Gene Tsudik - Publications#


Summary:
  • 149 Refereed Conference Publications
  • 67 Refereed Journal Articles
  • 8 Issued Patents (further 2 pending)
  • Google Scholar: H-Index: 74 (55 since 2010), Total Citations: 20,877 (9287 since 2010)
  • Microsoft Academic Search: Field Rating: 45, Overall Rank in Computer Science: 301

NOTE: on all publications, authors are listed in alphabetical order.

Prominent Publications (5 selected)

1) I. Foster, C. Kesselman, G. Tsudik and S. Tuecke, Security Architecture for Large-Scale Distributed Computations,
ACM Conference on Computer and Communications Security (CCS), 1998.

2) G. Ateniese, J. Camenisch, M. Joye and G. Tsudik, A Practical and Provably Secure Coalition-Resistant Group
Signature Scheme, IACR Advances in Cryptology—CRYPTO 2000.

3) M. Steiner, G. Tsudik and M. Waidner, Diffie-Hellman Key Distribution Extended to Groups,
ACM Conference onComputer and Communications Security (CCS), 1996. Extended version appeared in:
Key Agreement in Dynamic Peer Groups, IEEE Transactions on Parallel and Distributed Systems. Vol. 11, No. 8, 2000.

4) Y. Kim. A. Perrig and G. Tsudik, Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups,
ACM Conference on Computer and Communication Security (CCS), 2000. Extended version appeared in:
Tree-Based Group Key Agreement, ACM Transactions on Information Systems Security, Vol. 7, No. 1, 2004.

5) D. Ma and G. Tsudik, Forward-Secure Sequential Aggregate Authentication,
IEEE Symposium on Research in Security and Privacy (S&P), 2007. Extended version appeared in:
A New Approach to Secure Logging, ACM Transactions on Storage, Vol. 5, No. 1, 2009.

Recent Publications (5 selected):

6) K. El Defrawy and G. Tsudik, ALARM: Anonymous Location-Aided Routing in Suspicious MANETs,
IEEE International Conference on Network Protocols (ICNP), 2007. Extended version appeared in:
IEEE Transactions on Mobile Computing, Vol. 10, No. 9, September 2011.

7) A. Francillon, Q. Nguyen, K. Rasmussen and G. Tsudik, A Minimalist Approach to Remote Attestation,
IEEE/ACM Design, Automation, and Test in Europe (DATE), 2014.

8) I. Martinovic, K. Rasmussen, M. Roeschlin and G. Tsudik, Authentication Using Pulse-Response Biometrics,
ISOC Symposium on Network and Distributed System Security (NDSS), 2014.

9) P. Baldi, R. Baronio, E. De Cristofaro, P. Gasti and G. Tsudik, Countering GATTACA: Efficient and Secure Testing of Fully-Sequenced Human Genomes, ACM Computer and Communication Security Conference (CCS), 2011.

10) E. De Cristofaro, C. Soriente, G. Tsudik and A. Williams, Hummingbird: Privacy at the time of Twitter,
IEEE Symposium on Research in Security and Privacy (S&P), 2012. Extended version appeared in:
IEEE Data Engineering Bulletin, Special Issue on Cloud Security and Privacy, Vol. 35, No. 4, December 2012.
Imprint Privacy policy « This page (revision-2) was last changed on Tuesday, 6. October 2015, 10:43 by Kaiser Dana
  • operated by