Devices,
International Journal of Security and Networks, Vol. 4, No. 1, 2009.
-
M. Narasimha, J. Solis and G. Tsudik
Privacy-Preserving Revocation Checking,
International Journal of Information Security, Vol. 8, No. 1, 2009.
-
A. Chan, C. Castelluccia, E. Mykletun and G. Tsudik
Efficient and Provably Secure Aggregation of Encrypted Data in WSN-s,
ACM Transactions on Sensor Networks, Vol. 5, No. 3., 2009.
-
X. Ding, G. Tsudik and S. Xu
Leak-Free Group Signatures: Definitions and Construction,
Journal of Computer Security, Vol. 17, No. 4, 2009.
-
J. Kim and G. Tsudik
SRDP: Secure Route Discovery for Dynamic Source Routing in MANETs,
Ad Hoc Networks, Vol. 7, No. 6, 2009.
-
D. Ma and G. Tsudik
A New Approach to Secure Logging,
ACM Transactions on Storage, Vol. 5, No. 1, 2009.
-
M. Burmester, T. Van Le, B. de Medeiros and G. Tsudik
Universally Composable RFID Identification and Authentication Protocols,
ACM Transactions on Information Systems Security, Vol. 12, No. 4, 2009.
-
R. Di Pietro, L. Mancini, C. Soriente, A. Spognardi and G. Tsudik
Data Security in Unattended Wireless Sensor Networks,
IEEE Transactions on Computers, Special Issue on Autonomic Network Computing, Vol. 7, No. 8, 2009.
-
D. Ma, C. Soriente and G. Tsudik
New Adversary and New Threats in Unattended Sensors Networks,
IEEE Network, Vol. 23 No. 2, 2009.
-
R. Di Pietro, L. Mancini, C. Soriente, A. Spognardi and G. Tsudik,
Maximizing Data Survival in Unattended Wireless Sensor Networks against a Focused Mobile Adversary,
Ad Hoc Networks, Vol. 7, No. 8, 2009.
-
G. Ateniese, J. Camenisch, M. Joye and G. Tsudik,
Remarks on "Analysis of One Popular Group Signature Scheme" in Asiacrypt 2006,
Journal of Applied Cryptography, Vol. 1, No. 4, 2009.
-
A. Kumar, N. Saxena, G. Tsudik and E. Uzun,
A Comparative Study of Secure Device Pairing Methods,
Pervasive and Mobile Computing, Vol. 5, No. 6, 2009.
2008:
-
D. Ma and G. Tsudik
A New Approach to Secure Logging,
IFIP WG11.3 Working Conference on Data and Applications Security (DBSec), 2008.
-
C. Soriente, G. Tsudik and E. Uzun
HAPADEP: Human-Assisted Pure Audio Device Pairing,
Information Security Conference (ISC), 2008.
-
G. Ateniese, R. Di Pietro, L. Mancini and G. Tsudik
Scalable and Efficient Provable Data Possession,
Conference on Security and Privacy in Communication Networks (Securecomm), 2008.
-
R. Di Pietro, D. Ma, C. Soriente and G. Tsudik
POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks,
IEEE Symposium on Reliable Distributed Systems (SRDS), 2008.
-
K. Eldefrawy and G. Tsudik
PRISM: Private Routing In Suspicious MANETs,
IEEE International Conference on Network Protocols (ICNP), 2008.
-
D. Ma and G. Tsudik,
DISH: Distributed Self-Healing (in Unattended Sensor Networks)
Symposium on Stabilization, Safety and Security of Distributed Systems (SSS), 2008.
-
J. Kim and G. Tsudik
Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks,
International Conference on Information Security and Cryptology (ICISC), 2008.
