The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Gene Tsudik: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Stanislaw Jarecki, Jihye Kim, Gene Tsudik
    Authentication for Paranoids: Multi-party Secret Handshakes. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:325-339 [Conf]
  2. Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik
    Secret Handshakes from CA-Oblivious Encryption. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:293-307 [Conf]
  3. Gene Tsudik, Shouhuai Xu
    Accumulating Composites and Improved Group Signing. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:269-286 [Conf]
  4. Giuseppe Ateniese, Michael Steiner, Gene Tsudik
    Authenticated Group Key Agreement and Friends. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:17-26 [Conf]
  5. Claude Castelluccia, Einar Mykletun, Gene Tsudik
    Improving secure server performance by re-balancing SSL/TLS handshakes. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:26-34 [Conf]
  6. Ian T. Foster, Carl Kesselman, Gene Tsudik, Steven Tuecke
    A Security Architecture for Computational Grids. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:83-92 [Conf]
  7. Yongdae Kim, Adrian Perrig, Gene Tsudik
    Simple and fault-tolerant key agreement for dynamic collaborative groups. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:235-244 [Conf]
  8. Gene Tsudik, Els Van Herreweghen
    On Simple and Secure Key Distribution. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:49-57 [Conf]
  9. Michael Steiner, Gene Tsudik, Michael Waidner
    Diffie-Hellman Key Distribution Extended to Group Communication. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:31-37 [Conf]
  10. Maithili Narasimha, Gene Tsudik
    DSAC: integrity for outsourced databases with signature aggregation and chaining. [Citation Graph (0, 0)][DBLP]
    CIKM, 2005, pp:235-236 [Conf]
  11. Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik
    A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2000, pp:255-270 [Conf]
  12. Xuhua Ding, Gene Tsudik
    Simple Identity-Based Cryptography with Mediated RSA. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:193-210 [Conf]
  13. Stanislaw Jarecki, Jihye Kim, Gene Tsudik
    Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:287-308 [Conf]
  14. Maithili Narasimha, Gene Tsudik
    Authentication of Outsourced Databases Using Signature Aggregation and Chaining. [Citation Graph (0, 0)][DBLP]
    DASFAA, 2006, pp:420-436 [Conf]
  15. Einar Mykletun, Gene Tsudik
    Aggregation Queries in the Database-As-a-Service Model. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:89-103 [Conf]
  16. Christopher Ho, Katia Obraczka, Gene Tsudik, Kumar Viswanath
    Flooding for reliable multicast in multi-hop ad hoc networks. [Citation Graph (0, 0)][DBLP]
    DIAL-M, 1999, pp:64-71 [Conf]
  17. Paul F. Syverson, Gene Tsudik, Michael G. Reed, Carl E. Landwehr
    Towards an Analysis of Onion Routing Security. [Citation Graph (0, 0)][DBLP]
    Workshop on Design Issues in Anonymity and Unobservability, 2000, pp:96-114 [Conf]
  18. Yair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton, Gene Tsudik
    Scaling Secure Group Communication Systems: Beyond Peer-to-Peer. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:226-237 [Conf]
  19. Balakrishna R. Iyer, Sharad Mehrotra, Einar Mykletun, Gene Tsudik, Yonghua Wu
    A Framework for Efficient Storage Security in RDBMS. [Citation Graph (0, 0)][DBLP]
    EDBT, 2004, pp:147-164 [Conf]
  20. N. Asokan, Gene Tsudik, Michael Waidner
    Server-Supported Signatures. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:131-143 [Conf]
  21. Giuseppe Ateniese, Daniel H. Chou, Breno de Medeiros, Gene Tsudik
    Sanitizable Signatures. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:159-177 [Conf]
  22. Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen
    Robust and Secure Password and Key Change Method. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1994, pp:107-122 [Conf]
  23. Stefano Zatti, Refik Molva, Angelo Tosi, Gene Tsudik, Helmut Kurth
    Limitations of the Approach of Solving a Network's Security Problem with a Firewall. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:144-145 [Conf]
  24. Refik Molva, Gene Tsudik, Els Van Herreweghen, Stefano Zatti
