Gene Tsudik

Orcid: 0000-0002-8467-8614

Affiliations:
  • University of California, Irvine, USA


According to our database1, Gene Tsudik authored at least 350 papers between 1987 and 2024.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2014, "For contributions to Internet security and privacy.".

IEEE Fellow

IEEE Fellow 2013, "For contributions to distributed systems security and privacy".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Toward Remotely Verifiable Software Integrity in Resource-Constrained IoT Devices.
IEEE Commun. Mag., July, 2024

Towards Remotely Verifiable Software Integrity in Resource-Constrained IoT Devices.
CoRR, 2024

ProvCam: A Camera Module with Self-Contained TCB for Producing Verifiable Videos.
Proceedings of the 30th Annual International Conference on Mobile Computing and Networking, 2024

KESIC: Kerberos Extensions for Smart, IoT and CPS Devices.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024

<i>P</i>sfIVA: Privacy-Preserving Identity Verification Methods for Accountless Users via Private List Intersection and Variants.
Proceedings of the Computer Security - ESORICS 2024, 2024

Acoustic Side-Channel Attacks on a Computer Mouse.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024

Staving off the IoT Armageddon.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

The SA4P Framework: Sensing and Actuation as a Privilege.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

Element Distinctness and Bounded Input Size in Private Set Intersection and Related Protocols.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Balancing Security and Privacy in Genomic Range Queries.
ACM Trans. Priv. Secur., August, 2023

BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication.
Pervasive Mob. Comput., 2023

Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription.
IEEE Secur. Priv., 2023

Puppy: A Publicly Verifiable Watermarking Protocol.
CoRR, 2023

Dazed & Confused: A Large-Scale Real-World User Study of reCAPTCHAv2.
CoRR, 2023

Caveat (IoT) Emptor: Towards Transparency of IoT Device Presence (Full Version).
CoRR, 2023

PARseL: Towards a Verified Root-of-Trust over seL4.
CoRR, 2023

An Empirical Study & Evaluation of Modern CAPTCHAs.
Proceedings of the 32nd USENIX Security Symposium, 2023

VICEROY: GDPR-/CCPA-compliant Enforcement of Verifiable Accountless Consumer Requests.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

$\mathcal{P}\text{ARseL}$: Towards a Verified Root-of-Trust Over seL4.
Proceedings of the IEEE/ACM International Conference on Computer Aided Design, 2023

Caveat (IoT) Emptor: Towards Transparency of IoT Device Presence.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Poster: Control-Flow Integrity in Low-end Embedded Devices.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Thermal (and Hybrid Thermal/Audio) Side-Channel Attacks on Keyboard Input.
CoRR, 2022

SEDIMENT: An IoT-device-centric Methodology for Scalable 5G Network Security.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier.
Proceedings of the 31st USENIX Security Symposium, 2022

V'CER: Efficient Certificate Validation in Constrained Networks.
Proceedings of the 31st USENIX Security Symposium, 2022

GAROTA: Generalized Active Root-Of-Trust Architecture (for Tiny Embedded Devices).
Proceedings of the 31st USENIX Security Symposium, 2022

Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSA.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Privacy-Friendly De-authentication with BLUFADE: Blurred Face Detection.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications, 2022

Vronicle: verifiable provenance for videos from mobile devices.
Proceedings of the MobiSys '22: The 20th Annual International Conference on Mobile Systems, Applications and Services, Portland, Oregon, 27 June 2022, 2022

CASU: Compromise Avoidance via Secure Update for Low-End Embedded Systems.
Proceedings of the 41st IEEE/ACM International Conference on Computer-Aided Design, 2022

We Can Hear Your PIN Drop: An Acoustic Side-Channel Attack on ATM PIN Pads.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
PDoT: Private DNS-over-TLS with TEE Support.
DTRAP, 2021

Vronicle: A System for Producing Videos with Verifiable Provenance.
CoRR, 2021

GAROTA: Generalized Active Root-Of-Trust Architecture.
CoRR, 2021

Delegated attestation: scalable remote attestation of commodity CPS by blending proofs of execution with software attestation.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

CACTI: Captcha Avoidance via Client-side TEE Integration.
Proceedings of the 30th USENIX Security Symposium, 2021

On the Root of Trust Identification Problem.
Proceedings of the IPSN '21: The 20th International Conference on Information Processing in Sensor Networks, 2021