-
R. di Pietro, L. Mancini, C.Soriente, A. Spognardi and G. Tsudik
Catch Me (If You Can): Data Survival in Unattended Sensor Networks,
IEEE International Conference on Pervasive Computing and Communications (PERCOM), 2008.
dmsst08.pdf
-
S. Jarecki, J. Kim and G. Tsudik
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Agreement,
RSA Conference, Cryptographers' Track (CT-RSA), 2008.
jkt08.pdf
2007:
-
S. Jarecki, J. Kim and G. Tsudik
Group Secret Handshakes or Affiliation-Hiding Authenticated Group Key Agreement,
RSA Conference, Cryptographers' Track (CT-RSA), 2007.
jkt07.pdf
-
D. Ma and G. Tsudik
Forward-Secure Aggregate Authentication,
IEEE Symposium on Research in Security and Privacy (S&P), 2007.
mt07.pdf
-
K. Eldefrawy and G. Tsudik
ALARM: Anonymous Location-Aided Routing in MANETs,
IEEE International Conference on Network Protocols (ICNP), 2007.
alarm07.pdf
-
S. Jarecki, J. Kim and G. Tsudik
Robust Group Key Agreement using Short Broadcasts,
ACM Computer and Communication Security Conference (CCS), 2007.
rbd07.pdf
-
G. Tsudik,
A Family of Dunces: Trivial RFID Identification and Authentication Protocols,
Symposium on Privacy-Enhancing Technologies (PET'07), 2007.
t07.pdf
-
M. Narasimha and G. Tsudik
Privacy-Preserving Revocation Checking with Modified CRLs,
European PKI Workshop: Theory and Practice (EuroPKI), 2007.
-
K. Eldefrawy, M. El Zarki and G. Tsudik,
Incentive-Based Cooperative and Secure Inter-Personal Networking,
ACM Workshop on Mobile Opportunistic Networking (MobiOpp), 2007.
ezt07.pdf
- X. Ding, D. Mazzocchi and G. Tsudik
Equipping "Smart" Devices With Public Key Signatures,
ACM Transactions on Internet Technology, Vol. 7, No. 1, February 2007.
DMT07.pdf
- N. Saxena, G. Tsudik and J. Yi
Threshold Cryptography in P2P and MANETs: the Case of Access Control,
Computer Networks, Vol. 51, No. 13, August 2007, pp. 3632-3649.
COMPNW3557.pdf
2006:
-
M. Goodrich, M. Sirivianos, J. Solis, G. Tsudik and E. Uzun
Loud And Clear: Human Verifiable Authentication Based on Audio,
IEEE ICDCS'06, 2006.
gsstu.pdf
-
S. Jarecki, J. Kim and G. Tsudik
Authentication for Paranoids: Multi-Party Secret Handshakes
ACNS'06, 2006.
jkt06.pdf
-
E. Mykletun and G. Tsudik
Aggregation Queries in the Database-As-a-Service Model
IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC), 2006.
mt06.pdf
-
G. Tsudik
YA-TRAP: Yet Another Trivial RFID Authentication Protocol (WiP paper)
IEEE PerCom, 2006.
t-2006.pdf
-
M. Narasimha and G. Tsudik
Authentication of Outsourced Databases using Signature Aggregation and Chaining
International Conference on Database Systems for Advanced Applications (DASFAA), 2006.
nt-2006.pdf
-
C. Castelluccia, E. Mykletun and G. Tsudik
Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes
ACM AsiaCCS, 2006.
cmt-2006.pdf
-
J. Solis and G. Tsudik
Simple and Flexible Private Revocation Checking
Privacy-Enhancing Technologies (PETS), 2006.
st-2006.pdf
-
G. Tsudik and S. Xu
A Flexible Framework for Secret Handshakes
Privacy-Enhancing Technologies (PETS), 2006.
tx-2006.pdf
-
X. Li, G. Tsudik and X. Yang
A Technical Approach to Net Neutrality
ACM Workshop on Hot Topics in Networks (Hotnets-V), 2006.
lty-2006.pdf
- M. Narasimha, E. Mykletun and G. Tsudik
Authentication and Integrity in Outsourced Databases,
ACM Transactions on Storage, , Vol. 2, No. 2, May 2006. pp. 107-138.
