Author: Gene Tsudik

Publication Overview

Publication period start: 2010
Number of co-authors: 14

Co-Authors

Number of publications with favourite co-authors

Productive Colleagues

Most productive colleagues in number of publications

Publications

Ding, Xuhua, Mazzocchi, Daniele, Tsudik, Gene (2007): Equipping smart devices with public key signatures. In ACM Trans. Internet Techn., 7 (1) pp. . https://dl.acm.org/doi/10.1145/1189740.1189743
Boneh, Dan, Ding, Xuhua, Tsudik, Gene (2004): Fine-grained control of security capabilities. In ACM Trans. Internet Techn., 4 (1) pp. 60-82. https://dl.acm.org/doi/10.1145/967030.967033
Narasimha, Maithili, Tsudik, Gene (2005): DSAC: integrity for outsourced databases with signature aggregation and chaining. In: Herzog, Otthein, Schek, Hans-Jorg, Fuhr, Norbert (eds.) Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management October 31 - November 5, 2005, Bremen, Germany. pp. 235-236. https://doi.acm.org/10.1145/1099554.1099604
Pietro, Roberto Di, Mancini, Luigi V., Soriente, Claudio, Spognardi, Angelo, Tsudik, Gene (2008): Catch Me (If You Can): Data Survival in Unattended Sensor Networks. In: PerCom 2008 - Sixth Annual IEEE International Conference on Pervasive Computing and Communications 17-21 March, 2008, Hong Kong. pp. 185-194. https://doi.ieeecomputersociety.org/10.1109/PERCOM.2008.31
Tsudik, Gene (2006): YA-TRAP: Yet Another Trivial RFID Authentication Protocol. In: PerCom 2006 - 4th IEEE Conference on Pervasive Computing and Communications Workshops 13-17 March, 2006, Pisa, Italy. pp. 640-643. https://doi.ieeecomputersociety.org/10.1109/PERCOMW.2006.152
Kobsa, Alfred, Sonawalla, Rahim, Tsudik, Gene, Uzun, Ersin, Wang, Yang (2009): Serial hook-ups: a comparative usability study of secure device pairing methods. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 10. https://doi.acm.org/10.1145/1572532.1572546
Nithyanand, Rishab, Saxena, Nitesh, Tsudik, Gene, Uzun, Ersin (2010): Groupthink: usability of secure group association for wireless devices. In: Proceedings of the 2010 International Conference on Uniquitous Computing , 2010, . pp. 331-340. https://doi.acm.org/10.1145/1864349.1864399
Privacy Settings
By using this site, you accept our Cookie Policy and Terms of Use.
Customize
Accept all

Feel Stuck? Want Freedom?

Get one powerful email each week, like 326,052 others.

Learn to design a life you love.

Next email in
6
days
11
hrs
25
mins
59
secs