Gene Tsudik
Orcid: 0000-0002-8467-8614Affiliations:
- University of California, Irvine, USA
According to our database1,
Gene Tsudik
authored at least 350 papers
between 1987 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2014, "For contributions to Internet security and privacy.".
IEEE Fellow
IEEE Fellow 2013, "For contributions to distributed systems security and privacy".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on id.loc.gov
-
on ics.uci.edu
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IEEE Commun. Mag., July, 2024
CoRR, 2024
Proceedings of the 30th Annual International Conference on Mobile Computing and Networking, 2024
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024
<i>P</i>sfIVA: Privacy-Preserving Identity Verification Methods for Accountless Users via Private List Intersection and Variants.
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Element Distinctness and Bounded Input Size in Private Set Intersection and Related Protocols.
Proceedings of the Applied Cryptography and Network Security, 2024
2023
ACM Trans. Priv. Secur., August, 2023
BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication.
Pervasive Mob. Comput., 2023
Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription.
IEEE Secur. Priv., 2023
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
VICEROY: GDPR-/CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the IEEE/ACM International Conference on Computer Aided Design, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
CoRR, 2022
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022
SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2022
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
2021
Delegated attestation: scalable remote attestation of commodity CPS by blending proofs of execution with software attestation.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the IPSN '21: The 20th International Conference on Information Processing in Sensor Networks, 2021
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021
Proceedings of the CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Tiny-CFA: A Minimalistic Approach for Control-Flow Attestation Using Verified Proofs of Execution.
CoRR, 2020
APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 11th ACM/IEEE International Conference on Cyber-Physical Systems, 2020
Proceedings of the Financial Cryptography and Data Security, 2020
DE-auth of the Blue! Transparent De-authentication Using Bluetooth Low Energy Beacon.
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
ProMACs: Progressive and Resynchronizing MACs for Continuous Efficient Authentication of Message Streams.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
IEEE/ACM Trans. Netw., 2019
ACM Trans. Design Autom. Electr. Syst., 2019
IEEE Trans. Dependable Secur. Comput., 2019
J. Comput. Secur., 2019
A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise.
CoRR, 2019
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019
Advancing remote attestation via computer-aided formal verification of designs and synthesis of executables: opinion.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
PURE: Using Verified Remote Attestation to Obtain Proofs of Update, Reset and Erasure in low-End Embedded Systems.
Proceedings of the International Conference on Computer-Aided Design, 2019
Proceedings of the Financial Cryptography and Data Security, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018
CoRR, 2018
KRB-CCN: Lightweight Authentication & Access Control for Private Content-Centric Networks.
CoRR, 2018
Security and Privacy Analysis of National Science Foundation Future Internet Architectures.
IEEE Commun. Surv. Tutorials, 2018
Proceedings of the 37th IEEE Symposium on Reliable Distributed Systems, 2018
Proceedings of the 2018 IEEE International Symposium on Local and Metropolitan Area Networks, 2018
Proceedings of the 28. Krypto-Tag, 2018
Remote attestation of IoT devices via SMARM: Shuffled measurements against roving malware.
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018
Proceedings of the Computer Security, 2018
Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition, 2018
Proceedings of the 55th Annual Design Automation Conference, 2018
Temporal Consistency of Integrity-Ensuring Computations and Applications to Embedded Systems Security.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
KRB-CCN: Lightweight Authentication and Access Control for Private Content-Centric Networks.
Proceedings of the Applied Cryptography and Network Security, 2018
Assentication: User De-authentication and Lunchtime Attack Mitigation with Seated Posture Biometric.
Proceedings of the Applied Cryptography and Network Security, 2018
2017
ACM Trans. Priv. Secur., 2017
An Exploration of the Effects of Sensory Stimuli on the Completion of Security Tasks.
IEEE Secur. Priv., 2017
IACR Cryptol. ePrint Arch., 2017
Assentication: User Deauthentication and Lunchtime Attack Mitigation with Seated Posture Biometric.
CoRR, 2017
Comput. Commun. Rev., 2017
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 2017
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017
FUsing Hybrid Remote Attestation with a Formally Verified Microkernel: Lessons Learned.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks.
Proceedings of the Applied Cryptography and Network Security, 2017
Proceedings of the 4th ACM Conference on Information-Centric Networking, 2017
2016
Dagstuhl Reports, 2016
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016
Proceedings of the 2016 IFIP Networking Conference, 2016
Proceedings of the 53rd Annual Design Automation Conference, 2016
Proceedings of the 53rd Annual Design Automation Conference, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016
Proceedings of the 3rd ACM Conference on Information-Centric Networking, 2016
Proceedings of the 2016 AAAI Fall Symposia, Arlington, Virginia, USA, November 17-19, 2016, 2016
2015
Living in a PIT-less World: A Case Against Stateful Forwarding in Content-Centric Networking.
CoRR, 2015
CoRR, 2015
CoRR, 2015
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 2015
Proceedings of the 14th IEEE International Symposium on Network Computing and Applications, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
Proceedings of the 2nd International Conference on Information-Centric Networking, 2015
2014
Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints.
IEEE Trans. Inf. Forensics Secur., 2014
User Errors in the Performance of Security Critical Tasks in the Context of Adversarial Noise.
CoRR, 2014
Comput. Commun. Rev., 2014
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
Proceedings of the 2014 IEEE 13th International Symposium on Network Computing and Applications, 2014
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014
Proceedings of the second ACM conference on Online social networks, 2014
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, 2014
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014
2013
IEEE Trans. Mob. Comput., 2013
J. Comput. Secur., 2013
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
2012
Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber-physical convergence.
Pervasive Mob. Comput., 2012
J. Commun. Networks, 2012
On the performance of certain Private Set Intersection protocols. (And some remarks on the recent paper by Huang et al. in NDSS'12).