NMT06.pdf
- C. Castelluccia, S. Jarecki, J. Kim and G. Tsudik
Secure Acknowledgement Aggregation and Multisignatures with Limited Robustness,
Computer Networks, Vol. 50, No. 10, July 2006, pp. 1639-1652.
scn04-journal.ps.gz
- K. Obraczka, G. Tsudik and K. Viswanath
Exploring Mesh- and Tree-Based Multicast Routing Protocols for MANETs,
IEEE Transactions on Mobile Computing, Vol. 5, No. 1, pp. 28-42, January 2006.
tmc-2005.ps.gz
2005:
-
E. Mykletun and G. Tsudik
On using Secure Hardware in Outsourced Databases
International Workshop on Innovative Architecture for Future Generation High-Performance Processors and
Systems (IWIA), 2005.
iwia-2005.pdf
-
C. Castelluccia, E. Mykletun and G. Tsudik,
Efficient Aggregation of Encrypted Data in Wireless Sensor Networks
IEEE Mobiquitous, 2005.
mobiq-2005.pdf
-
J. Kim and G. Tsudik,
Securing Route Discovery in DSR
IEEE Mobiquitous, 2005.
sdsr-2005.pdf
-
G. Tsudik and S. Xu,
A Flexible Framework for Secret Handshakes (Short Paper / Brief Announcement)
ACM Conference on Principles of Distributed Computing (PODC), 2005.
podc-2005.pdf
-
G. Ateniese, D. Chou, B. de Medeiros and G. Tsudik,
Sanitizable Signatures
European Symposium on Research in Computer Security (ESORICS), 2005.
esorics-2005.pdf
-
N. Saxena, G. Tsudik and J. Yi
Efficient Node Admission for Short-lived Mobile Ad Hoc Networks
IEEE International Conference on Network Protocols (ICNP), 2005.
icnp-2005.pdf
-
M. Narasimha and G. Tsudik
DSAC: Integrity of Outsourced Databases with Signature Aggregation and Chaining (Short Paper/Poster)
ACM Conference on Information and Knowledge Management (CIKM), 2005.
cikm-2005.pdf
- Y. Amir, C. Nita-Rotaru, J. Stanton and G. Tsudik
Secure Spread: An Integrated Architecture for Secure Group Communication,
IEEE Transaction on Dependable and Secure Computing Systems, Vol. 2, No. 3, July-September 2005.
TDSC-0113-0704.pdf
2004:
-
B. Hore, S. Mehrotra and G. Tsudik
A Privacy-Preserving Index for Range Queries
International Conference on Very Large Databases (VLDB), August 2004.
vldb-2004.pdf
-
E. Mykletun, M. Narasimha and G. Tsudik
Signature "Bouquets": Immutability of Aggregated Signatures
European Symposium on Research in Computer Security (ESORICS), 2004.
esorics-2004.pdf
-
C. Castelluccia, S. Jarecki and G. Tsudik
Secret Handshakes from CA-oblivious Encryption
IACR ASIACRYPT, 2004.
asiacrypt-2004.pdf
-
C. Castelluccia, S. Jarecki and G. Tsudik
Verifiable and Secure Acknowledgement Aggregation
Security in Computer Networks Conference (SCN), 2004.
scn-2004.pdf
-
C. Castelluccia, S. Jarecki and G. Tsudik
Secret Handshakes from CA-oblivious Encryption (Short paper)
ACM Conference on Principles of Distributed Computing (PODC), 2004.
podc-2004.pdf
-
N. Saxena, G. Tsudik and J. Yi
Identity-based Access Control for Ad Hoc Groups
International Conference on Information Security and Cryptology (ICISC'04), December 2004.
icisc-2004.pdf
-
S. Mehrotra, E. Mykletun, G. Tsudik and Y. Wu
A Framework for Efficient Storage Security in RDBMS
International Conference on Extending Database Technology (EDBT), 2004.
edbt.pdf
-
E. Mykletun, M. Narasimha and G. Tsudik
Authentication and Integrity in Outsourced Databases
Symposium on Network and Distributed Systems Security (NDSS), 2004.
ndss-2004.pdf
-
X. Ding, G. Tsudik and S. Xu
Leak-Free Mediated Group Signatures
IEEE ICDCS, 2004.
icdcs-2004.pdf
-
N. Saxena, G. Tsudik and J. Yi
Access Control Mechanisms for Ad Hoc Networks
IEEE Workshop on Hot Topics in Peer-to-Peer (HOT-P2P'04), 2004.
p2p-2004.pdf
- K. Bicakci, G. Tsudik and B. Tung
On Constructing Optimal One-Time Signatures,
Computer Networks, Vol. 43, No. 3, pp. 339-349, October 2003.
