![]() | 2009 | |
---|---|---|
133 | ![]() ![]() ![]() ![]() ![]() ![]() | Stanislaw Jarecki, Gene Tsudik: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings Springer 2009 |
132 | ![]() ![]() ![]() ![]() ![]() ![]() | Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin: Logging key assurance indicators in business processes. ASIACCS 2009: 364-367 |
131 | ![]() ![]() ![]() ![]() ![]() ![]() | Karim M. El Defrawy, John Solis, Gene Tsudik: Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks. COMPSAC (1) 2009: 271-279 |
130 | ![]() ![]() ![]() ![]() ![]() ![]() | Arun Kumar, Nitesh Saxena, Gene Tsudik, Ersin Uzun: Caveat Emptor: A Comparative Study of Secure Device Pairing Methods. PerCom 2009: 1-10 |
129 | ![]() ![]() ![]() ![]() ![]() ![]() | Emiliano De Cristofaro, Stanislaw Jarecki, Jihye Kim, Gene Tsudik: Privacy-Preserving Policy-Based Information Transfer. Privacy Enhancing Technologies 2009: 164-184 |
128 | ![]() ![]() ![]() ![]() ![]() ![]() | Alfred Kobsa, Rahim Sonawalla, Gene Tsudik, Ersin Uzun, Yang Wang: Serial hook-ups: a comparative usability study of secure device pairing methods. SOUPS 2009 |
127 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Di Pietro, Claudio Soriente, Angelo Spognardi, Gene Tsudik: Collaborative authentication in unattended WSNs. WISEC 2009: 237-244 |
126 | ![]() ![]() ![]() ![]() ![]() ![]() | Mike Burmester, Tri Van Le, Breno de Medeiros, Gene Tsudik: Universally Composable RFID Identification and Authentication Protocols. ACM Trans. Inf. Syst. Secur. 12(4): (2009) |
125 | ![]() ![]() ![]() ![]() ![]() ![]() | Jihye Kim, Gene Tsudik: SRDP: Secure route discovery for dynamic source routing in MANETs. Ad Hoc Networks 7(6): 1097-1109 (2009) |
124 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik: Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks. Ad Hoc Networks 7(8): 1463-1475 (2009) |
123 | ![]() ![]() ![]() ![]() ![]() ![]() | Emiliano De Cristofaro, Xuhua Ding, Gene Tsudik: Privacy-Preserving Querying in Sensor Networks CoRR abs/0905.2158: (2009) |
122 | ![]() ![]() ![]() ![]() ![]() ![]() | Mishari Al Mishari, Emiliano De Cristofaro, Karim M. El Defrawy, Gene Tsudik: Harvesting SSL Certificate Data to Mitigate Web-Fraud CoRR abs/0909.3688: (2009) |
121 | ![]() ![]() ![]() ![]() ![]() ![]() | Yanbin Lu, Gene Tsudik: Towards Plugging Privacy Leaks in Domain Name System CoRR abs/0910.2472: (2009) |
120 | ![]() ![]() ![]() ![]() ![]() ![]() | Di Ma, Claudio Soriente, Gene Tsudik: New adversary and new threats: security in unattended sensor networks. IEEE Network 23(2): 43-48 (2009) |
119 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik: Data Security in Unattended Wireless Sensor Networks. IEEE Trans. Computers 58(11): 1500-1511 (2009) |
118 | ![]() ![]() ![]() ![]() ![]() ![]() | Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi: Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs. IEEE Trans. Parallel Distrib. Syst. 20(2): 158-170 (2009) |
117 | ![]() ![]() ![]() ![]() ![]() ![]() | Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik: Remarks on ''Analysis of one popular group signature scheme'' in Asiacrypt 2006. IJACT 1(4): 320-322 (2009) |
116 | ![]() ![]() ![]() ![]() ![]() ![]() | Claudio Soriente, Gene Tsudik, Ersin Uzun: Secure pairing of interface constrained devices. IJSN 4(1/2): 17-26 (2009) |
115 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael T. Goodrich, Michael Sirivianos, John Solis, Claudio Soriente, Gene Tsudik, Ersin Uzun: Using audio in secure device pairing. IJSN 4(1/2): 57-68 (2009) |
114 | ![]() ![]() ![]() ![]() ![]() ![]() | Maithili Narasimha, John Solis, Gene Tsudik: Privacy-preserving revocation checking. Int. J. Inf. Sec. 8(1): 61-75 (2009) |
113 | ![]() ![]() ![]() ![]() ![]() ![]() | Xuhua Ding, Gene Tsudik, Shouhuai Xu: Leak-free mediated group signatures. Journal of Computer Security 17(4): 489-514 (2009) |
112 | ![]() ![]() ![]() ![]() ![]() ![]() | Arun Kumar, Nitesh Saxena, Gene Tsudik, Ersin Uzun: A comparative study of secure device pairing methods. Pervasive and Mobile Computing 5(6): 734-749 (2009) |