Tiny-CFA: Minimalistic Control-Flow Attestation Using Verified Proofs of Execution.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2021

DIALED: Data Integrity Attestation for Low-end Embedded Devices.
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021

ROSEN: RObust and SElective Non-repudiation (for TLS).
Proceedings of the CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, 2021

On the TOCTOU Problem in Remote Attestation.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Tiny-CFA: A Minimalistic Approach for Control-Flow Attestation Using Verified Proofs of Execution.
CoRR, 2020

APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise.
Proceedings of the 29th USENIX Security Symposium, 2020

A Proactive Cache Privacy Attack on NDN.
Proceedings of the NOMS 2020, 2020

SIMPLE: A Remote Attestation Approach for Resource-constrained IoT devices.
Proceedings of the 11th ACM/IEEE International Conference on Cyber-Physical Systems, 2020

Exploring Effects of Auditory Stimuli on CAPTCHA Performance.
Proceedings of the Financial Cryptography and Data Security, 2020

DE-auth of the Blue! Transparent De-authentication Using Bluetooth Low Energy Beacon.
Proceedings of the Computer Security - ESORICS 2020, 2020

Proofs or Remote Execution and Mitigation of TOCTOU Attacks.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

ProMACs: Progressive and Resynchronizing MACs for Continuous Efficient Authentication of Message Streams.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
In Content We Trust: Network-Layer Trust in Content-Centric Networking.
IEEE/ACM Trans. Netw., 2019

Remote Attestation via Self-Measurement.
ACM Trans. Design Autom. Electr. Syst., 2019

Skype & Type: Keyboard Eavesdropping in Voice-over-IP.
ACM Trans. Priv. Secur., 2019

Privacy-Aware Caching in Information-Centric Networking.
IEEE Trans. Dependable Secur. Comput., 2019

PILOT: Password and PIN information leakage from obfuscated typing videos.
J. Comput. Secur., 2019

A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise.
CoRR, 2019

MTRA: Multi-Tier randomized remote attestation in IoT networks.
Comput. Secur., 2019

Balancing Security and Privacy in Genomic Range Queries.
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019

Advancing remote attestation via computer-aided formal verification of designs and synthesis of executables: opinion.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

VRASED: A Verified Hardware/Software Co-Design for Remote Attestation.
Proceedings of the 28th USENIX Security Symposium, 2019

Towards Systematic Design of Collective Remote Attestation Protocols.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

PURE: Using Verified Remote Attestation to Obtain Proofs of Update, Reset and Erasure in low-End Embedded Systems.
Proceedings of the International Conference on Computer-Aided Design, 2019

HEALED: HEaling & Attestation for Low-End Embedded Devices.
Proceedings of the Financial Cryptography and Data Security, 2019

Thermanator: Thermal Residue-Based Post Factum Attacks on Keyboard Data Entry.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2018

Formally Verified Hardware/Software Co-Design for Remote Attestation.
CoRR, 2018

Thermanator: Thermal Residue-Based Post Factum Attacks On Keyboard Password Entry.
CoRR, 2018

KRB-CCN: Lightweight Authentication & Access Control for Private Content-Centric Networks.
CoRR, 2018

Security and Privacy Analysis of National Science Foundation Future Internet Architectures.
IEEE Commun. Surv. Tutorials, 2018

Initializing trust in smart devices via presence attestation.
Comput. Commun., 2018

US-AID: Unattended Scalable Attestation of IoT Devices.
Proceedings of the 37th IEEE Symposium on Reliable Distributed Systems, 2018

Content-Centric and Named-Data Networking Security: The Good, The Bad and The Rest.
Proceedings of the 2018 IEEE International Symposium on Local and Metropolitan Area Networks, 2018

Chains and Whips - An approach to lighweight MACs.
Proceedings of the 28. Krypto-Tag, 2018

Remote attestation of IoT devices via SMARM: Shuffled measurements against roving malware.
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018

SILK-TV: Secret Information Leakage from Keystroke Timing Videos.
Proceedings of the Computer Security, 2018

ERASMUS: Efficient remote attestation via self-measurement for unattended settings.
Proceedings of the 2018 Design, Automation & Test in Europe Conference & Exhibition, 2018

Reconciling remote attestation and safety-critical operation on simple IoT devices.
Proceedings of the 55th Annual Design Automation Conference, 2018

Temporal Consistency of Integrity-Ensuring Computations and Applications to Embedded Systems Security.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