comnet-2003.pdf
- Y. Kim, F. Maino, M. Narasimha, K. Rhee and G. Tsudik
Secure Group Services for Storage-Area Networks,
IEEE Communications, Vol. 41, No. 8, August 2003.
kmnrt04.pdf
- K. Rhee, Y. Park and G. Tsudik
A Group Key Management Architecture in Mobile Ad-hoc Wireless Networks,
Journal Of Communication and Networks, Vol. 6, No. 2, pp. 156-162, June 2004.
jcn-2004.pdf
- Y. Amir, Y. Kim, C. Nita-Rotaru and G. Tsudik
On the Performance of Group Key Agreement Protocols
ACM Transactions on Information Systems Security, Vol. 7, No. 3, pp. 457-488, August 2004.
tissec-2004.pdf
- D. Boneh, X. Ding and G. Tsudik
A Method for Fast Credentials Revocation,
ACM Transactions on Internet Technology, vol. 4, No. 1, pp. 60-82, February 2004.
bdt04.pdf
- Y. Kim, A. Perrig and G. Tsudik
Communication-Efficient Group Key Agreement,
IEEE Transactions on Computers, Vol. 53, No. 7, July 2004.
kpt04.pdf
- Y. Amir, Y. Kim, C. Nita-Rotaru, J. Stanton, J. Schultz and G.Tsudik
Secure Group Communication Using Robust Contributory Key Agreement,
IEEE Transaction on Parallel and Distributed Systems, Vol. 15, No. 5, pp. 468-480, May 2004.
aknsst04.pdf
- Y. Kim, A. Perrig and G. Tsudik
Tree-Based Group Key Agreement,
ACM Transactions on Information Systems Security, Vol. 7, No. 1, pp. 60-96, May 2004.
kpt04a.pdf
2003:
-
G. Tsudik and S. Xu
Accumulating Composites and Improved Group Signing
IACR ASIACRYPT, 2003.
tx03.ps.gz
-
M. Narasimha, G. Tsudik and J. Yi,
On the Utility of Distributed Cryptography in P2P Settings and MANETs
IEEE International Conference on Network Protocols (ICNP), 2003.
nty03.pdf
-
X. Ding and G. Tsudik
Simple Identity-Based Cryptography with Mediated RSA
RSA Conference, Cryptographers' Track, 2003.
bdt03.pdf
-
Y. Amir, C. Nita-Rotaru, J. Stanton and G. Tsudik
Scaling Secure Group Communications: Beyond Peer-to-Peer
DARPA Information Security Conference and Exposition (DISCEX), 2003.
anst03.pdf
-
Y. Kim, D. Mazzocchi and G. Tsudik
Admission Control in Collaborative Groups
IEEE Symposium on Network Computing and Applications (NCA), 2003.
kmt03.pdf
-
N. Saxena, G. Tsudik and J. Yi
Experimenting with Peer Group Admission Control
Workshop on Advanced Developments in Software and Systems Security (WADIS), 2003.
wadis-2003.pdf
-
N. Saxena, G. Tsudik and J. Yi
Admission Control in Peer-to-Peer: Design and Performance Evaluation
ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), 2003.
sty03.pdf
-
Y. Kim and G. Tsudik
Admission Control in Peer Groups
NSF/NASA/DOE Workshop on New Directions on Scalable Cyber-Security, 2003.
2002:
-
G. Tsudik
Weak Forward Security in Mediated RSA
Security in Computer Networks Conference (SCN), 2002.
t02.pdf
-
G. Ateniese, D. Song and G. Tsudik
Quasi-Efficient Revocation in Group Signatures
Financial Cryptography (FC), 2002.
ast02.pdf
-
Y. Amir, Y. Kim, C. Nita-Rotaru, and G. Tsudik
On the Performance of Group Key Agreement Protocols
IEEE ICDCS, 2002.
aknt02.pdf
-
M. El Zarki, S. Mehrotra, G. Tsudik and N. Venkatasubramanian
Security Issues in a Future Vehicular Network
EuroWireless, 2002.
zmtv02.pdf
-
X. Ding, D. Mazzocchi and G. Tsudik
Experimenting with Server-Aided Signatures
Network and Distributed Systems Security Symposium (NDSS), 2002.