111 | ![]() ![]() ![]() ![]() ![]() ![]() | Di Ma, Gene Tsudik: A new approach to secure logging. TOS 5(1): (2009) |
110 | ![]() ![]() ![]() ![]() ![]() ![]() | Claude Castelluccia, Aldar C.-F. Chan, Einar Mykletun, Gene Tsudik: Efficient and provably secure aggregation of encrypted data in wireless sensor networks. TOSN 5(3): (2009) |
2008 | ||
109 | ![]() ![]() ![]() ![]() ![]() ![]() | Gene Tsudik: Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers Springer 2008 |
108 | ![]() ![]() ![]() ![]() ![]() ![]() | Gene Tsudik: Confronting a mobile adversary in unattended sensor networks. ASIACCS 2008: 1 |
107 | ![]() ![]() ![]() ![]() ![]() ![]() | Stanislaw Jarecki, Jihye Kim, Gene Tsudik: Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange. CT-RSA 2008: 352-369 |
106 | ![]() ![]() ![]() ![]() ![]() ![]() | Di Ma, Gene Tsudik: A New Approach to Secure Logging. DBSec 2008: 48-63 |
105 | ![]() ![]() ![]() ![]() ![]() ![]() | Jihye Kim, Gene Tsudik: Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks. ICISC 2008: 66-83 |
104 | ![]() ![]() ![]() ![]() ![]() ![]() | Claudio Soriente, Gene Tsudik, Ersin Uzun: HAPADEP: Human-Assisted Pure Audio Device Pairing. ISC 2008: 385-400 |
103 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik: Catch Me (If You Can): Data Survival in Unattended Sensor Networks. PerCom 2008: 185-194 |
102 | ![]() ![]() ![]() ![]() ![]() ![]() | Roberto Di Pietro, Di Ma, Claudio Soriente, Gene Tsudik: POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks. SRDS 2008: 185-194 |
101 | ![]() ![]() ![]() ![]() ![]() ![]() | Di Ma, Gene Tsudik: DISH: Distributed Self-Healing. SSS 2008: 47-62 |
100 | ![]() ![]() ![]() ![]() ![]() ![]() | Gene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, Melanie R. Rieback: RFID security and privacy: long-term research or short-term tinkering? WISEC 2008: 160 |
99 | ![]() ![]() ![]() ![]() ![]() ![]() | Gene Tsudik: Editorial. ACM Trans. Inf. Syst. Secur. 11(3): (2008) |
2007 | ||
98 | ![]() ![]() ![]() ![]() ![]() ![]() | Stanislaw Jarecki, Jihye Kim, Gene Tsudik: Robust group key agreement using short broadcasts. ACM Conference on Computer and Communications Security 2007: 411-420 |
97 | ![]() ![]() ![]() ![]() ![]() ![]() | Stanislaw Jarecki, Jihye Kim, Gene Tsudik: Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement. CT-RSA 2007: 287-308 |
96 | ![]() ![]() ![]() ![]() ![]() ![]() | Maithili Narasimha, Gene Tsudik: Privacy-Preserving Revocation Checking with Modified CRLs. EuroPKI 2007: 18-33 |
95 | ![]() ![]() ![]() ![]() ![]() ![]() | Karim M. El Defrawy, Gene Tsudik: ALARM: Anonymous Location-Aided Routing in Suspicious MANETs. ICNP 2007: 304-313 |
94 | ![]() ![]() ![]() ![]() ![]() ![]() | Di Ma, Gene Tsudik: Extended Abstract: Forward-Secure Sequential Aggregate Authentication. IEEE Symposium on Security and Privacy 2007: 86-91 |
93 | ![]() ![]() ![]() ![]() ![]() ![]() | Gene Tsudik: A Family of Dunces: Trivial RFID Identification and Authentication Protocols. Privacy Enhancing Technologies 2007: 45-61 |
92 | ![]() ![]() ![]() ![]() ![]() ![]() | Xuhua Ding, Daniele Mazzocchi, Gene Tsudik: Equipping smart devices with public key signatures. ACM Trans. Internet Techn. 7(1): (2007) |
91 | ![]() ![]() ![]() ![]() ![]() ![]() | Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi: Threshold cryptography in P2P and MANETs: The case of access control. Computer Networks 51(12): 3632-3649 (2007) |
90 | ![]() ![]() ![]() ![]() ![]() ![]() | Kumar Viswanath, Katia Obraczka, Gene Tsudik: Correction to "Exploring Mesh and Tree-Based Multicast Routing Protocols for MANETs". IEEE Trans. Mob. Comput. 6(2): 237 (2007) |
2006 | ||
89 | ![]() ![]() ![]() ![]() ![]() ![]() | Ari Juels, Gene Tsudik, Shouhuai Xu, Moti Yung: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006 ACM 2006 |
88 | ![]() ![]() ![]() ![]() ![]() ![]() | Stanislaw Jarecki, Jihye Kim, Gene Tsudik: Authentication for Paranoids: Multi-party Secret Handshakes. ACNS 2006: 325-339 |
