Search the dblp DataBase
Gene Tsudik :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Stanislaw Jarecki , Jihye Kim , Gene Tsudik Authentication for Paranoids: Multi-party Secret Handshakes. [Citation Graph (0, 0)][DBLP ] ACNS, 2006, pp:325-339 [Conf ] Claude Castelluccia , Stanislaw Jarecki , Gene Tsudik Secret Handshakes from CA-Oblivious Encryption. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:293-307 [Conf ] Gene Tsudik , Shouhuai Xu Accumulating Composites and Improved Group Signing. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:269-286 [Conf ] Giuseppe Ateniese , Michael Steiner , Gene Tsudik Authenticated Group Key Agreement and Friends. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1998, pp:17-26 [Conf ] Claude Castelluccia , Einar Mykletun , Gene Tsudik Improving secure server performance by re-balancing SSL/TLS handshakes. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:26-34 [Conf ] Ian T. Foster , Carl Kesselman , Gene Tsudik , Steven Tuecke A Security Architecture for Computational Grids. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1998, pp:83-92 [Conf ] Yongdae Kim , Adrian Perrig , Gene Tsudik Simple and fault-tolerant key agreement for dynamic collaborative groups. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2000, pp:235-244 [Conf ] Gene Tsudik , Els Van Herreweghen On Simple and Secure Key Distribution. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1993, pp:49-57 [Conf ] Michael Steiner , Gene Tsudik , Michael Waidner Diffie-Hellman Key Distribution Extended to Group Communication. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1996, pp:31-37 [Conf ] Maithili Narasimha , Gene Tsudik DSAC: integrity for outsourced databases with signature aggregation and chaining. [Citation Graph (0, 0)][DBLP ] CIKM, 2005, pp:235-236 [Conf ] Giuseppe Ateniese , Jan Camenisch , Marc Joye , Gene Tsudik A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2000, pp:255-270 [Conf ] Xuhua Ding , Gene Tsudik Simple Identity-Based Cryptography with Mediated RSA. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:193-210 [Conf ] Stanislaw Jarecki , Jihye Kim , Gene Tsudik Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2007, pp:287-308 [Conf ] Maithili Narasimha , Gene Tsudik Authentication of Outsourced Databases Using Signature Aggregation and Chaining. [Citation Graph (0, 0)][DBLP ] DASFAA, 2006, pp:420-436 [Conf ] Einar Mykletun , Gene Tsudik Aggregation Queries in the Database-As-a-Service Model. [Citation Graph (0, 0)][DBLP ] DBSec, 2006, pp:89-103 [Conf ] Christopher Ho , Katia Obraczka , Gene Tsudik , Kumar Viswanath Flooding for reliable multicast in multi-hop ad hoc networks. [Citation Graph (0, 0)][DBLP ] DIAL-M, 1999, pp:64-71 [Conf ] Paul F. Syverson , Gene Tsudik , Michael G. Reed , Carl E. Landwehr Towards an Analysis of Onion Routing Security. [Citation Graph (0, 0)][DBLP ] Workshop on Design Issues in Anonymity and Unobservability, 2000, pp:96-114 [Conf ] Yair Amir , Cristina Nita-Rotaru , Jonathan Robert Stanton , Gene Tsudik Scaling Secure Group Communication Systems: Beyond Peer-to-Peer. [Citation Graph (0, 0)][DBLP ] DISCEX (1), 2003, pp:226-237 [Conf ] Balakrishna R. Iyer , Sharad Mehrotra , Einar Mykletun , Gene Tsudik , Yonghua Wu A Framework for Efficient Storage Security in RDBMS. [Citation Graph (0, 0)][DBLP ] EDBT, 2004, pp:147-164 [Conf ] N. Asokan , Gene Tsudik , Michael Waidner Server-Supported Signatures. [Citation Graph (0, 0)][DBLP ] ESORICS, 1996, pp:131-143 [Conf ] Giuseppe Ateniese , Daniel H. Chou , Breno de Medeiros , Gene Tsudik Sanitizable Signatures. [Citation Graph (0, 0)][DBLP ] ESORICS, 2005, pp:159-177 [Conf ] Ralf C. Hauser , Philippe A. Janson , Refik Molva , Gene Tsudik , Els Van Herreweghen Robust and Secure Password and Key Change Method. [Citation Graph (0, 0)][DBLP ] ESORICS, 1994, pp:107-122 [Conf ] Stefano Zatti , Refik Molva , Angelo Tosi , Gene Tsudik , Helmut Kurth Limitations of the Approach of Solving a Network's Security Problem with a Firewall. [Citation Graph (0, 0)][DBLP ] ESORICS, 1996, pp:144-145 [Conf ] Refik Molva , Gene Tsudik , Els Van Herreweghen , Stefano Zatti KryptoKnight Authentication and Key Distribution System. