Reza Curtmola
Affiliations:- New Jersey Institute of Technology, Newark, USA
According to our database1,
Reza Curtmola
authored at least 68 papers
between 2002 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on web.njit.edu
On csauthors.net:
Bibliography
2023
2022
IEEE Trans. Mob. Comput., 2022
Found. Trends Priv. Secur., 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the Security and Privacy in Communication Networks, 2022
2021
Proceedings of the Security and Privacy in Communication Networks, 2021
2020
IEEE Trans. Veh. Technol., 2020
IEEE Trans. Cloud Comput., 2020
2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the ICT Systems Security and Privacy Protection, 2019
Proceedings of the MobiQuitous 2019, 2019
2018
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications, 2018
Proceedings of the 6th IEEE International Conference on Mobile Cloud Computing, 2018
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018
Proceedings of the 2018 IEEE International Conference on Cloud Computing Technology and Science, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017
2016
On Omitting Commits and Committing Omissions: Preventing Git Metadata Tampering That (Re)introduces Software Vulnerabilities.
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 37th IEEE Sarnoff Symposium 2016, Newark, NJ, USA, 2016
Proceedings of the 32nd Symposium on Mass Storage Systems and Technologies, 2016
Proceedings of the 4th IEEE International Conference on Mobile Cloud Computing, 2016
Proceedings of the 8th EAI International Conference on Mobile Computing, 2016
Proceedings of the 14th International Workshop on Content-Based Multimedia Indexing, 2016
Proceedings of the 14th International Workshop on Content-Based Multimedia Indexing, 2016
2015
Pervasive Mob. Comput., 2015
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, 2015
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the 6th International Conference on Mobile Computing, 2014
2013
Int. J. Bus. Data Commun. Netw., 2013
IEEE Commun. Mag., 2013
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
IEEE Trans. Mob. Comput., 2011
ACM Trans. Inf. Syst. Secur., 2011
ACM Trans. Inf. Syst. Secur., 2011
J. Comput. Secur., 2011
2010
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2010
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010
2009
IEEE Trans. Mob. Comput., 2009
Secure network coding for wireless mesh networks: Threats, challenges, and directions.
Comput. Commun., 2009
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
2008
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks.
ACM Trans. Inf. Syst. Secur., 2008
Proceedings of the 2008 ACM Workshop On Storage Security And Survivability, 2008
On the Pitfalls of High-Throughput Multicast Metrics in Adversarial Wireless Mesh Networks.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008
2007
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2007
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007
2006
A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks.
Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks, 2006
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006
2005
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005
2002
Proceedings of the Security in Communication Networks, Third International Conference, 2002