2022
- Matteo Cardaioli, Mauro Conti, Gabriele Orazi, Pier Paolo Tricomi, and Gene Tsudik BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication, Pervasive and Mobile Computing, 2023.
- Seoyeon Hwang, Ercan Ozturk, and Gene Tsudik, Balancing Security and Privacy in Genomic Range Queries, ACM Transactions on Privacy and Security 26 , 2023.
- Scott Jordan, Yoshimichi Nakatsuka, Ercan Ozturk, Andrew Paverd, and Gene Tsudik, Viceroy: GDPR-/CCPA-compliant enforcement of verifiable accountless consumer requests, NDSS, 2023.
- Carl Landwehr, Michael K. Reiter, Laurie Williams, Gene Tsudik, Trent Jaeger, Tadayoshi Kohno, and Apu Kapadia, Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription ICCAD, 2022.
- Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Youngil Kim, and Gene Tsudik, CASU: Compromise Avoidance via Secure Updates for Low-end Embedded Systems, IEEE Security & Privacy, 2023.
- Kiran Balagani, Matteo Cardaioli, Stefano Cecconello, Mauro Conti, and Gene Tsudik, We can hear your PIN drop: A new acoustic side channel attack to profile PIN pads keys, ESORICS, 2022.
- Karim Eldefrawy, Julian Loss, and Ben Terner, How Byzantine is a Send Corruption?, ACNS, 2022.
- Yuxin (Myles) Liu, Yoshimichi Nakatsuka, Ardalan Amiri Sani, Sharad Agarwal, and Gene Tsudik, Vronicle: Verifiable Provenance for Videos from Mobile Devices, MobiSys, 2022.
- Ivan De Oliveira Nunes, Seoyeon Hwang, Sashidhar Jakkamsetti, and Gene Tsudik, Privacy-from-Birth: Protecting Sensed Data from Malicious Sensors with VERSA, IEEE Security & Privacy (Oakland), 2022.
- Lukas Petzi, Ala Eddine Ben Yahya, Alexandra Dmitrienko, Gene Tsudik, Thomas Prantl, and Samuel Kounev, SCRAPS: Scalable Collective Remote Attestation for Pub-Sub IoT Networks with Untrusted Proxy Verifier, USENIX Security, 2022.
- David Koisser, Patrick Jauernig, Gene Tsudik, and Ahmad-Reza Sadeghi, V'CER: Efficient Certificate Validation in Constrained Networks, USENIX Security, 2022.
- Esmerald Aliaj, Ivan De Oliveira Nunes, and Gene Tsudik, GAROTA: Generalized Active Root-Of-Trust Architecture, USENIX Security, 2022.
- Benjamin Terner, Permissionless Consensus in the Research Model, Financial Cryptography, 2022.
- Matteo Cardaioli, Pier Paolo Tricomi, Mauro Conti, and Gene Tsudik, Privacy-Friendly De-authentication with BLUFADE: Blurred Face Detection, IEEE PERCOM, 2022.
2021
- Srdjan Čapkun, Ercan Ozturk, Gene Tsudik and Karl Wüst, ROSEN: RObust and SElective Non-repudiation (for TLS), ACM CCSW, 2021.
- Mahmoud Ammar, Bruno Crispo, Ivan De Oliveira Nunes, and Gene Tsudik, Delegated Attestation: Scalable Remote Attestation of Commodity CPS by Blending Proofs of Execution with Software Attestation, WiSec, 2021.
- Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Norrathep Rattanavipanon, and Gene Tsudik, On the TOCTOU Problem in Remote Attestation, CCS, 2021.
- Yoshimichi Nakatsuka, Andrew Paverd, and Gene Tsudik, PDoT: Private DNS-over-TLS with TEE Support, DTRAP, 2021.
- Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, and Gene Tsudik, DIALED: Data Integrity Attestation for Low-end Embedded Devices, DAC, 2021.
- Ivan De Oliveira Nunes, Xuhua Ding, and Gene Tsudik, On the Root of Trust Identification Problem, IPSN, 2021.
- Yoshimichi Nakatsuka, Ercan Ozturk, Andrew Paverd, and Gene Tsudik, CACTI: Captcha Avoidance via Client-side TEE Integration, USENIX Security, 2021.
- Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, and Gene Tsudik, Tiny-CFA: Minimalistic Control-Flow Attestation Using Verified Proofs of Execution, DATE, 2021.