dmt02.pdf
-
Y. Park, K. Rhee and G. Tsudik
Group Key Management in Hierarchical Ad-hoc Wireless Networks
Workshop on Information Security Applications (WISA), 2002.
prt02.pdf
-
Y. Kim, F. Maino, M. Narasimha and G. Tsudik
Secure Group Services for Storage-Area Networks
IEEE International Workshop on Storage Security (IWSS), 2002.
kmnt02.pdf
- Y. Kim, D. Mazzocchi and G. Tsudik
Admission Control in Collaborative Groups,
ACM Mobile Computing and Communications Review, Vol. 6, No. 4, October 2002.
2001:
-
D. Boneh, X. Ding, G. Tsudik and B. Wong
Fast Revocation of Security Capabilities
Usenix Security Symposium, 2001.
bdtw.pdf
-
D. Agarwal, O. Chevassut, M. Thompson and G. Tsudik
An Integrated Solution for Secure Group Communication in Wide-Area Networks
IEEE Symposium on Computers and Communications (ISCC), 2001.
actt01.pdf
-
Y. Kim. A. Perrig and G. Tsudik Communication-Efficient Group Key Agreement
IFIP-SEC, 2001.
kpt2001.pdf
-
Y. Amir, Y. Kim, C. Nita-Rotaru, J. Schultz, J. Stanton and G. Tsudik
Exploring Robustness in Group Key Agreement
IEEE ICDCS, 2001.
aknsst00.pdf
-
K. Obraczka, G. Tsudik and K. Viswanath
Pushing the Limit of Multicast in Ad Hoc Networks
IEEE ICDCS, April 2001.
otv2000.ps.gz
- K. Obraczka, G. Tsudik and K Viswanath
Towards Reliable Multicast in Multi-Hop Ad Hoc Networks,
ACM/Balzer Wireless Networks, Vol. 7, No. 6, 2001.
hotv2000.ps.gz
2000:
-
Y. Kim. A. Perrig and G. Tsudik
Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups
ACM CCS, 2000.
kpt2000.pdf
-
G. Ateniese, J. Camenisch, M. Joye and G. Tsudik
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme
IACR CRYPTO. 2000.
acjt00.pdf
-
Bicakci, B. Tung and G. Tsudik
On Constructing Optimal One-Time Signatures
International Symposium on Computer and Information Sciences (ISCIS), 2000.
iscis-2000.pdf
-
Y. Amir, G. Ateniese, D. Hasse, Y. Kim, C. Nita-Rotaru, T. Schlossnagle, J. Schultz, J. Stanton and G. Tsudik
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments
IEEE ICDCS, 2000.
aahknssst99.pdf
-
G. Ateniese, O. Chevassut, D. Hasse, Y. Kim and G. Tsudik
The Design of a Group Key Management API
DARPA DISCEX, 2000.
achkt99.ps.gz
-
C. Landwehr, M. Reed, P. Syverson and G. Tsudik
Towards and Analysis of Onion Routing Security
Workshop on Design Issues in Anonymity and Unobservability, 2000.
lrtst2000.ps.gz
- M. Bellare, J. Garay, R. Hauser, A. Herzberg, H. Krawczyk,
M. Steiner, G. Tsudik, E. Van Herreweghen, and M. Waidner
Design, Implementation and Deployment of a Secure Account-Based Electronic Payment System,
IEEE JSAC, special issue on Secure Communication, May 2000.
ikpj.pdf
- G. Ateniese, M. Steiner and G. Tsudik
New Multi-party Authentication Services and Key Agreement Protocols,
IEEE JSAC, special issue on Secure Communication, May 2000.
ast99.ps.gz
- M. Steiner, G. Tsudik and M. Waidner
Key Agreement in Dynamic Peer Groups,
IEEE Transactions on Parallel and Distributed Systems, August 2000.
stw99.ps.gz
- T. Hardjono and G. Tsudik
IP Multicast Security: Issues and Directions,
Annales de Telecom, 2000.
ht99.ps.gz
1999 and earlier:
-
G. Ateniese and G. Tsudik
Some Open Issues and New Directions in Group Signatures
Financial Cryptography (FC), 1999.