    KryptoKnight Authentication and Key Distribution System. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:155-174 [Conf]
  25. Einar Mykletun, Maithili Narasimha, Gene Tsudik
    Signature Bouquets: Immutability for Aggregated/Condensed Signatures. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:160-176 [Conf]
  26. Gene Tsudik
    Policy Enforcement in Stub Autonomous Domains. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:229-257 [Conf]
  27. Giuseppe Ateniese, Dawn Xiaodong Song, Gene Tsudik
    Quasi-Efficient Revocation in Group Signatures. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:183-197 [Conf]
  28. Giuseppe Ateniese, Gene Tsudik
    Some Open Issues and New Directions in Group Signatures. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1999, pp:196-211 [Conf]
  29. Matthew K. Franklin, Gene Tsudik
    Secure Group Barter: Multi-party Fair Exchange with Semi-Trusted Neutral Parties. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1998, pp:90-102 [Conf]
  30. Samad Nasserian, Gene Tsudik
    Revisiting Oblivious Signature-Based Envelopes. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:221-235 [Conf]
  31. Gene Tsudik, Rita C. Summers
    AudES - An Expert System for Security Auditing. [Citation Graph (0, 0)][DBLP]
    IAAI, 1990, pp:221-232 [Conf]
  32. Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene Tsudik
    On the Performance of Group Key Agreement Protocols. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2002, pp:463-464 [Conf]
  33. Yair Amir, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Yongdae Kim, Gene Tsudik
    Exploring Robustness in Group Key Agreement. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2001, pp:399-408 [Conf]
  34. Xuhua Ding, Gene Tsudik, Shouhuai Xu
    Leak-Free Group Signatures with Immediate Revocation. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2004, pp:608-615 [Conf]
  35. Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, Ersin Uzun
    Loud and Clear: Human-Verifiable Authentication Based on Audio. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2006, pp:10- [Conf]
  36. Katia Obraczka, Gene Tsudik, Kumar Viswanath
    Pushing the Limits of Multicast in Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2001, pp:719-722 [Conf]
  37. Jonathan Robert Stanton, Yair Amir, Damian Hasse, Giuseppe Ateniese, Yongdae Kim, Cristina Nita-Rotaru, Theo Schlossnagle, John L. Schultz, Gene Tsudik
    Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2000, pp:330-343 [Conf]
  38. Michael Steiner, Gene Tsudik, Michael Waidner
    CLIQUES: A New Approach to Group Key Agreement. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1998, pp:380-387 [Conf]
  39. Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
    Identity-Based Access Control for Ad Hoc Groups. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:362-379 [Conf]
  40. Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi
    On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control. [Citation Graph (0, 0)][DBLP]
    ICNP, 2003, pp:336-0 [Conf]
  41. Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
    Efficient Node Admission for Short-lived Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICNP, 2005, pp:269-278 [Conf]
  42. Philippe A. Janson, Gene Tsudik, Moti Yung
    Scalability and Flexibility in Authentication Services: The KryptoKnight Approach. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1997, pp:725-736 [Conf]
  43. Gene Tsudik
    Message Authentication with One-Way Hash Functions. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1992, pp:2055-2059 [Conf]
  44. Deborah A. Agarwal, Olivier Chevassut, Mary R. Thompson, Gene Tsudik
    An Integrated Solution for Secure Group Communication in Wide-Area Networks. [Citation Graph (0, 0)][DBLP]
    ISCC, 2001, pp:22-28 [Conf]
  45. Claude Castelluccia, Einar Mykletun, Gene Tsudik
    E.cient Aggregation of encrypted data in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    MobiQuitous, 2005, pp:109-117 [Conf]
  46. Jihye Kim, Gene Tsudik
    SRDP: Securing Route Discovery in DSR. [Citation Graph (0, 0)][DBLP]
    MobiQuitous, 2005, pp:247-260 [Conf]
  47. Yongdae Kim, Daniele Mazzocchi, Gene Tsudik
    Admission Control in Peer Groups. [Citation Graph (0, 0)][DBLP]
    NCA, 2003, pp:131-139 [Conf]
  48. Ralf C. Hauser, Tony Przygienda, Gene Tsudik