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:155-174 [Conf ] Einar Mykletun , Maithili Narasimha , Gene Tsudik Signature Bouquets: Immutability for Aggregated/Condensed Signatures. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:160-176 [Conf ] Gene Tsudik Policy Enforcement in Stub Autonomous Domains. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:229-257 [Conf ] Giuseppe Ateniese , Dawn Xiaodong Song , Gene Tsudik Quasi-Efficient Revocation in Group Signatures. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2002, pp:183-197 [Conf ] Giuseppe Ateniese , Gene Tsudik Some Open Issues and New Directions in Group Signatures. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1999, pp:196-211 [Conf ] Matthew K. Franklin , Gene Tsudik Secure Group Barter: Multi-party Fair Exchange with Semi-Trusted Neutral Parties. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1998, pp:90-102 [Conf ] Samad Nasserian , Gene Tsudik Revisiting Oblivious Signature-Based Envelopes. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2006, pp:221-235 [Conf ] Gene Tsudik , Rita C. Summers AudES - An Expert System for Security Auditing. [Citation Graph (0, 0)][DBLP ] IAAI, 1990, pp:221-232 [Conf ] Yair Amir , Yongdae Kim , Cristina Nita-Rotaru , Gene Tsudik On the Performance of Group Key Agreement Protocols. [Citation Graph (0, 0)][DBLP ] ICDCS, 2002, pp:463-464 [Conf ] Yair Amir , Cristina Nita-Rotaru , John L. Schultz , Jonathan Robert Stanton , Yongdae Kim , Gene Tsudik Exploring Robustness in Group Key Agreement. [Citation Graph (0, 0)][DBLP ] ICDCS, 2001, pp:399-408 [Conf ] Xuhua Ding , Gene Tsudik , Shouhuai Xu Leak-Free Group Signatures with Immediate Revocation. [Citation Graph (0, 0)][DBLP ] ICDCS, 2004, pp:608-615 [Conf ] Michael T. Goodrich , Michael Sirivianos , John Solis , Gene Tsudik , Ersin Uzun Loud and Clear: Human-Verifiable Authentication Based on Audio. [Citation Graph (0, 0)][DBLP ] ICDCS, 2006, pp:10- [Conf ] Katia Obraczka , Gene Tsudik , Kumar Viswanath Pushing the Limits of Multicast in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICDCS, 2001, pp:719-722 [Conf ] Jonathan Robert Stanton , Yair Amir , Damian Hasse , Giuseppe Ateniese , Yongdae Kim , Cristina Nita-Rotaru , Theo Schlossnagle , John L. Schultz , Gene Tsudik Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments. [Citation Graph (0, 0)][DBLP ] ICDCS, 2000, pp:330-343 [Conf ] Michael Steiner , Gene Tsudik , Michael Waidner CLIQUES: A New Approach to Group Key Agreement. [Citation Graph (0, 0)][DBLP ] ICDCS, 1998, pp:380-387 [Conf ] Nitesh Saxena , Gene Tsudik , Jeong Hyun Yi Identity-Based Access Control for Ad Hoc Groups. [Citation Graph (0, 0)][DBLP ] ICISC, 2004, pp:362-379 [Conf ] Maithili Narasimha , Gene Tsudik , Jeong Hyun Yi On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control. [Citation Graph (0, 0)][DBLP ] ICNP, 2003, pp:336-0 [Conf ] Nitesh Saxena , Gene Tsudik , Jeong Hyun Yi Efficient Node Admission for Short-lived Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICNP, 2005, pp:269-278 [Conf ] Philippe A. Janson , Gene Tsudik , Moti Yung Scalability and Flexibility in Authentication Services: The KryptoKnight Approach. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1997, pp:725-736 [Conf ] Gene Tsudik Message Authentication with One-Way Hash Functions. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1992, pp:2055-2059 [Conf ] Deborah A. Agarwal , Olivier Chevassut , Mary R. Thompson , Gene Tsudik An Integrated Solution for Secure Group Communication in Wide-Area Networks. [Citation Graph (0, 0)][DBLP ] ISCC, 2001, pp:22-28 [Conf ] Claude Castelluccia , Einar Mykletun , Gene Tsudik E.cient Aggregation of encrypted data in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] MobiQuitous, 2005, pp:109-117 [Conf ] Jihye Kim , Gene Tsudik SRDP: Securing Route Discovery in DSR. [Citation Graph (0, 0)][DBLP ] MobiQuitous, 2005, pp:247-260 [Conf ] Yongdae Kim , Daniele Mazzocchi , Gene Tsudik Admission Control in Peer Groups. [Citation Graph (0, 0)][DBLP ] NCA, 2003, pp:131-139 [Conf ] Ralf C. Hauser , Tony Przygienda , Gene Tsudik Reducing the Cost of Security in Link-State Routing. [Citation Graph (0, 0)][DBLP ] NDSS, 1997, pp:- [Conf ] Xuhua Ding , Daniele Mazzocchi , Gene Tsudik Experimenting with Server-Aided Signatures. [Citation Graph (0, 0)][DBLP ] NDSS, 2002, pp:- [Conf ] Einar Mykletun , Maithili Narasimha , Gene Tsudik Authentication and Integrity in Outsourced Databases. [Citation Graph (0, 0)][DBLP ] NDSS, 2004, pp:- [Conf ] Gene Tsudik YA-TRAP: Yet Another Trivial RFID Authentication Protocol. [Citation Graph (0, 0)][DBLP ] PerCom Workshops, 2006, pp:640-643 [Conf ] John Solis , Gene Tsudik Simple and Flexible Revocation Checking with Privacy. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2006, pp:351-367 [Conf ] Gene Tsudik , Shouhuai Xu A Flexible Framework for Secret Handshakes. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2006, pp:295-315 [Conf ] Claude Castelluccia , Stanislaw Jarecki , Gene Tsudik Brief announcement: secret handshakes from CA-oblivious encryption. [Citation Graph (0, 0)][DBLP ] PODC, 2004, pp:394- [Conf ] Gene Tsudik , Shouhuai Xu Brief announcement: a flexible framework for secret handshakes. [Citation Graph (0, 0)][DBLP ] PODC, 2005, pp:39- [Conf ] Nitesh Saxena , Gene Tsudik , Jeong Hyun Yi Admission control in Peer-to-Peer: design and performance evaluation. [Citation Graph (0, 0)][DBLP ] SASN, 2003, pp:104-113 [Conf ] Claude Castelluccia , Stanislaw Jarecki , Jihye Kim , Gene Tsudik A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation. [Citation Graph (0, 0)][DBLP ] SCN, 2004, pp:193-207 [Conf ] Gene Tsudik Weak Forward Security in Mediated RSA. [Citation Graph (0, 0)][DBLP ] SCN, 2002, pp:45-54 [Conf ] Yongdae Kim , Adrian Perrig , Gene Tsudik Communication-Efficient Group Key Agreement. [Citation Graph (0, 0)][DBLP ] SEC, 2001, pp:229-244 [Conf ] Yongdae Kim , Maithili Narasimha , Fabio Maino , Gene Tsudik Secure Group Services for Storage Area Networks. [Citation Graph (0, 0)][DBLP ] IEEE Security in Storage Workshop, 2002, pp:80-93 [Conf ] Giuseppe Ateniese , Gene Tsudik Group Signatures Á la carte . [Citation Graph (0, 0)][DBLP ] SODA, 1999, pp:848-849 [Conf ] Deborah Estrin , Gene Tsudik Visa Scheme for Inter-Organization Network Security. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1987, pp:174-183 [Conf ] Deborah Estrin , Gene Tsudik Security Issues in Policy Routing. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1989, pp:183-193 [Conf ] Di Ma , Gene Tsudik Extended Abstract: Forward-Secure Sequential Aggregate Authentication. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:86-91 [Conf ] Gene Tsudik , Els Van Herreweghen Some Remarks on Protecting Weak Keys and Poorly-Chosen Secrets from Guessing Attacks. [Citation Graph (0, 0)][DBLP ] Symposium on Reliable Distributed Systems, 1993, pp:136-142 [Conf ] Bijit Hore , Sharad Mehrotra , Gene Tsudik A Privacy-Preserving Index for Range Queries. [Citation Graph (0, 0)][DBLP ] VLDB, 2004, pp:720-731 [Conf ] Giuseppe Ateniese , Amir Herzberg , Hugo Krawczyk , Gene Tsudik Untraceable mobility or how to travel incognito. [Citation Graph (0, 0)][DBLP ] Computer Networks, 1999, v:31, n:8, pp:871-884 [Journal ] Kemal Bicakci , Gene Tsudik , Brian Tung How to construct optimal one-time signatures. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2003, v:43, n:3, pp:339-349 [Journal ] Deborah Estrin , Gene Tsudik Secure Control of Transit Internetwork Traffic. [Citation Graph (0, 0)][DBLP ] Computer Networks and ISDN Systems, 1991, v:22, n:5, pp:363-382 [Journal ] Ralf C. Hauser , Tony Przygienda , Gene Tsudik Lowering security overhead in link state routing. [Citation Graph (0, 0)][DBLP ] Computer Networks, 1999, v:31, n:8, pp:885-894 [Journal ] Claude Castelluccia , Stanislaw Jarecki , Jihye Kim , Gene Tsudik Secure acknowledgment aggregation and multisignatures with limited robustness. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2006, v:50, n:10, pp:1639-1652 [Journal ] Philippe A. Janson , Gene Tsudik Secure and minimal protocols for authenticated key distribution. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1995, v:18, n:9, pp:645-653 [Journal ] Refik Molva , Gene Tsudik Secret Sets and Applications. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1998, v:65, n:1, pp:47-55 [Journal ] N. Asokan , Gene Tsudik , Michael Waidner Server-Supported Signatures. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1997, v:5, n:1, pp:91-108 [Journal ] Ralf C. Hauser , Philippe A. Janson , Refik Molva , Gene Tsudik , Els Van Herreweghen Robust and Secure Password and Key Change Method. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1996, v:4, n:1, pp:97-112 [Journal ] Kyung Hyune Rhee , Young-Ho Park , Gene Tsudik A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks. [Citation Graph (0, 0)][DBLP ] J. Inf. Sci. Eng., 2005, v:21, n:2, pp:415-428 [Journal ] Michael Steiner , Gene Tsudik , Michael Waidner Refinement and Extension of Encrypted Key Exchange. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1995, v:29, n:3, pp:22-30 [Journal ] Yongdae Kim , Adrian Perrig , Gene Tsudik Group Key Agreement Efficient in Communication. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2004, v:53, n:7, pp:905-921 [Journal ] Yair Amir , Cristina Nita-Rotaru , Jonathan Robert Stanton , Gene Tsudik Secure Spread: An Integrated Architecture for Secure Group Communication. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:3, pp:248-261 [Journal ] James P. Gray , Ajay D. Kshemkalyani , Stephen M. Matyas , Mohammad Peyravian , Gene Tsudik ATM cell encryption and key update synchronization. [Citation Graph (0, 0)][DBLP ] Telecommunication Systems, 1997, v:7, n:4, pp:391-408 [Journal ] Yair Amir , Yongdae Kim , Cristina Nita-Rotaru , Gene Tsudik On the performance of group key agreement protocols. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:3, pp:457-488 [Journal ] Yongdae Kim , Adrian Perrig , Gene Tsudik Tree-based group key agreement. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:1, pp:60-96 [Journal ] Kumar Viswanath , Katia Obraczka , Gene Tsudik Exploring Mesh and Tree-Based Multicast Routing Protocols for MANETs. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Mob. Comput., 2006, v:5, n:1, pp:28-42 [Journal ] Kumar Viswanath , Katia Obraczka , Gene Tsudik Correction to "Exploring Mesh and Tree-Based Multicast Routing Protocols for MANETs". [Citation Graph (0, 0)][DBLP ] IEEE Trans. Mob. Comput., 2007, v:6, n:2, pp:237- [Journal ] Xuhua Ding , Daniele Mazzocchi , Gene Tsudik Equipping smart devices with public key signatures. [Citation Graph (0, 0)][DBLP ] ACM Trans. Internet Techn., 2007, v:7, n:1, pp:- [Journal ] Dan Boneh , Xuhua Ding , Gene Tsudik Fine-grained control of security capabilities. [Citation Graph (0, 0)][DBLP ] ACM Trans. Internet Techn., 2004, v:4, n:1, pp:60-82 [Journal ] Deborah Estrin , Martha Steenstrup , Gene Tsudik A protocol for route establishment and packet forwarding across multidomain internets. [Citation Graph (0, 0)][DBLP ] IEEE/ACM Trans. Netw., 1993, v:1, n:1, pp:56-70 [Journal ] Einar Mykletun , Maithili Narasimha , Gene Tsudik Authentication and integrity in outsourced databases. [Citation Graph (0, 0)][DBLP ] TOS, 2006, v:2, n:2, pp:107-138 [Journal ] Yair Amir , Yongdae Kim , Cristina Nita-Rotaru , John L. Schultz , Jonathan Robert Stanton , Gene Tsudik Secure Group Communication Using Robust Contributory Key Agreement. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 2004, v:15, n:5, pp:468-480 [Journal ] Michael Steiner , Gene Tsudik , Michael Waidner Key Agreement in Dynamic Peer Groups. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 2000, v:11, n:8, pp:769-780 [Journal ] Katia Obraczka , Kumar Viswanath , Gene Tsudik Flooding for Reliable Multicast in Multi-Hop Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] Wireless Networks, 2001, v:7, n:6, pp:627-634 [Journal ] Maithili Narasimha , Gene Tsudik Privacy-Preserving Revocation Checking with Modified CRLs. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2007, pp:18-33 [Conf ] Gene Tsudik A Family of Dunces: Trivial RFID Identification and Authentication Protocols. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2007, pp:45-61 [Conf ] Nitesh Saxena , Gene Tsudik , Jeong Hyun Yi Threshold cryptography in P2P and MANETs: The case of access control. [Citation Graph (0, 0)][DBLP ] Computer Networks, 2007, v:51, n:12, pp:3632-3649 [Journal ] Affiliation-Hiding Key Exchange with Untrusted Group Authorities. [Citation Graph (, )][DBLP ] Robust group key agreement using short broadcasts. [Citation Graph (, )][DBLP ] Confronting a mobile adversary in unattended sensor networks. [Citation Graph (, )][DBLP ] Logging key assurance indicators in business processes. [Citation Graph (, )][DBLP ] Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks. [Citation Graph (, )][DBLP ] Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange. [Citation Graph (, )][DBLP ] A New Approach to Secure Logging. [Citation Graph (, )][DBLP ] Readers Behaving Badly - Reader Revocation in PKI-Based RFID Systems. [Citation Graph (, )][DBLP ] Secure Code Update for Embedded Devices via Proofs of Secure Erasure. [Citation Graph (, )][DBLP ] Practical Private Set Intersection Protocols with Linear Complexity. [Citation Graph (, )][DBLP ] Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks. [Citation Graph (, )][DBLP ] ALARM: Anonymous Location-Aided Routing in Suspicious MANETs. [Citation Graph (, )][DBLP ] Intrusion-Resilience in Mobile Unattended WSNs. [Citation Graph (, )][DBLP ] HAPADEP: Human-Assisted Pure Audio Device Pairing. [Citation Graph (, )][DBLP ] Towards Plugging Privacy Leaks in the Domain Name System. [Citation Graph (, )][DBLP ] Catch Me (If You Can): Data Survival in Unattended Sensor Networks. [Citation Graph (, )][DBLP ] Caveat Emptor: A Comparative Study of Secure Device Pairing Methods. [Citation Graph (, )][DBLP ] Privacy-Preserving Policy-Based Information Transfer. [Citation Graph (, )][DBLP ] Taming Big Brother Ambitions: More Privacy for Secret Handshakes. [Citation Graph (, )][DBLP ] POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks. [Citation Graph (, )][DBLP ] DISH: Distributed Self-Healing. [Citation Graph (, )][DBLP ] RFID security and privacy: long-term research or short-term tinkering? [Citation Graph (, )][DBLP ] Collaborative authentication in unattended WSNs. [Citation Graph (, )][DBLP ] Serial hook-ups: a comparative usability study of secure device pairing methods. [Citation Graph (, )][DBLP ] Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks. [Citation Graph (, )][DBLP ] SRDP: Secure route discovery for dynamic source routing in MANETs. [Citation Graph (, )][DBLP ] Privacy-Preserving Querying in Sensor Networks [Citation Graph (, )][DBLP ] Harvesting SSL Certificate Data to Mitigate Web-Fraud [Citation Graph (, )][DBLP ] Towards Plugging Privacy Leaks in Domain Name System [Citation Graph (, )][DBLP ] Search in 0.013secs, Finished in 0.018secs