87 | ![]() ![]() ![]() ![]() ![]() ![]() | Claude Castelluccia, Einar Mykletun, Gene Tsudik: Improving secure server performance by re-balancing SSL/TLS handshakes. ASIACCS 2006: 26-34 |
86 | ![]() ![]() ![]() ![]() ![]() ![]() | Maithili Narasimha, Gene Tsudik: Authentication of Outsourced Databases Using Signature Aggregation and Chaining. DASFAA 2006: 420-436 |
85 | ![]() ![]() ![]() ![]() ![]() ![]() | Einar Mykletun, Gene Tsudik: Aggregation Queries in the Database-As-a-Service Model. DBSec 2006: 89-103 |
84 | ![]() ![]() ![]() ![]() ![]() ![]() | Samad Nasserian, Gene Tsudik: Revisiting Oblivious Signature-Based Envelopes. Financial Cryptography 2006: 221-235 |
83 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, Ersin Uzun: Loud and Clear: Human-Verifiable Authentication Based on Audio. ICDCS 2006: 10 |
82 | ![]() ![]() ![]() ![]() ![]() ![]() | Gene Tsudik: YA-TRAP: Yet Another Trivial RFID Authentication Protocol. PerCom Workshops 2006: 640-643 |
81 | ![]() ![]() ![]() ![]() ![]() ![]() | Gene Tsudik, Shouhuai Xu: A Flexible Framework for Secret Handshakes. Privacy Enhancing Technologies 2006: 295-315 |
80 | ![]() ![]() ![]() ![]() ![]() ![]() | John Solis, Gene Tsudik: Simple and Flexible Revocation Checking with Privacy. Privacy Enhancing Technologies 2006: 351-367 |
79 | ![]() ![]() ![]() ![]() ![]() ![]() | Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik: Secure acknowledgment aggregation and multisignatures with limited robustness. Computer Networks 50(10): 1639-1652 (2006) |
78 | ![]() ![]() ![]() ![]() ![]() ![]() | Kumar Viswanath, Katia Obraczka, Gene Tsudik: Exploring Mesh and Tree-Based Multicast Routing Protocols for MANETs. IEEE Trans. Mob. Comput. 5(1): 28-42 (2006) |
77 | ![]() ![]() ![]() ![]() ![]() ![]() | Einar Mykletun, Maithili Narasimha, Gene Tsudik: Authentication and integrity in outsourced databases. TOS 2(2): 107-138 (2006) |
2005 | ||
76 | ![]() ![]() ![]() ![]() ![]() ![]() | Refik Molva, Gene Tsudik, Dirk Westhoff: Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers Springer 2005 |
75 | ![]() ![]() ![]() ![]() ![]() ![]() | Maithili Narasimha, Gene Tsudik: DSAC: integrity for outsourced databases with signature aggregation and chaining. CIKM 2005: 235-236 |
74 | ![]() ![]() ![]() ![]() ![]() ![]() | Giuseppe Ateniese, Daniel H. Chou, Breno de Medeiros, Gene Tsudik: Sanitizable Signatures. ESORICS 2005: 159-177 |
73 | ![]() ![]() ![]() ![]() ![]() ![]() | Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi: Efficient Node Admission for Short-lived Mobile Ad Hoc Networks. ICNP 2005: 269-278 |
72 | ![]() ![]() ![]() ![]() ![]() ![]() | Claude Castelluccia, Einar Mykletun, Gene Tsudik: E.cient Aggregation of encrypted data in Wireless Sensor Networks. MobiQuitous 2005: 109-117 |
71 | ![]() ![]() ![]() ![]() ![]() ![]() | Jihye Kim, Gene Tsudik: SRDP: Securing Route Discovery in DSR. MobiQuitous 2005: 247-260 |
70 | ![]() ![]() ![]() ![]() ![]() ![]() | Gene Tsudik, Shouhuai Xu: Brief announcement: a flexible framework for secret handshakes. PODC 2005: 39 |
69 | ![]() ![]() ![]() ![]() ![]() ![]() | Yair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton, Gene Tsudik: Secure Spread: An Integrated Architecture for Secure Group Communication. IEEE Trans. Dependable Sec. Comput. 2(3): 248-261 (2005) |
68 | ![]() ![]() ![]() ![]() ![]() ![]() | Kyung Hyune Rhee, Young-Ho Park, Gene Tsudik: A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks. J. Inf. Sci. Eng. 21(2): 415-428 (2005) |
2004 | ||
67 | ![]() ![]() ![]() ![]() ![]() ![]() | Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik: Secret Handshakes from CA-Oblivious Encryption. ASIACRYPT 2004: 293-307 |
66 | ![]() ![]() ![]() ![]() ![]() ![]() | Balakrishna R. Iyer, Sharad Mehrotra, Einar Mykletun, Gene Tsudik, Yonghua Wu: A Framework for Efficient Storage Security in RDBMS. EDBT 2004: 147-164 |
