Reza Curtmola

Affiliations:
  • New Jersey Institute of Technology, Newark, USA


According to our database1, Reza Curtmola authored at least 68 papers between 2002 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Towards verifiable web-based code review systems.
J. Comput. Secur., 2023

2022
DFPS: A Distributed Mobile System for Free Parking Assignment.
IEEE Trans. Mob. Comput., 2022

Cloud Computing Security: Foundations and Research Directions.
Found. Trends Priv. Secur., 2022

Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses.
Proceedings of the 31st USENIX Security Symposium, 2022

Bootstrapping Trust in Community Repository Projects.
Proceedings of the Security and Privacy in Communication Networks, 2022

2021
Leakuidator: Leaky Resource Attacks and Countermeasures.
Proceedings of the Security and Privacy in Communication Networks, 2021

2020
Dynamic Interior Point Method for Vehicular Traffic Optimization.
IEEE Trans. Veh. Technol., 2020

Design and Implementation of an Overlay File System for Cloud-Assisted Mobile Apps.
IEEE Trans. Cloud Comput., 2020

Towards adding verifiability to web-based Git repositories.
J. Comput. Secur., 2020

2019
The Moitree middleware for distributed mobile-cloud computing.
J. Syst. Softw., 2019

Auditable Compressed Storage.
IACR Cryptol. ePrint Arch., 2019

in-toto: Providing farm-to-table guarantees for bits and bytes.
Proceedings of the 28th USENIX Security Symposium, 2019

Commit Signatures for Centralized Version Control Systems.
Proceedings of the ICT Systems Security and Privacy Protection, 2019

Multi-destination vehicular route planning with parking and traffic constraints.
Proceedings of the MobiQuitous 2019, 2019

2018
Sentio: Distributed Sensor Virtualization for Mobile Apps.
Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications, 2018

Collaborative Offloading for Distributed Mobile-Cloud Apps.
Proceedings of the 6th IEEE International Conference on Mobile Cloud Computing, 2018

Secure Storage with Replication and Transparent Deduplication.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

Context-Aware File Discovery System for Distributed Mobile-Cloud Apps.
Proceedings of the 2018 IEEE International Conference on Cloud Computing Technology and Science, 2018

le-git-imate: Towards Verifiable Web-based Git Repositories.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Remote data integrity checking with server-side repair.
J. Comput. Secur., 2017

Cooperative system for free parking assignment.
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017

2016
Crowdsensing in the Wild with Aliens and Micropayments.
IEEE Pervasive Comput., 2016

On Omitting Commits and Committing Omissions: Preventing Git Metadata Tampering That (Re)introduces Software Vulnerabilities.
Proceedings of the 25th USENIX Security Symposium, 2016

P2F2: Privacy-preserving face finder.
Proceedings of the 37th IEEE Sarnoff Symposium 2016, Newark, NJ, USA, 2016

An Overlay File System for cloud-assisted mobile applications.
Proceedings of the 32nd Symposium on Mass Storage Systems and Technologies, 2016

Moitree: A Middleware for Cloud-Assisted Mobile Distributed Apps.
Proceedings of the 4th IEEE International Conference on Mobile Cloud Computing, 2016

On-The-Fly Curbside Parking Assignment.
Proceedings of the 8th EAI International Conference on Mobile Computing, 2016

Indexing multimedia learning materials in ultimate course search.
Proceedings of the 14th International Workshop on Content-Based Multimedia Indexing, 2016

UCS: Ultimate course search.
Proceedings of the 14th International Workshop on Content-Based Multimedia Indexing, 2016

2015
Collaborative Bluetooth-based location authentication on smart phones.
Pervasive Mob. Comput., 2015

Avatar: Mobile Distributed Computing in the Cloud.
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, 2015

Towards Server-side Repair for Erasure Coding-based Distributed Storage Systems.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

2014
Auditable Version Control Systems.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Alien vs. Mobile user game: Fast and efficient area coverage in crowdsensing.
Proceedings of the 6th International Conference on Mobile Computing, 2014

2013
ILR: Improving Location Reliability in Mobile Crowd Sensing.
Int. J. Bus. Data Commun. Netw., 2013

Fostering participaction in smart cities: a geo-social crowdsensing platform.
IEEE Commun. Mag., 2013

Improving location reliability in crowd sensed data with minimal efforts.
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013

Towards self-repairing replication-based storage systems using untrusted clouds.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
Pollution Attacks and Defenses in Wireless Interflow Network Coding Systems.
IEEE Trans. Dependable Secur. Comput., 2012

Entropy attacks and countermeasures in wireless network coding.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Robust Dynamic Provable Data Possession.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

Robust dynamic remote data checking for public clouds.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Secure Routing in Wireless Mesh Networks.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Security of Group Communication in Wireless Mesh Networks.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Secure Network Coding for Wireless Mesh Networks.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Security of Wireless Mesh Networks (General Overview).
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Secure High-Throughput Multicast Routing in Wireless Mesh Networks.
IEEE Trans. Mob. Comput., 2011

Practical defenses against pollution attacks in wireless network coding.
ACM Trans. Inf. Syst. Secur., 2011

Remote data checking using provable data possession.
ACM Trans. Inf. Syst. Secur., 2011

Searchable symmetric encryption: Improved definitions and efficient constructions.
J. Comput. Secur., 2011

2010
Tradeoffs between security and communication performance in wireless mesh networks.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

LINK: Location Verification through Immediate Neighbors Knowledge.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2010

Remote data checking for network coding-based distributed storage systems.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010

2009
BSMR: Byzantine-Resilient Secure Multicast Routing in Multihop Wireless Networks.
IEEE Trans. Mob. Comput., 2009

Secure network coding for wireless mesh networks: Threats, challenges, and directions.
Comput. Commun., 2009

Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

2008
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks.
ACM Trans. Inf. Syst. Secur., 2008

Robust remote data checking.
Proceedings of the 2008 ACM Workshop On Storage Security And Survivability, 2008

On the Pitfalls of High-Throughput Multicast Metrics in Adversarial Wireless Mesh Networks.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

MR-PDP: Multiple-Replica Provable Data Possession.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

2007
Secure multicast routing in wireless networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2007

Provable Data Possession at Untrusted Stores.
IACR Cryptol. ePrint Arch., 2007

BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks.
Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, 2007

2006
A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks.
Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks, 2006

Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol.
Proceedings of the Security and Privacy in Ad-Hoc and Sensor Networks, 2006

2005
On the Survivability of Routing Protocols in Ad Hoc Wireless Networks.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

On the Performance and Analysis of DNS Security Extensions.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

2002
Medical Information Privacy Assurance: Cryptographic and System Aspects.
Proceedings of the Security in Communication Networks, Third International Conference, 2002


  Loading...