    Reducing the Cost of Security in Link-State Routing. [Citation Graph (0, 0)][DBLP]
    NDSS, 1997, pp:- [Conf]
  49. Xuhua Ding, Daniele Mazzocchi, Gene Tsudik
    Experimenting with Server-Aided Signatures. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  50. Einar Mykletun, Maithili Narasimha, Gene Tsudik
    Authentication and Integrity in Outsourced Databases. [Citation Graph (0, 0)][DBLP]
    NDSS, 2004, pp:- [Conf]
  51. Gene Tsudik
    YA-TRAP: Yet Another Trivial RFID Authentication Protocol. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2006, pp:640-643 [Conf]
  52. John Solis, Gene Tsudik
    Simple and Flexible Revocation Checking with Privacy. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:351-367 [Conf]
  53. Gene Tsudik, Shouhuai Xu
    A Flexible Framework for Secret Handshakes. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:295-315 [Conf]
  54. Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik
    Brief announcement: secret handshakes from CA-oblivious encryption. [Citation Graph (0, 0)][DBLP]
    PODC, 2004, pp:394- [Conf]
  55. Gene Tsudik, Shouhuai Xu
    Brief announcement: a flexible framework for secret handshakes. [Citation Graph (0, 0)][DBLP]
    PODC, 2005, pp:39- [Conf]
  56. Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
    Admission control in Peer-to-Peer: design and performance evaluation. [Citation Graph (0, 0)][DBLP]
    SASN, 2003, pp:104-113 [Conf]
  57. Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik
    A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:193-207 [Conf]
  58. Gene Tsudik
    Weak Forward Security in Mediated RSA. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:45-54 [Conf]
  59. Yongdae Kim, Adrian Perrig, Gene Tsudik
    Communication-Efficient Group Key Agreement. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:229-244 [Conf]
  60. Yongdae Kim, Maithili Narasimha, Fabio Maino, Gene Tsudik
    Secure Group Services for Storage Area Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Security in Storage Workshop, 2002, pp:80-93 [Conf]
  61. Giuseppe Ateniese, Gene Tsudik
    Group Signatures Á la carte. [Citation Graph (0, 0)][DBLP]
    SODA, 1999, pp:848-849 [Conf]
  62. Deborah Estrin, Gene Tsudik
    Visa Scheme for Inter-Organization Network Security. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1987, pp:174-183 [Conf]
  63. Deborah Estrin, Gene Tsudik
    Security Issues in Policy Routing. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1989, pp:183-193 [Conf]
  64. Di Ma, Gene Tsudik
    Extended Abstract: Forward-Secure Sequential Aggregate Authentication. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:86-91 [Conf]
  65. Gene Tsudik, Els Van Herreweghen
    Some Remarks on Protecting Weak Keys and Poorly-Chosen Secrets from Guessing Attacks. [Citation Graph (0, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1993, pp:136-142 [Conf]
  66. Bijit Hore, Sharad Mehrotra, Gene Tsudik
    A Privacy-Preserving Index for Range Queries. [Citation Graph (0, 0)][DBLP]
    VLDB, 2004, pp:720-731 [Conf]
  67. Giuseppe Ateniese, Amir Herzberg, Hugo Krawczyk, Gene Tsudik
    Untraceable mobility or how to travel incognito. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1999, v:31, n:8, pp:871-884 [Journal]
  68. Kemal Bicakci, Gene Tsudik, Brian Tung
    How to construct optimal one-time signatures. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2003, v:43, n:3, pp:339-349 [Journal]
  69. Deborah Estrin, Gene Tsudik
    Secure Control of Transit Internetwork Traffic. [Citation Graph (0, 0)][DBLP]
    Computer Networks and ISDN Systems, 1991, v:22, n:5, pp:363-382 [Journal]
  70. Ralf C. Hauser, Tony Przygienda, Gene Tsudik
    Lowering security overhead in link state routing. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1999, v:31, n:8, pp:885-894 [Journal]
  71. Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik
    Secure acknowledgment aggregation and multisignatures with limited robustness. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2006, v:50, n:10, pp:1639-1652 [Journal]
  72. Philippe A. Janson, Gene Tsudik
    Secure and minimal protocols for authenticated key distribution. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1995, v:18, n:9, pp:645-653 [Journal]
  73. Refik Molva, Gene Tsudik