65 | ![]() ![]() ![]() ![]() ![]() ![]() | Einar Mykletun, Maithili Narasimha, Gene Tsudik: Signature Bouquets: Immutability for Aggregated/Condensed Signatures. ESORICS 2004: 160-176 |
64 | ![]() ![]() ![]() ![]() ![]() ![]() | Xuhua Ding, Gene Tsudik, Shouhuai Xu: Leak-Free Group Signatures with Immediate Revocation. ICDCS 2004: 608-615 |
63 | ![]() ![]() ![]() ![]() ![]() ![]() | Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi: Identity-Based Access Control for Ad Hoc Groups. ICISC 2004: 362-379 |
62 | ![]() ![]() ![]() ![]() ![]() ![]() | Einar Mykletun, Maithili Narasimha, Gene Tsudik: Authentication and Integrity in Outsourced Databases. NDSS 2004 |
61 | ![]() ![]() ![]() ![]() ![]() ![]() | Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik: Brief announcement: secret handshakes from CA-oblivious encryption. PODC 2004: 394 |
60 | ![]() ![]() ![]() ![]() ![]() ![]() | Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik: A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation. SCN 2004: 193-207 |
59 | ![]() ![]() ![]() ![]() ![]() ![]() | Bijit Hore, Sharad Mehrotra, Gene Tsudik: A Privacy-Preserving Index for Range Queries. VLDB 2004: 720-731 |
58 | ![]() ![]() ![]() ![]() ![]() ![]() | Yongdae Kim, Adrian Perrig, Gene Tsudik: Tree-based group key agreement. ACM Trans. Inf. Syst. Secur. 7(1): 60-96 (2004) |
57 | ![]() ![]() ![]() ![]() ![]() ![]() | Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene Tsudik: On the performance of group key agreement protocols. ACM Trans. Inf. Syst. Secur. 7(3): 457-488 (2004) |
56 | ![]() ![]() ![]() ![]() ![]() ![]() | Dan Boneh, Xuhua Ding, Gene Tsudik: Fine-grained control of security capabilities. ACM Trans. Internet Techn. 4(1): 60-82 (2004) |
55 | ![]() ![]() ![]() ![]() ![]() ![]() | Yongdae Kim, Adrian Perrig, Gene Tsudik: Group Key Agreement Efficient in Communication. IEEE Trans. Computers 53(7): 905-921 (2004) |
54 | ![]() ![]() ![]() ![]() ![]() ![]() | Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Gene Tsudik: Secure Group Communication Using Robust Contributory Key Agreement. IEEE Trans. Parallel Distrib. Syst. 15(5): 468-480 (2004) |
2003 | ||
53 | ![]() ![]() ![]() ![]() ![]() ![]() | Gene Tsudik, Shouhuai Xu: Accumulating Composites and Improved Group Signing. ASIACRYPT 2003: 269-286 |
52 | ![]() ![]() ![]() ![]() ![]() ![]() | Xuhua Ding, Gene Tsudik: Simple Identity-Based Cryptography with Mediated RSA. CT-RSA 2003: 193-210 |
51 | ![]() ![]() ![]() ![]() ![]() ![]() | Yair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton, Gene Tsudik: Scaling Secure Group Communication Systems: Beyond Peer-to-Peer. DISCEX (1) 2003: 226-237 |
50 | ![]() ![]() ![]() ![]() ![]() ![]() | Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi: On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control. ICNP 2003: 336- |
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Yongdae Kim, Daniele Mazzocchi, Gene Tsudik: Admission Control in Peer Groups. NCA 2003: 131-139 |
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi: Admission control in Peer-to-Peer: design and performance evaluation. SASN 2003: 104-113 |
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Kemal Bicakci, Gene Tsudik, Brian Tung: How to construct optimal one-time signatures. Computer Networks 43(3): 339-349 (2003) |
2002 | ||
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Giuseppe Ateniese, Dawn Xiaodong Song, Gene Tsudik: Quasi-Efficient Revocation in Group Signatures. Financial Cryptography 2002: 183-197 |
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene Tsudik: On the Performance of Group Key Agreement Protocols. ICDCS 2002: 463-464 |
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Yongdae Kim, Maithili Narasimha, Fabio Maino, Gene Tsudik: Secure Group Services for Storage Area Networks. IEEE Security in Storage Workshop 2002: 80-93 |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Xuhua Ding, Daniele Mazzocchi, Gene Tsudik: Experimenting with Server-Aided Signatures. NDSS 2002 |