at98-2.ps.gz
-
G. Ateniese and G. Tsudik
Group Signatures a' la carte
ACM Symposium on Discrete Algorithms (SODA), 1999.
at98-1.ps.gz
-
C. Ho, K. Obraczka, G. Tsudik and K. Viswanath
Flooding for Reliable Multicast in Multi-Hop Ad Hoc Networks,
ACM Workshop on Discrete Algorithms for Mobility (DIAL-M), 1999.
hotv99.ps.gz
-
G. Ateniese, M. Joye and G. Tsudik
On the Difficulty of Coalition-Resistance in Group Signature Schemes
Security in Computer Networks (SCN), 1999.
ajt99.ps.gz
- R. Hauser, A. Przygienda and G. Tsudik
Lowering Security Overhead in Link State Routing,
Computer Networks and ISDN Systems, April 1999.
hpt98.ps.gz
- G. Ateniese, A. Herzberg, H. Krawczyk and G. Tsudik
Untraceable Mobility: On Travelling Incognito,
Computer Networks and ISDN Systems, April 1999.
hkt97.ps.gz
-
I. Foster, C. Kesselman, G. Tsudik and S. Tuecke
Security Architecture for Large-Scale Distributed Computations
ACM Conference on Computer and Communications Security (CCS), 1998.
fktt98.ps.gz
-
G. Ateniese, M. Steiner and G. Tsudik
Authenticated Group Key Agreement and Related Issues
ACM Conference on Computer and Communications Security (CCS), 1998.
ast98.ps.gz
-
M. Franklin and G. Tsudik
Secure Group Barter
Financial Cryptography (FC), 1998.
ft97.ps.gz
-
M. Steiner, G. Tsudik and M. Waidner
CLIQUES: A New Approach to Group Key Agreement
IEEE ICDCS, 1998.
stw97.ps.gz
-
K. Obraczka and G. Tsudik
Multicast Routing Issues in Ad Hoc Networks
IEEE International Conference on Universal Personal Communication (ICUPC), 1998.
ot98.ps.gz
- R. Molva and G. Tsudik
Secret Sets and Applications,
Information Processing Letters, Vol. 65, No. 1, pp. 47-55, 1998.
mt96.ps.gz
-
R. Hauser, A. Przygienda and G. Tsudik
Reducing the Cost of Security in Link State Routing
Symposium on Network and Distributed System Security (NDSS), 1997.
hpt96.ps.gz
- N. Asokan, G. Tsudik and M. Waidner
Server-Supported Signatures,
Journal of Computer Security, November 1997.
atw97.ps.gz
- J. Gray, A. Kshemkalyani, M. Matyas, M. Peyravian and G. Tsudik
ATM Cell Encryption and Key Update Synchronization,
Telecommunication Systems Journal, Vol. 7, No. 4, pp. 391-408, 1997.
gkmpt96.ps.gz
-
P. Janson, G. Tsudik and M. Yung
Scalability and Flexibility in Authentication Services: The KryptoKnight Approach
IEEE INFOCOM, 1997.
jty94.ps.gz
-
R. Hauser, A. Przygienda and G. Tsudik
Low-cost Security in Link State Routing
Security in Communication Networks, 1996.
-
C. Gulcu and G. Tsudik
Mixing E-mail with BABEL
Symposium on Network and Distributed System Security (NDSS), 1996.
gguts96.ps.gz
-
N. Asokan, G. Tsudik and M. Waidner
Server-Supported Signatures
European Symposium on Research in Computer Security (ESORICS), 1996.
atw96.ps.gz
-
R. Hauser and G. Tsudik
On Shopping Incognito
USENIX Conference on Electronic Commerce, 1996.
hats96.ps.gz
-
M. Steiner, G. Tsudik and M. Waidner
Diffie-Hellman Key Distribution Extended to Groups
ACM Conference on Computer and Communications Security (CCS), 1996.
stw96.ps.gz
- R. Hauser, P. Janson, R. Molva, G. Tsudik and E. Van Herreweghen,
Robust and Secure Password/Key Change Method,
Journal of Computer Security, November 1996.
hjmtv96.ps.gz
-
M. Bellare, R. Hauser, A. Herzberg, J. Garay, H. Krawczyk, M. Steiner, G. Tsudik and M. Waidner
iKP -- A Family of Secure Electronic Payment Protocols
USENIX Conference on Electronic Commerce, 1995.
