Follow
Gene Tsudik
Gene Tsudik
Peter & Lois Griffin Professor, Jolly Good Fellow of This & That
Verified email at ics.uci.edu - Homepage
Title
Cited by
Cited by
Year
A security architecture for computational grids
I Foster, C Kesselman, G Tsudik, S Tuecke
Proceedings of the 5th ACM Conference on Computer and Communications …, 1998
20981998
Scalable and efficient provable data possession
G Ateniese, R Di Pietro, LV Mancini, G Tsudik
Proceedings of the 4th international conference on Security and privacy in …, 2008
18112008
A practical and provably secure coalition-resistant group signature scheme
G Ateniese, J Camenisch, M Joye, G Tsudik
Advances in Cryptology—CRYPTO 2000: 20th Annual International Cryptology …, 2000
13092000
Diffie-Hellman key distribution extended to group communication
M Steiner, G Tsudik, M Waidner
Proceedings of the 3rd ACM Conference on Computer and Communications …, 1996
12211996
Readings in agents
MN Huhns, MP Singh
Morgan Kaufmann, 1998
8941998
Key agreement in dynamic peer groups
M Steiner, G Tsudik, M Waidner
IEEE Transactions on Parallel and Distributed Systems 11 (8), 769-780, 2000
8822000
Efficient aggregation of encrypted data in wireless sensor networks
C Castelluccia, E Mykletun, G Tsudik
Mobile and Ubiquitous Systems: Networking and Services, 2005. MobiQuitous …, 2005
7952005
Tree-based group key agreement
Y Kim, A Perrig, G Tsudik
ACM Transactions on Information and System Security (TISSEC) 7 (1), 60-96, 2004
7782004
Simple and fault-tolerant key agreement for dynamic collaborative groups
Y Kim, A Perrig, G Tsudik
Proceedings of the 7th ACM Conference on Computer and Communications …, 2000
7682000
Itinerant agents for mobile computing
D Chess, B Grosof, C Harrison, D Levine, C Parris, G Tsudik
IEEE Personal Communications 2 (5), 34-49, 1995
7571995
A privacy-preserving index for range queries
B Hore, S Mehrotra, G Tsudik
Proceedings of the Thirtieth international conference on Very large data …, 2004
6602004
DoS and DDoS in Named-Data Networking
P Gasti, G Tsudik, E Uzun, L Zhang
Proceedings of 2013 IEEE International Conference on Computer Communications …, 2013
6392013
Authentication and Integrity in Outsourced Databases
E MYKLETUN, M NARASIMHA, G TSUDIK
Symposium on Network and Distributed Systems Security (NDSS), 2004
6232004
Practical private set intersection protocols with linear complexity
E De Cristofaro, G Tsudik
International Conference on Financial Cryptography and Data Security, 143-159, 2010
5962010
Towards an analysis of onion routing security
P Syverson, G Tsudik, M Reed, C Landwehr
Designing privacy enhancing technologies: International workshop on design …, 2001
5712001
CLIQUES: A new approach to group key agreement
M Steiner, G Tsudik, M Waidner
Proceedings. 18th International Conference on Distributed Computing Systems …, 1998
5711998
Message authentication with one-way hash functions
G Tsudik
ACM SIGCOMM Computer Communication Review 22 (5), 29-38, 1992
5581992
Message authentication with one-way hash functions
G Tsudik
IEEE INFOCOM '92: The Conference on Computer Communications, 1992
5581992
Personal key archive
MH Linehan, NJ Simicich, GY Tsudik
US Patent 5,495,533, 1996
5571996
Smart: secure and minimal architecture for (establishing dynamic) root of trust.
K Eldefrawy, A Francillon, D Perito, G Tsudik
NDSS 12, 1-15, 2012
5152012
The system can't perform the operation now. Try again later.
Articles 1–20