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Gene Tsudik: Weak Forward Security in Mediated RSA. SCN 2002: 45-54 |
2001 | ||
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Yair Amir, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Yongdae Kim, Gene Tsudik: Exploring Robustness in Group Key Agreement. ICDCS 2001: 399-408 |
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Katia Obraczka, Gene Tsudik, Kumar Viswanath: Pushing the Limits of Multicast in Ad Hoc Networks. ICDCS 2001: 719-722 |
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Deborah A. Agarwal, Olivier Chevassut, Mary R. Thompson, Gene Tsudik: An Integrated Solution for Secure Group Communication in Wide-Area Networks. ISCC 2001: 22-28 |
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Yongdae Kim, Adrian Perrig, Gene Tsudik: Communication-Efficient Group Key Agreement. SEC 2001: 229-244 |
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Katia Obraczka, Kumar Viswanath, Gene Tsudik: Flooding for Reliable Multicast in Multi-Hop Ad Hoc Networks. Wireless Networks 7(6): 627-634 (2001) |
2000 | ||
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Yongdae Kim, Adrian Perrig, Gene Tsudik: Simple and fault-tolerant key agreement for dynamic collaborative groups. ACM Conference on Computer and Communications Security 2000: 235-244 |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik: A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. CRYPTO 2000: 255-270 |
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Jonathan Robert Stanton, Yair Amir, Damian Hasse, Giuseppe Ateniese, Yongdae Kim, Cristina Nita-Rotaru, Theo Schlossnagle, John L. Schultz, Gene Tsudik: Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments. ICDCS 2000: 330-343 |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Paul F. Syverson, Gene Tsudik, Michael G. Reed, Carl E. Landwehr: Towards an Analysis of Onion Routing Security. Workshop on Design Issues in Anonymity and Unobservability 2000: 96-114 |
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Steiner, Gene Tsudik, Michael Waidner: Key Agreement in Dynamic Peer Groups. IEEE Trans. Parallel Distrib. Syst. 11(8): 769-780 (2000) |
1999 | ||
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Christopher Ho, Katia Obraczka, Gene Tsudik, Kumar Viswanath: Flooding for reliable multicast in multi-hop ad hoc networks. DIAL-M 1999: 64-71 |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Giuseppe Ateniese, Gene Tsudik: Some Open Issues and New Directions in Group Signatures. Financial Cryptography 1999: 196-211 |
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Giuseppe Ateniese, Gene Tsudik: Group Signatures Á la carte. SODA 1999: 848-849 |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Giuseppe Ateniese, Amir Herzberg, Hugo Krawczyk, Gene Tsudik: Untraceable mobility or how to travel incognito. Computer Networks 31(8): 871-884 (1999) |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Ralf C. Hauser, Tony Przygienda, Gene Tsudik: Lowering security overhead in link state routing. Computer Networks 31(8): 885-894 (1999) |
1998 | ||
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Giuseppe Ateniese, Michael Steiner, Gene Tsudik: Authenticated Group Key Agreement and Friends. ACM Conference on Computer and Communications Security 1998: 17-26 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Ian T. Foster, Carl Kesselman, Gene Tsudik, Steven Tuecke: A Security Architecture for Computational Grids. ACM Conference on Computer and Communications Security 1998: 83-92 |
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Matthew K. Franklin, Gene Tsudik: Secure Group Barter: Multi-party Fair Exchange with Semi-Trusted Neutral Parties. Financial Cryptography 1998: 90-102 |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Steiner, Gene Tsudik, Michael Waidner: CLIQUES: A New Approach to Group Key Agreement. ICDCS 1998: 380-387 |
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Refik Molva, Gene Tsudik: Secret Sets and Applications. Inf. Process. Lett. 65(1): 47-55 (1998) |