IACR Cryptol. ePrint Arch., 2012
IEEE Data Eng. Bull., 2012
Securing Instrumented Environments over Content-Centric Networking: the Case of Lighting Control
CoRR, 2012
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
IEEE Trans. Mob. Comput., 2011
Pervasive Mob. Comput., 2011
IEEE J. Sel. Areas Commun., 2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011
Proceedings of the Computer Security - ESORICS 2011, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010
Proceedings of the IEEE Tenth International Conference on Peer-to-Peer Computing, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010
2009
Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs.
IEEE Trans. Parallel Distributed Syst., 2009
Efficient and provably secure aggregation of encrypted data in wireless sensor networks.
ACM Trans. Sens. Networks, 2009
ACM Trans. Inf. Syst. Secur., 2009
IEEE Netw., 2009
Int. J. Appl. Cryptogr., 2009
IACR Cryptol. ePrint Arch., 2009
Practical Private Set Intersection Protocols with Linear Computational and Bandwidth Complexity.
IACR Cryptol. ePrint Arch., 2009
Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks.
Ad Hoc Networks, 2009
Ad Hoc Networks, 2009
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
2008
Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary.
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the First ACM Conference on Wireless Network Security, 2008
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008
Proceedings of the Information Security, 11th International Conference, 2008
Proceedings of the 16th annual IEEE International Conference on Network Protocols, 2008
Proceedings of the Topics in Cryptology, 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Proceedings of the AINTEC '08, 2008
2007
Correction to "Exploring Mesh and Tree-Based Multicast Routing Protocols for MANETs".
IEEE Trans. Mob. Comput., 2007
Comput. Networks, 2007
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking, 2007
Proceedings of the Public Key Infrastructure, 2007
Proceedings of the Topics in Cryptology, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
IEEE Trans. Mob. Comput., 2006
IACR Cryptol. ePrint Arch., 2006
Comput. Networks, 2006
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006
Proceedings of the 5th ACM Workshop on Hot Topics in Networks, 2006
Proceedings of the Data and Applications Security XX, 2006
Proceedings of the Database Systems for Advanced Applications, 2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
IEEE Trans. Dependable Secur. Comput., 2005
J. Inf. Sci. Eng., 2005
Flexible Framework for Secret Handshakes (Multi-Party Anonymous and Un-observable Authentication).
IACR Cryptol. ePrint Arch., 2005
DSAC: An Approach to Ensure Integrity of Outsourced Databases using Signature Aggregation and Chaining.
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, 2005
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005
Proceedings of the 13th IEEE International Conference on Network Protocols (ICNP 2005), 2005
Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31, 2005
2004
IEEE Trans. Parallel Distributed Syst., 2004
ACM Trans. Inf. Syst. Secur., 2004
J. Commun. Networks, 2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the (e)Proceedings of the Thirtieth International Conference on Very Large Data Bases, VLDB 2004, Toronto, Canada, August 31, 2004
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, 2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004
Proceedings of the International Workshop on Hot Topics in Peer-to-Peer Systems, 2004
Proceedings of the Advances in Database Technology, 2004
2003
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003
Proceedings of the 2nd IEEE International Symposium on Network Computing and Applications (NCA 2003), 2003
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control.
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003), 2003
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003
Proceedings of the Topics in Cryptology, 2003
2002
Proceedings of the First International IEEE Security in Storage Workshop, 2002
Proceedings of the Security in Communication Networks, Third International Conference, 2002
Proceedings of the Network and Distributed System Security Symposium, 2002
2001
Proceedings of the 10th USENIX Security Symposium, 2001
Communication-Efficient Group Key Agreement.
Proceedings of the Trusted Information: The New Decade Challenge, 2001
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001
2000
IEEE J. Sel. Areas Commun., 2000
IEEE J. Sel. Areas Commun., 2000
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000
Proceedings of the Designing Privacy Enhancing Technologies, 2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the CCS 2000, 2000
1999
Proceedings of the Tenth Annual ACM-SIAM Symposium on Discrete Algorithms, 1999
Proceedings of the Financial Cryptography, 1999
Proceedings of the 3rd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIAL-M 1999), 1999
1998
Proceedings of the 18th International Conference on Distributed Computing Systems, 1998
Proceedings of the Financial Cryptography, 1998
1997
Proceedings of the Network and Distributed System Security Symposium, 1997
Proceedings of the Proceedings IEEE INFOCOM '97, 1997
1996
Proceedings of the 1996 Symposium on Network and Distributed System Security, 1996
Proceedings of the Computer Security, 1996
Proceedings of the CCS '96, 1996
1995
ACM SIGOPS Oper. Syst. Rev., 1995
Comput. Commun., 1995
Proceedings of the First USENIX Workshop on Electronic Commerce, 1995
1994
Proceedings of the First Workshop on Mobile Computing Systems and Applications, 1994
1993
A protocol for route establishment and packet forwarding across multidomain internets.
IEEE/ACM Trans. Netw., 1993
Some Remarks on Protecting Weak Keys and Poorly-Chosen Secrets from Guessing Attacks.
Proceedings of the 12th Symposium on Reliable Distributed Systems, 1993
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993
1992
Proceedings of the Computer Security, 1992
Proceedings of the Computer Security, 1992
1991
1990
Proceedings of the The Second Conference on Innovative Applications of Artificial Intelligence (IAAI-90), 1990
1989
Datagram authentication in internet gateways: implications of fragmentation and dynamic routing.
IEEE J. Sel. Areas Commun., 1989
IEEE J. Sel. Areas Commun., 1989
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989
Proceedings of the Distributed Computing And Cryptography, 1989
1988
Comput. Commun. Rev., 1988
1987
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987