KRB-CCN: Lightweight Authentication and Access Control for Private Content-Centric Networks.
Proceedings of the Applied Cryptography and Network Security, 2018

Assentication: User De-authentication and Lunchtime Attack Mitigation with Seated Posture Biometric.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
Pulse-Response: Exploring Human Body Impedance for Biometric Recognition.
ACM Trans. Priv. Secur., 2017

Genomic Security (Lest We Forget).
IEEE Secur. Priv., 2017

An Exploration of the Effects of Sensory Stimuli on the Completion of Security Tasks.
IEEE Secur. Priv., 2017

Probabilistic and Considerate Attestation of IoT Devices against Roving Malware.
IACR Cryptol. ePrint Arch., 2017

Assentication: User Deauthentication and Lunchtime Attack Mitigation with Seated Posture Biometric.
CoRR, 2017

Can We Make a Cake and Eat it Too? A Discussion of ICN Security and Privacy.
Comput. Commun. Rev., 2017

Authentication using pulse-response biometrics.
Commun. ACM, 2017

Private Set Projections & Variants.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

HYDRA: hybrid design for remote attestation (using a formally verified microkernel).
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Ditio: Trustworthy Auditing of Sensor Activities in Mobile & IoT Devices.
Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems, 2017

Namespace Tunnels in Content-Centric Networks.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

Mitigating On-Path Adversaries in Content-Centric Networks.
Proceedings of the 42nd IEEE Conference on Local Computer Networks, 2017

FADEWICH: Fast Deauthentication Over the Wireless Channel.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Closing the Floodgate with Stateless Content-Centric Networking.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

FUsing Hybrid Remote Attestation with a Formally Verified Microkernel: Lessons Learned.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017

MTRA: Multiple-tier remote attestation in IoT networks.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Presence Attestation: The Missing Link in Dynamic Trust Bootstrapping.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Security in Personal Genomics: Lest We Forget.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Don't Skype & Type!: Acoustic Eavesdropping in Voice-Over-IP.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Lightweight Swarm Attestation: A Tale of Two LISA-s.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks.
Proceedings of the Applied Cryptography and Network Security, 2017

When encryption is not enough: privacy attacks in content-centric networking.
Proceedings of the 4th ACM Conference on Information-Centric Networking, 2017

2016
Private Projections & Variants.
IACR Cryptol. ePrint Arch., 2016

Bounded Size-Hiding Private Set Intersection.
IACR Cryptol. ePrint Arch., 2016

Information-centric Networking and Security (Dagstuhl Seminar 16251).
Dagstuhl Reports, 2016

Security and Privacy Analysis of NSF Future Internet Architectures.
CoRR, 2016

Generating Secret Keys from Biometric Body Impedance Measurements.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

(The Futility of) Data Privacy in Content-Centric Networking.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016

DARPA: Device Attestation Resilient to Physical Attacks.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Practical accounting in content-centric networking.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

BEAD: Best effort autonomous deletion in content-centric networking.
Proceedings of the 2016 IFIP Networking Conference, 2016

Remote attestation for low-end embedded devices: the prover's perspective.
Proceedings of the 53rd Annual Design Automation Conference, 2016

Invited - Things, trouble, trust: on building trust in IoT systems.
Proceedings of the 53rd Annual Design Automation Conference, 2016

C-FLAT: Control-Flow Attestation for Embedded Systems Software.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

AC3N: Anonymous communication in Content-Centric Networking.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

Network Names in Content-Centric Networking.
Proceedings of the 3rd ACM Conference on Information-Centric Networking, 2016

Trilateral Large-Scale OSN Account Linkability Study.
Proceedings of the 2016 AAAI Fall Symposia, Arlington, Virginia, USA, November 17-19, 2016, 2016

2015
Genomic Privacy (Dagstuhl Seminar 15431).
Dagstuhl Reports, 2015

Practical Accounting in Content-Centric Networking (extended version).
CoRR, 2015

Living in a PIT-less World: A Case Against Stateful Forwarding in Content-Centric Networking.
CoRR, 2015

Interest-Based Access Control for Content Centric Networks (extended version).
CoRR, 2015

To NACK or not to NACK? Negative Acknowledgments in Information-Centric Networking.
CoRR, 2015

Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare?
Computer, 2015

UnLinked: Private Proximity-based Off-line OSN Interaction.
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 2015

