Author: Gene Tsudik
Publications
Co-authors
Productive Colleagues
- Dan Boneh
- Yang Wang
- Alfred Kobsa
- 7
- 14
- 35
Publications
Ding, Xuhua, Mazzocchi, Daniele, Tsudik, Gene (2007): Equipping smart devices with public key signatures. In ACM Trans. Internet Techn., 7 (1) pp. . https://dl.acm.org/doi/10.1145/1189740.1189743
Boneh, Dan, Ding, Xuhua, Tsudik, Gene (2004): Fine-grained control of security capabilities. In ACM Trans. Internet Techn., 4 (1) pp. 60-82. https://dl.acm.org/doi/10.1145/967030.967033
Narasimha, Maithili, Tsudik, Gene (2005): DSAC: integrity for outsourced databases with signature aggregation and chaining. In: Herzog, Otthein, Schek, Hans-Jorg, Fuhr, Norbert (eds.) Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management October 31 - November 5, 2005, Bremen, Germany. pp. 235-236. https://doi.acm.org/10.1145/1099554.1099604
Pietro, Roberto Di, Mancini, Luigi V., Soriente, Claudio, Spognardi, Angelo, Tsudik, Gene (2008): Catch Me (If You Can): Data Survival in Unattended Sensor Networks. In: PerCom 2008 - Sixth Annual IEEE International Conference on Pervasive Computing and Communications 17-21 March, 2008, Hong Kong. pp. 185-194. https://doi.ieeecomputersociety.org/10.1109/PERCOM.2008.31
Tsudik, Gene (2006): YA-TRAP: Yet Another Trivial RFID Authentication Protocol. In: PerCom 2006 - 4th IEEE Conference on Pervasive Computing and Communications Workshops 13-17 March, 2006, Pisa, Italy. pp. 640-643. https://doi.ieeecomputersociety.org/10.1109/PERCOMW.2006.152
Kobsa, Alfred, Sonawalla, Rahim, Tsudik, Gene, Uzun, Ersin, Wang, Yang (2009): Serial hook-ups: a comparative usability study of secure device pairing methods. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 10. https://doi.acm.org/10.1145/1572532.1572546
Nithyanand, Rishab, Saxena, Nitesh, Tsudik, Gene, Uzun, Ersin (2010): Groupthink: usability of secure group association for wireless devices. In: Proceedings of the 2010 International Conference on Uniquitous Computing , 2010, . pp. 331-340. https://doi.acm.org/10.1145/1864349.1864399