1997 | ||
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Philippe A. Janson, Gene Tsudik, Moti Yung: Scalability and Flexibility in Authentication Services: The KryptoKnight Approach. INFOCOM 1997: 725-736 |
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Ralf C. Hauser, Tony Przygienda, Gene Tsudik: Reducing the Cost of Security in Link-State Routing. NDSS 1997 |
19 | ![]() ![]() ![]() ![]() ![]() ![]() | N. Asokan, Gene Tsudik, Michael Waidner: Server-Supported Signatures. Journal of Computer Security 5(1): 91-108 (1997) |
18 | ![]() ![]() ![]() ![]() ![]() ![]() | James P. Gray, Ajay D. Kshemkalyani, Stephen M. Matyas, Mohammad Peyravian, Gene Tsudik: ATM cell encryption and key update synchronization. Telecommunication Systems 7(4): 391-408 (1997) |
1996 | ||
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Steiner, Gene Tsudik, Michael Waidner: Diffie-Hellman Key Distribution Extended to Group Communication. ACM Conference on Computer and Communications Security 1996: 31-37 |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | N. Asokan, Gene Tsudik, Michael Waidner: Server-Supported Signatures. ESORICS 1996: 131-143 |
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Stefano Zatti, Refik Molva, Angelo Tosi, Gene Tsudik, Helmut Kurth: Limitations of the Approach of Solving a Network's Security Problem with a Firewall. ESORICS 1996: 144-145 |
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen: Robust and Secure Password and Key Change Method. Journal of Computer Security 4(1): 97-112 (1996) |
1995 | ||
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Philippe A. Janson, Gene Tsudik: Secure and minimal protocols for authenticated key distribution. Computer Communications 18(9): 645-653 (1995) |
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Steiner, Gene Tsudik, Michael Waidner: Refinement and Extension of Encrypted Key Exchange. Operating Systems Review 29(3): 22-30 (1995) |
1994 | ||
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen: Robust and Secure Password and Key Change Method. ESORICS 1994: 107-122 |
1993 | ||
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Gene Tsudik, Els Van Herreweghen: On Simple and Secure Key Distribution. ACM Conference on Computer and Communications Security 1993: 49-57 |
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Gene Tsudik, Els Van Herreweghen: Some Remarks on Protecting Weak Keys and Poorly-Chosen Secrets from Guessing Attacks. SRDS 1993: 136-142 |
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Deborah Estrin, Martha Steenstrup, Gene Tsudik: A protocol for route establishment and packet forwarding across multidomain internets. IEEE/ACM Trans. Netw. 1(1): 56-70 (1993) |
1992 | ||
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Refik Molva, Gene Tsudik, Els Van Herreweghen, Stefano Zatti: KryptoKnight Authentication and Key Distribution System. ESORICS 1992: 155-174 |
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Gene Tsudik: Policy Enforcement in Stub Autonomous Domains. ESORICS 1992: 229-257 |
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Gene Tsudik: Message Authentication with One-Way Hash Functions. INFOCOM 1992: 2055-2059 |
1991 | ||
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Deborah Estrin, Gene Tsudik: Secure Control of Transit Internetwork Traffic. Computer Networks and ISDN Systems 22(5): 363-382 (1991) |
1990 | ||
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Gene Tsudik, Rita C. Summers: AudES - An Expert System for Security Auditing. IAAI 1990: 221-232 |
1989 | ||
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Deborah Estrin, Gene Tsudik: Security Issues in Policy Routing. IEEE Symposium on Security and Privacy 1989: 183-193 |
1987 | ||
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Deborah Estrin, Gene Tsudik: Visa Scheme for Inter-Organization Network Security. IEEE Symposium on Security and Privacy 1987: 174-183 |