Secure Fragmentation for Content-Centric Networks.
Proceedings of the 14th IEEE International Symposium on Network Computing and Applications, 2015

SEDA: Scalable Embedded Device Attestation.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Violating Consumer Anonymity: Geo-Locating Nodes in Named Data Networking.
Proceedings of the Applied Cryptography and Network Security, 2015

Interest-Based Access Control for Content Centric Networks.
Proceedings of the 2nd International Conference on Information-Centric Networking, 2015

2014
Securing First-Hop Data Provenance for Bodyworn Devices Using Wireless Link Fingerprints.
IEEE Trans. Inf. Forensics Secur., 2014

Are 140 Characters Enough? A Large-Scale Linkability Study of Tweets.
CoRR, 2014

User Errors in the Performance of Security Critical Tasks in the Context of Adversarial Noise.
CoRR, 2014

Elements of Trust in Named-Data Networking.
CoRR, 2014

Secure Fragmentation for Content-Centric Networks.
CoRR, 2014

Optimizing bi-directional low-latency communication in named data networking.
Comput. Commun. Rev., 2014

Network-Layer Trust in Named-Data Networking.
Comput. Commun. Rev., 2014

Stylometric Linkability of Tweets.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Secure Sensing over Named Data Networking.
Proceedings of the 2014 IEEE 13th International Symposium on Network Computing and Applications, 2014

A minimalist approach to Remote Attestation.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

Fighting authorship linkability with crowdsourcing.
Proceedings of the second ACM conference on Online social networks, 2014

Challenges in Remote Attestation of Low-End Embedded Devices.
Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, 2014

Covert ephemeral communication in named data networking.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
United We Stand: Intrusion Resilience in Mobile Unattended WSNs.
IEEE Trans. Mob. Comput., 2013

Can Jannie verify? Usability of display-equipped RFID tags for security purposes.
J. Comput. Secur., 2013

Genomic Privacy (Dagstuhl Seminar 13412).
Dagstuhl Reports, 2013

The Chills and Thrills of Whole Genome Sequencing.
CoRR, 2013

Secure genomic testing with size- and position-hiding private substring matching.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

Poseidon: Mitigating interest flooding DDoS attacks in Named Data Networking.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

Cache Privacy in Named-Data Networking.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

DoS and DDoS in Named Data Networking.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

Privacy-Preserving Matching of Community-Contributed Content.
Proceedings of the Computer Security - ESORICS 2013, 2013

2012
Self-healing in unattended wireless sensor networks.
ACM Trans. Sens. Networks, 2012

Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber-physical convergence.
Pervasive Mob. Comput., 2012

Reducing RFID reader load with the meet-in-the-middle strategy.
J. Commun. Networks, 2012

Harvesting SSL Certificate Data to Identify Web-Fraud.
Int. J. Netw. Secur., 2012

Systematic Treatment of Remote Attestation.
IACR Cryptol. ePrint Arch., 2012

On the performance of certain Private Set Intersection protocols. (And some remarks on the recent paper by Huang et al. in NDSS'12).
IACR Cryptol. ePrint Arch., 2012

Tweeting with Hummingbird: Privacy in Large-Scale Micro-Blogging OSNs.
IEEE Data Eng. Bull., 2012

Privacy-Oriented Cryptography (Dagstuhl Seminar 12381).
Dagstuhl Reports, 2012

Securing Instrumented Environments over Content-Centric Networking: the Case of Lighting Control
CoRR, 2012

Genodroid: are privacy-preserving genomic tests ready for prime time?
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012

Experimenting with Fast Private Set Intersection.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

ANDaNA: Anonymous Named Data Networking Application.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Exploring Linkability of User Reviews.
Proceedings of the Computer Security - ESORICS 2012, 2012

Fast and Private Computation of Cardinality of Set Intersection and Union.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

Private Computation of Spatial and Temporal Power Consumption with Smart Meters.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Flexible Robust Group Key Agreement.
IEEE Trans. Parallel Distributed Syst., 2011

ALARM: Anonymous Location-Aided Routing in Suspicious MANETs.
IEEE Trans. Mob. Comput., 2011

Intrusion-resilient integrity in data-centric unattended WSNs.
Pervasive Mob. Comput., 2011

Privacy-Preserving Location-Based On-Demand Routing in MANETs.
IEEE J. Sel. Areas Commun., 2011

