!!Gene Tsudik - Publications
\\
__Summary:__
\\
*149 Refereed Conference Publications\\
*67 Refereed Journal Articles\\
*8 Issued Patents (further 2 pending)\\
*Google Scholar:  H-Index: 74 (55 since 2010), Total Citations: 20,877 (9287 since 2010)\\
*Microsoft Academic Search: Field Rating: 45, Overall Rank in Computer Science: 301\\
\\
__NOTE:__ on all publications, authors are listed in alphabetical order.\\
\\
__Prominent Publications (5 selected)__
\\ \\
1) I. Foster, C. Kesselman, G. Tsudik and S. Tuecke, Security Architecture for Large-Scale Distributed Computations,\\
ACM Conference on Computer and Communications Security (CCS), 1998.\\
\\
2) G. Ateniese, J. Camenisch, M. Joye and G. Tsudik, A Practical and Provably Secure Coalition-Resistant Group \\
Signature Scheme, IACR Advances in Cryptology—CRYPTO 2000.\\
\\
3) M. Steiner, G. Tsudik and M. Waidner, Diffie-Hellman Key Distribution Extended to Groups, \\
ACM Conference onComputer and Communications Security (CCS), 1996. Extended version appeared in:  \\
Key Agreement in Dynamic Peer Groups, IEEE Transactions on Parallel and Distributed Systems. Vol. 11, No. 8, 2000.\\
\\
4) Y. Kim. A. Perrig and G. Tsudik, Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups, \\
ACM Conference on Computer and Communication Security (CCS), 2000.  Extended version appeared in: \\
Tree-Based Group Key Agreement, ACM Transactions on Information Systems Security, Vol. 7, No. 1, 2004.\\
\\
5) D. Ma and G. Tsudik, Forward-Secure Sequential Aggregate Authentication,\\
IEEE Symposium on Research in Security and Privacy (S&P), 2007. Extended version appeared in: \\
A New Approach to Secure Logging, ACM Transactions on Storage, Vol. 5, No. 1, 2009.\\
\\
__Recent Publications (5 selected):__
\\ \\
6) K. El Defrawy and G. Tsudik, ALARM: Anonymous Location-Aided Routing in Suspicious MANETs, \\
IEEE International Conference on Network Protocols (ICNP), 2007. Extended version appeared in:\\
IEEE Transactions on Mobile Computing, Vol. 10, No. 9, September 2011.\\
\\
7) A. Francillon, Q. Nguyen, K. Rasmussen and G. Tsudik, A Minimalist Approach to Remote Attestation, \\
IEEE/ACM Design, Automation, and Test in Europe (DATE), 2014.\\
\\
8) I. Martinovic, K. Rasmussen, M. Roeschlin and G. Tsudik, Authentication Using Pulse-Response Biometrics, \\
ISOC Symposium on Network and Distributed System Security (NDSS), 2014.\\
\\
9) P. Baldi, R. Baronio, E. De Cristofaro, P. Gasti and G. Tsudik, Countering GATTACA: Efficient and Secure Testing of Fully-Sequenced Human Genomes, ACM Computer and Communication Security Conference (CCS), 2011.\\
\\
10) E. De Cristofaro, C. Soriente, G. Tsudik and A. Williams, Hummingbird: Privacy at the time of Twitter, \\
IEEE Symposium on Research in Security and Privacy (S&P), 2012. Extended version appeared in: \\
IEEE Data Engineering Bulletin, Special Issue on Cloud Security and Privacy, Vol. 35, No. 4, December 2012.