    Secret Sets and Applications. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1998, v:65, n:1, pp:47-55 [Journal]
  74. N. Asokan, Gene Tsudik, Michael Waidner
    Server-Supported Signatures. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1997, v:5, n:1, pp:91-108 [Journal]
  75. Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen
    Robust and Secure Password and Key Change Method. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1996, v:4, n:1, pp:97-112 [Journal]
  76. Kyung Hyune Rhee, Young-Ho Park, Gene Tsudik
    A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks. [Citation Graph (0, 0)][DBLP]
    J. Inf. Sci. Eng., 2005, v:21, n:2, pp:415-428 [Journal]
  77. Michael Steiner, Gene Tsudik, Michael Waidner
    Refinement and Extension of Encrypted Key Exchange. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1995, v:29, n:3, pp:22-30 [Journal]
  78. Yongdae Kim, Adrian Perrig, Gene Tsudik
    Group Key Agreement Efficient in Communication. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2004, v:53, n:7, pp:905-921 [Journal]
  79. Yair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton, Gene Tsudik
    Secure Spread: An Integrated Architecture for Secure Group Communication. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:3, pp:248-261 [Journal]
  80. James P. Gray, Ajay D. Kshemkalyani, Stephen M. Matyas, Mohammad Peyravian, Gene Tsudik
    ATM cell encryption and key update synchronization. [Citation Graph (0, 0)][DBLP]
    Telecommunication Systems, 1997, v:7, n:4, pp:391-408 [Journal]
  81. Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene Tsudik
    On the performance of group key agreement protocols. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:3, pp:457-488 [Journal]
  82. Yongdae Kim, Adrian Perrig, Gene Tsudik
    Tree-based group key agreement. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:1, pp:60-96 [Journal]
  83. Kumar Viswanath, Katia Obraczka, Gene Tsudik
    Exploring Mesh and Tree-Based Multicast Routing Protocols for MANETs. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2006, v:5, n:1, pp:28-42 [Journal]
  84. Kumar Viswanath, Katia Obraczka, Gene Tsudik
    Correction to "Exploring Mesh and Tree-Based Multicast Routing Protocols for MANETs". [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2007, v:6, n:2, pp:237- [Journal]
  85. Xuhua Ding, Daniele Mazzocchi, Gene Tsudik
    Equipping smart devices with public key signatures. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Internet Techn., 2007, v:7, n:1, pp:- [Journal]
  86. Dan Boneh, Xuhua Ding, Gene Tsudik
    Fine-grained control of security capabilities. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Internet Techn., 2004, v:4, n:1, pp:60-82 [Journal]
  87. Deborah Estrin, Martha Steenstrup, Gene Tsudik
    A protocol for route establishment and packet forwarding across multidomain internets. [Citation Graph (0, 0)][DBLP]
    IEEE/ACM Trans. Netw., 1993, v:1, n:1, pp:56-70 [Journal]
  88. Einar Mykletun, Maithili Narasimha, Gene Tsudik
    Authentication and integrity in outsourced databases. [Citation Graph (0, 0)][DBLP]
    TOS, 2006, v:2, n:2, pp:107-138 [Journal]
  89. Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Gene Tsudik
    Secure Group Communication Using Robust Contributory Key Agreement. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2004, v:15, n:5, pp:468-480 [Journal]
  90. Michael Steiner, Gene Tsudik, Michael Waidner
    Key Agreement in Dynamic Peer Groups. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2000, v:11, n:8, pp:769-780 [Journal]
  91. Katia Obraczka, Kumar Viswanath, Gene Tsudik
    Flooding for Reliable Multicast in Multi-Hop Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Wireless Networks, 2001, v:7, n:6, pp:627-634 [Journal]
  92. Maithili Narasimha, Gene Tsudik
    Privacy-Preserving Revocation Checking with Modified CRLs. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2007, pp:18-33 [Conf]
  93. Gene Tsudik
    A Family of Dunces: Trivial RFID Identification and Authentication Protocols. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2007, pp:45-61 [Conf]
  94. Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
    Threshold cryptography in P2P and MANETs: The case of access control. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:12, pp:3632-3649 [Journal]