Privacy-Preserving Cloud Database Querying.
J. Internet Serv. Inf. Secur., 2011

User-aided reader revocation in PKI-based RFID systems.
J. Comput. Secur., 2011

Enhancing Data Privacy in the Cloud.
IACR Cryptol. ePrint Arch., 2011

Hummingbird: Privacy at the time of Twitter.
IACR Cryptol. ePrint Arch., 2011

Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information.
IACR Cryptol. ePrint Arch., 2011

Fast and Private Computation of Set Intersection Cardinality.
IACR Cryptol. ePrint Arch., 2011

Exploring Linkablility of Community Reviewing
CoRR, 2011

Message from the workshop chairs.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Group Distance Bounding Protocols - (Short Paper).
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

Usability of Display-Equipped RFID Tags for Security Purposes.
Proceedings of the Computer Security - ESORICS 2011, 2011

Countering GATTACA: efficient and secure testing of fully-sequenced human genomes.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Security and privacy in emerging wireless networks.
IEEE Wirel. Commun., 2010

Privacy-Preserving Sharing of Sensitive Information.
IEEE Secur. Priv., 2010

Secure Code Update for Embedded Devices via Proofs of Secure Erasure.
IACR Cryptol. ePrint Arch., 2010

Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model.
IACR Cryptol. ePrint Arch., 2010

(If) Size Matters: Size-Hiding Private Set Intersection.
IACR Cryptol. ePrint Arch., 2010

GDB: Group Distance Bounding Protocols
CoRR, 2010

Securing Mobile Unattended WSNs against a Mobile Adversary.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

Taming Big Brother Ambitions: More Privacy for Secret Handshakes.
Proceedings of the Privacy Enhancing Technologies, 10th International Symposium, 2010

Some Security Topics with Possible Applications for Pairing-Based Cryptography.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010

Towards Plugging Privacy Leaks in the Domain Name System.
Proceedings of the IEEE Tenth International Conference on Peer-to-Peer Computing, 2010

Intrusion-Resilience in Mobile Unattended WSNs.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

IRRES: Intrusion-Resilient Remote Email Storage.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

Groupthink: usability of secure group association for wireless devices.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

Practical Private Set Intersection Protocols with Linear Complexity.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Affiliation-Hiding Key Exchange with Untrusted Group Authorities.
Proceedings of the Applied Cryptography and Network Security, 8th International Conference, 2010

2009
Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs.
IEEE Trans. Parallel Distributed Syst., 2009

Efficient and provably secure aggregation of encrypted data in wireless sensor networks.
ACM Trans. Sens. Networks, 2009

A new approach to secure logging.
ACM Trans. Storage, 2009

Universally Composable RFID Identification and Authentication Protocols.
ACM Trans. Inf. Syst. Secur., 2009

Data Security in Unattended Wireless Sensor Networks.
IEEE Trans. Computers, 2009

A comparative study of secure device pairing methods.
Pervasive Mob. Comput., 2009

New adversary and new threats: security in unattended sensor networks.
IEEE Netw., 2009

Leak-free mediated group signatures.
J. Comput. Secur., 2009

Secure pairing of interface constrained devices.
Int. J. Secur. Networks, 2009

Using audio in secure device pairing.
Int. J. Secur. Networks, 2009

Privacy-preserving revocation checking.
Int. J. Inf. Sec., 2009

Remarks on ''Analysis of one popular group signature scheme'' in Asiacrypt 2006.
Int. J. Appl. Cryptogr., 2009

Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems.
IACR Cryptol. ePrint Arch., 2009

Practical Private Set Intersection Protocols with Linear Computational and Bandwidth Complexity.
IACR Cryptol. ePrint Arch., 2009

Harvesting SSL Certificate Data to Mitigate Web-Fraud
CoRR, 2009

Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks.
Ad Hoc Networks, 2009

SRDP: Secure route discovery for dynamic source routing in MANETs.
Ad Hoc Networks, 2009

Collaborative authentication in unattended WSNs.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

Serial hook-ups: a comparative usability study of secure device pairing methods.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

Privacy-Preserving Policy-Based Information Transfer.
Proceedings of the Privacy Enhancing Technologies, 9th International Symposium, 2009

Caveat Emptor: A Comparative Study of Secure Device Pairing Methods.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

Privacy-Preserving Querying in Sensor Networks.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

Logging key assurance indicators in business processes.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Editorial.
ACM Trans. Inf. Syst. Secur., 2008

Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary.
IACR Cryptol. ePrint Arch., 2008

DISH: Distributed Self-Healing in Unattended Sensor Networks.
IACR Cryptol. ePrint Arch., 2008

Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks.
IACR Cryptol. ePrint Arch., 2008

Scalable and Efficient Provable Data Possession.
IACR Cryptol. ePrint Arch., 2008

RFID security and privacy: long-term research or short-term tinkering?
Proceedings of the First ACM Conference on Wireless Network Security, 2008

DISH: Distributed Self-Healing.
Proceedings of the Stabilization, 2008

POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks.
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008

Catch Me (If You Can): Data Survival in Unattended Sensor Networks.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

HAPADEP: Human-Assisted Pure Audio Device Pairing.
Proceedings of the Information Security, 11th International Conference, 2008

PRISM: Privacy-friendly routing in suspicious MANETs (and VANETs).
Proceedings of the 16th annual IEEE International Conference on Network Protocols, 2008

Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange.
Proceedings of the Topics in Cryptology, 2008

Confronting a mobile adversary in unattended sensor networks.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

Security and privacy in unattended sensor networks.
Proceedings of the AINTEC '08, 2008

2007
Equipping smart devices with public key signatures.
ACM Trans. Internet Techn., 2007

Correction to "Exploring Mesh and Tree-Based Multicast Routing Protocols for MANETs".
IEEE Trans. Mob. Comput., 2007

BEDA: Button-Enabled Device Pairing.
IACR Cryptol. ePrint Arch., 2007

HAPADEP: Human Asisted Pure Audio Device Pairing.
IACR Cryptol. ePrint Arch., 2007

Forward-Secure Sequential Aggregate Authentication.
IACR Cryptol. ePrint Arch., 2007

Threshold cryptography in P2P and MANETs: The case of access control.
Comput. Networks, 2007

Extended Abstract: Forward-Secure Sequential Aggregate Authentication.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Incentive-based cooperative and secure inter-personal networking.
Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking, 2007

Privacy-Preserving Revocation Checking with Modified CRLs.
Proceedings of the Public Key Infrastructure, 2007

Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement.
Proceedings of the Topics in Cryptology, 2007

Robust group key agreement using short broadcasts.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Authentication and integrity in outsourced databases.
ACM Trans. Storage, 2006

Exploring Mesh and Tree-Based Multicast Routing Protocols for MANETs.
IEEE Trans. Mob. Comput., 2006

A Family of Dunces: Trivial RFID Identification and Authentication Protocols.
IACR Cryptol. ePrint Arch., 2006

Simple and Flexible Private Revocation Checking.
IACR Cryptol. ePrint Arch., 2006

On Security of Sovereign Joins.
IACR Cryptol. ePrint Arch., 2006

Secure acknowledgment aggregation and multisignatures with limited robustness.
Comput. Networks, 2006

A Flexible Framework for Secret Handshakes.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

Simple and Flexible Revocation Checking with Privacy.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

YA-TRAP: Yet Another Trivial RFID Authentication Protocol.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

A Technical Approach to Net Neutrality.
Proceedings of the 5th ACM Workshop on Hot Topics in Networks, 2006

Aggregation Queries in the Database-As-a-Service Model.
Proceedings of the Data and Applications Security XX, 2006

Authentication of Outsourced Databases Using Signature Aggregation and Chaining.
Proceedings of the Database Systems for Advanced Applications, 2006

Authentication for Paranoids: Multi-party Secret Handshakes.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Secure Spread: An Integrated Architecture for Secure Group Communication.
IEEE Trans. Dependable Secur. Comput., 2005

A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks.
J. Inf. Sci. Eng., 2005

Flexible Framework for Secret Handshakes (Multi-Party Anonymous and Un-observable Authentication).
IACR Cryptol. ePrint Arch., 2005

Revisiting Oblivious Signature-Based Envelopes.
IACR Cryptol. ePrint Arch., 2005

DSAC: An Approach to Ensure Integrity of Outsourced Databases using Signature Aggregation and Chaining.
IACR Cryptol. ePrint Arch., 2005

Loud and Clear: Human-Verifiable Authentication Based on Audio.
IACR Cryptol. ePrint Arch., 2005

Improving Secure Server Performance by Re-balancing SSL/TLS Handshakes.
IACR Cryptol. ePrint Arch., 2005