bhhgkstw95.ps.gz
-
R. Molva, D. Samfat and G. Tsudik
An Authentication Protocol for Mobile Users
IEE Colloquium on Security and Cryptography Applications to Radio Systems, 1995
- D. Chess, B. Grosof, C. Harrison, D. Levine, C. Parris and G. Tsudik
Itinerant Programs for Mobile Computing,
IEEE Personal Communication Systems, September 1995.
cghlpt95.ps.gz
- P. Janson and G. Tsudik
Secure and Minimal Protocols for Authenticated Key Distribution
Computer Communications Journal, September 1995.
jt94.ps.gz
-
R. Hauser, P. Janson, R. Molva, G. Tsudik and E. Van Herreweghen
Robust and Secure Password/Key Change Method
European Symposium on Research in Computer Security (ESORICS), 1994.
hjmtv94.ps.gz
-
A. Herzberg, H. Krawczyk and G. Tsudik
On Travelling Incognito
IEEE Workshop on Mobile Systems and Applications, 1994.
hkt94.ps.gz
- R. Molva, D. Samfat and G. Tsudik
Authentication of Mobile Users,
IEEE Network, Special Issue on Mobile Communications, March/April 1994.
mst94.ps.gz
-
G. Tsudik and E. Van Herreweghen
Some Remarks on Protecting Weak Secrets and Poorly-Chosen Keys from Guessing Attacks
IEEE Symposium on Reliable Distributed Systems (SRDS), 1993.
tv93a.ps.gz
-
G. Tsudik and E. Van Herreweghen
On Simple and Secure Key Distribution
ACM Conference on Computer and Communications Security (CCS), 1993.
tv93.ps.gz
-
R. Molva and G. Tsudik
Authentication Method with Impersonal Token Cards
IEEE Symposium on Security and Privacy (S&P), 1993.
mt93.ps.gz
- D. Estrin, M. Steenstrup and G. Tsudik
Protocols for Route Establishment and Packet Forwarding Across Multi-Domain Internetworks
ACM/IEEE Transactions on Networking, February 1993.
-
G. Tsudik
Policy Enforcement in Stub Autonomous Domains
European Symposium on Research in Computer Security (ESORICS), 1992.
t92a.ps.gz
-
R. Molva, G. Tsudik, E. Van Herreweghen and S. Zatti
KryptoKnight Authentication and Key Distribution System
European Symposium on Research in Computer Security (ESORICS), 1992.
mtvz92.ps.gz
-
G. Tsudik
Message Authentication with One-Way Hash Functions
IEEE INFOCOM, 1992.
t92.ps.gz
- R. Summers and G. Tsudik
AudES: An Expert System for Security Auditing,
Computer Security Journal Vol. 6, No. 1, June 1991.
- D. Estrin and G. Tsudik
An End-to-End Argument for Network Layer Inter-Domain Access Controls,
Journal of Internetworking: Research and Experience, June 1991.
et91.ps.gz
- D. Estrin and G. Tsudik
Secure Control of Transit Internetwork Traffic,
Computer Networks and ISDN Systems, October 1991.
-
R. Summers and G. Tsudik
AudES: An Expert System for Security Auditing
AAAI Conference on Innovative Applications in AI, 1990.
st90.pdf
- D. Estrin, J. Mogul and G. Tsudik
VISA Protocols for Controlling Inter-Organizational Datagram Flow
IEEE Journal on Selected Areas in CommunicationsMay 1989.
- G. Tsudik
Datagram Authentication in Internet Gateways
IEEE Journal on Selected Areas in Communications, May 1989.
-
D. Estrin and G. Tsudik
Policy Enforcement in Interconnected Autonomous Networks
DIMACS Workshop on Connections Between Distributed Computing and Cryptography, 1989.
-
D. Estrin and G. Tsudik
Security Issues in Policy Routing
IEEE Symposium on Security and Privacy (S&P), 1989.
et89.pdf
-
D. Estrin and G. Tsudik
VISA Scheme for Inter-Organizational Network Security
IEEE Symposium on Security and Privacy (S&P), 1987.
et87.pdf