  95. Affiliation-Hiding Key Exchange with Untrusted Group Authorities. [Citation Graph (, )][DBLP]


  96. Robust group key agreement using short broadcasts. [Citation Graph (, )][DBLP]


  97. Confronting a mobile adversary in unattended sensor networks. [Citation Graph (, )][DBLP]


  98. Logging key assurance indicators in business processes. [Citation Graph (, )][DBLP]


  99. Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks. [Citation Graph (, )][DBLP]


  100. Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange. [Citation Graph (, )][DBLP]


  101. A New Approach to Secure Logging. [Citation Graph (, )][DBLP]


  102. Readers Behaving Badly - Reader Revocation in PKI-Based RFID Systems. [Citation Graph (, )][DBLP]


  103. Secure Code Update for Embedded Devices via Proofs of Secure Erasure. [Citation Graph (, )][DBLP]


  104. Practical Private Set Intersection Protocols with Linear Complexity. [Citation Graph (, )][DBLP]


  105. Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks. [Citation Graph (, )][DBLP]


  106. ALARM: Anonymous Location-Aided Routing in Suspicious MANETs. [Citation Graph (, )][DBLP]


  107. Intrusion-Resilience in Mobile Unattended WSNs. [Citation Graph (, )][DBLP]


  108. HAPADEP: Human-Assisted Pure Audio Device Pairing. [Citation Graph (, )][DBLP]


  109. Towards Plugging Privacy Leaks in the Domain Name System. [Citation Graph (, )][DBLP]


  110. Catch Me (If You Can): Data Survival in Unattended Sensor Networks. [Citation Graph (, )][DBLP]


  111. Caveat Emptor: A Comparative Study of Secure Device Pairing Methods. [Citation Graph (, )][DBLP]


  112. Privacy-Preserving Policy-Based Information Transfer. [Citation Graph (, )][DBLP]


  113. Taming Big Brother Ambitions: More Privacy for Secret Handshakes. [Citation Graph (, )][DBLP]


  114. POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  115. DISH: Distributed Self-Healing. [Citation Graph (, )][DBLP]


  116. RFID security and privacy: long-term research or short-term tinkering? [Citation Graph (, )][DBLP]


  117. Collaborative authentication in unattended WSNs. [Citation Graph (, )][DBLP]


  118. Serial hook-ups: a comparative usability study of secure device pairing methods. [Citation Graph (, )][DBLP]


  119. Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks. [Citation Graph (, )][DBLP]


  120. SRDP: Secure route discovery for dynamic source routing in MANETs. [Citation Graph (, )][DBLP]


  121. Privacy-Preserving Querying in Sensor Networks [Citation Graph (, )][DBLP]


  122. Harvesting SSL Certificate Data to Mitigate Web-Fraud [Citation Graph (, )][DBLP]


  123. Towards Plugging Privacy Leaks in Domain Name System [Citation Graph (, )][DBLP]


Search in 5.069secs, Finished in 5.073secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002