Brief announcement: a flexible framework for secret handshakes.
Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, 2005

SRDP: Securing Route Discovery in DSR.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

E.cient Aggregation of encrypted data in Wireless Sensor Networks.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

Efficient Node Admission for Short-lived Mobile Ad Hoc Networks.
Proceedings of the 13th IEEE International Conference on Network Protocols (ICNP 2005), 2005

Sanitizable Signatures.
Proceedings of the Computer Security, 2005

DSAC: integrity for outsourced databases with signature aggregation and chaining.
Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31, 2005

2004
Secure Group Communication Using Robust Contributory Key Agreement.
IEEE Trans. Parallel Distributed Syst., 2004

Fine-grained control of security capabilities.
ACM Trans. Internet Techn., 2004

Tree-based group key agreement.
ACM Trans. Inf. Syst. Secur., 2004

On the performance of group key agreement protocols.
ACM Trans. Inf. Syst. Secur., 2004

Group Key Agreement Efficient in Communication.
IEEE Trans. Computers, 2004

An architecture for key management in hierarchical mobile ad-hoc networks.
J. Commun. Networks, 2004

Signature Bouquets: Immutability for Aggregated/Condensed Signatures.
IACR Cryptol. ePrint Arch., 2004

Secret Handshakes from CA-Oblivious Encryption.
IACR Cryptol. ePrint Arch., 2004

A Privacy-Preserving Index for Range Queries.
Proceedings of the (e)Proceedings of the Thirtieth International Conference on Very Large Data Bases, VLDB 2004, Toronto, Canada, August 31, 2004

A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004

Brief announcement: secret handshakes from CA-oblivious encryption.
Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, 2004

Identity-Based Access Control for Ad Hoc Groups.
Proceedings of the Information Security and Cryptology, 2004

Leak-Free Group Signatures with Immediate Revocation.
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS 2004), 2004

Access control in ad hoc groups.
Proceedings of the International Workshop on Hot Topics in Peer-to-Peer Systems, 2004

A Framework for Efficient Storage Security in RDBMS.
Proceedings of the Advances in Database Technology, 2004

2003
Accumulating Composites and Improved Group Signing.
IACR Cryptol. ePrint Arch., 2003

How to construct optimal one-time signatures.
Comput. Networks, 2003

Secure group key management for storage area networks.
IEEE Commun. Mag., 2003

Admission control in Peer-to-Peer: design and performance evaluation.
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003

Admission Control in Peer Groups.
Proceedings of the 2nd IEEE International Symposium on Network Computing and Applications (NCA 2003), 2003

On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control.
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003), 2003

Scaling Secure Group Communication Systems: Beyond Peer-to-Peer.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

Simple Identity-Based Cryptography with Mediated RSA.
Proceedings of the Topics in Cryptology, 2003

2002
Secure Group Services for Storage Area Networks.
Proceedings of the First International IEEE Security in Storage Workshop, 2002

Weak Forward Security in Mediated RSA.
Proceedings of the Security in Communication Networks, Third International Conference, 2002

Experimenting with Server-Aided Signatures.
Proceedings of the Network and Distributed System Security Symposium, 2002

2001
Flooding for Reliable Multicast in Multi-Hop Ad Hoc Networks.
Wirel. Networks, 2001

Quasi-Efficient Revocation of Group Signatures.
IACR Cryptol. ePrint Arch., 2001

A Method for Fast Revocation of Public Key Certificates and Security Capabilities.
Proceedings of the 10th USENIX Security Symposium, 2001

Communication-Efficient Group Key Agreement.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

An Integrated Solution for Secure Group Communication in Wide-Area Networks.
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001

Pushing the Limits of Multicast in Ad Hoc Networks.
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001

Exploring Robustness in Group Key Agreement.
Proceedings of the 21st International Conference on Distributed Computing Systems (ICDCS 2001), 2001

2000
Key Agreement in Dynamic Peer Groups.
IEEE Trans. Parallel Distributed Syst., 2000

Design, implementation, and deployment of the iKP secure electronic payment system.
IEEE J. Sel. Areas Commun., 2000

New multiparty authentication services and key agreement protocols.
IEEE J. Sel. Areas Commun., 2000

IP multicast security: Issues and directions.
Ann. des Télécommunications, 2000

Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000

Towards an Analysis of Onion Routing Security.
Proceedings of the Designing Privacy Enhancing Technologies, 2000

A Practical and Provably Secure Coalition-Resistant Group Signature Scheme.
Proceedings of the Advances in Cryptology, 2000

Simple and fault-tolerant key agreement for dynamic collaborative groups.
Proceedings of the CCS 2000, 2000

1999
Lowering security overhead in link state routing.
Comput. Networks, 1999

Untraceable mobility or how to travel incognito.
Comput. Networks, 1999

Group Signatures <i>Á la carte</i>.
Proceedings of the Tenth Annual ACM-SIAM Symposium on Discrete Algorithms, 1999

Some Open Issues and New Directions in Group Signatures.
Proceedings of the Financial Cryptography, 1999

Flooding for reliable multicast in multi-hop ad hoc networks.
Proceedings of the 3rd International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIAL-M 1999), 1999

1998
Secret Sets and Applications.
Inf. Process. Lett., 1998

CLIQUES: A New Approach to Group Key Agreement.
Proceedings of the 18th International Conference on Distributed Computing Systems, 1998

Secure Group Barter: Multi-party Fair Exchange with Semi-Trusted Neutral Parties.
Proceedings of the Financial Cryptography, 1998

A Security Architecture for Computational Grids.
Proceedings of the CCS '98, 1998

Authenticated Group Key Agreement and Friends.
Proceedings of the CCS '98, 1998

1997
ATM cell encryption and key update synchronization.
Telecommun. Syst., 1997

Server-Supported Signatures.
J. Comput. Secur., 1997

Reducing the Cost of Security in Link-State Routing.
Proceedings of the Network and Distributed System Security Symposium, 1997

Scalability and Flexibility in Authentication Services: The KryptoKnight Approach.
Proceedings of the Proceedings IEEE INFOCOM '97, 1997

1996
Robust and Secure Password and Key Change Method.
J. Comput. Secur., 1996

Mixing Email with Babel.
Proceedings of the 1996 Symposium on Network and Distributed System Security, 1996

Limitations of the Approach of Solving a Network's Security Problem with a Firewall.
Proceedings of the Computer Security, 1996

Diffie-Hellman Key Distribution Extended to Group Communication.
Proceedings of the CCS '96, 1996

1995
Itinerant agents for mobile computing.
IEEE Wirel. Commun., 1995

Refinement and Extension of Encrypted Key Exchange.
ACM SIGOPS Oper. Syst. Rev., 1995

Secure and minimal protocols for authenticated key distribution.
Comput. Commun., 1995

iKP - A Family of Secure Electronic Payment Protocols.
Proceedings of the First USENIX Workshop on Electronic Commerce, 1995

1994
Authentication of mobile users.
IEEE Netw., 1994

On Travelling Incognito.
Proceedings of the First Workshop on Mobile Computing Systems and Applications, 1994

1993
A protocol for route establishment and packet forwarding across multidomain internets.
IEEE/ACM Trans. Netw., 1993

Some Remarks on Protecting Weak Keys and Poorly-Chosen Secrets from Guessing Attacks.
Proceedings of the 12th Symposium on Reliable Distributed Systems, 1993

Authentication method with impersonal token cards.
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993

On Simple and Secure Key Distribution.
Proceedings of the CCS '93, 1993

1992
Message authentication with one-way hash functions.
Comput. Commun. Rev., 1992

Policy Enforcement in Stub Autonomous Domains.
Proceedings of the Computer Security, 1992

KryptoKnight Authentication and Key Distribution System.
Proceedings of the Computer Security, 1992

1991
Secure Control of Transit Internetwork Traffic.
Comput. Networks ISDN Syst., 1991

1990
AudES - An Expert System for Security Auditing.
Proceedings of the The Second Conference on Innovative Applications of Artificial Intelligence (IAAI-90), 1990

1989
Datagram authentication in internet gateways: implications of fragmentation and dynamic routing.
IEEE J. Sel. Areas Commun., 1989

Visa protocols for controlling interorganizational datagram flow.
IEEE J. Sel. Areas Commun., 1989

Security Issues in Policy Routing.
Proceedings of the 1989 IEEE Symposium on Security and Privacy, 1989

Secure Policy Enforcement in Internetworks.
Proceedings of the Distributed Computing And Cryptography, 1989

1988
Implications of fragmentation dynamic routing for internet datagram authentication.
Comput. Commun. Rev., 1988

1987
Visa Scheme for Inter-Organization Network Security.
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987


  Loading...