2020
- F. Armknecht, P. Walther, G. Tsudik, M. Beck, and T. Strufe, ProMACs: Progressive and Resynchronizing MACs for Continuous Efficient Authentication of Message Streams ,
ACM Conference on Computer and Communications Security (ACM CCS), 2020.
- M. Conti, P. Paolo Tricomi and G. Tsudik, De-auth of the Blue! Transparent De-authentication using Bluetooth Low Energy Beacon, European Symposium on Research in Computer Security (ESORICS), 2020.
- K. Eldefrawy, S. Hwang, R. Ostrovsky, and M. Yung, Communication-Efficient (Proactive) Secure Computation for Dynamic General Adversary Structures and Dynamic Groups, Security and Cryptography for Networks (SCN), 2020.
- K. Eldefrawy , M. Locasto , N. Rattanavipanon, and H. Saidi, Towards Automated Augmentation and Instrumentation of Legacy Cryptographic Executables, Applied Cryptography and Network Security (ACNS), 2020.
- M. Ammar, B. Crispo and G. Tsudik, SIMPLE: A Remote Attestation Approach for Resource-Constrained IoT, International Conference on Cyber-Physical Systems (ICCPS/CPSWeek), 2020.
- B.Berg, T. Kaczmarek, A. Kobsa and G. Tsudik, Exploring Effects of Auditory Stimuli on CAPTCHA Performance, Asia Workshop on Usable Security (AsiaUSEC), 2020.
- A. Compagno, M. Conti, E. Losiouk, G. Tsudik and S. Valle, A Proactive Cache Privacy Attack on CCN, IEEE/IFIP
Network Operations and Management Symposium (NOMS) Mini-Conference, 2020.
- Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon and Gene Tsudik, APEX: A Verified Architecture for Proofs of Execution on Remote Devices Under Full Software Compromise, USENIX Security, 2020.
2019
- Yoshimichi Nakatsuka, Andrew Paverd and Gene Tsudik PDoT: private DNS-over-TLS with TEE support ACSAC, 2019.
- Xuhua Ding, Ercan Ozturk and Gene Tsudik, Balancing Security and Privacy in Genomic Range Queries
WPES, 2019.
- Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon, Michael Steiner and Gene Tsudik, VRASED: A Verified Hardware/Software Co-Design for Remote Attestation USENIX Security, 2019.
- Ivan De Oliveira Nunes, Karim Eldefrawy, Norrathep Rattanavipanon and Gene Tsudik, PURE: Using Verified Remote Attestation to Obtain Proofs of Update, Reset and Erasure in Low-End Embedded Systems IEEE/ACM ICCAD, 2019.
- Tyler Kaczmarek, Ercan Ozturk, and Gene Tsudik, Thermanator: Thermal Residue-Based Post Factum Attacks On Keyboard Data Entry ACM ASIACCS, 2019.
- Ahmad Ibrahim, Ahmad-Reza Sadeghi,Gene Tsudik, HEALED: HEaling & Attestation for Low-End Embedded Devices
Financial Cryptography, 2019.
- Karim Eldefrawy and Gene Tsudik, Opinion: Advancing Remote Attestation via Computer-aided Formal Verification of Designs and Synthesis of Executables ACM WiSec, 2019.
- Ivan De Oliveira Nunes, Ghada Dessouky, Ahmad Ibrahim, Norrathep Rattanavipanon, Ahmad-Reza Sadeghi and Gene Tsudik, Towards Systematic Design of Collective Remote Attestation Protocols IEEE ICDCS, 2019.
- Hailun Tan, Gene Tsudik, Sanjay Jha, MTRA: Multi-Tier randomized remote attestation in IoT networks
Computers & Security, 2019.
- Ivan De Oliveira Nunes, Karim Eldefrawy, Tancrede Lepoint, SNUSE: A Secure Computation Approach for Large-Scale User Re-Enrollment in Biometric Authentication Systems Future Generation Computer Systems - Elsevier, Special Issue on Biometrics and Security, 2019.
2018
- N. Asokan, Thomas Nyman, Norrathep Rattanavipanon, Ahmad-Reza Sadeghi and Gene Tsudik, ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices EMSOFT, 2018.
- Ahmad Ibrahim, Ahmad-Reza Sadeghi and Gene Tsudik, AID: Autonomous Attestation of IoT Devices IEEE SRDS, 2018.
- K. Balagani, M. Conti, P. Gasti, M. Georgiev, T. Gurtler, D. Lain, C. Miller, K. Molas, N. Samarin, E. Saraci, G. Tsudik and L. Wu, SILK-TV: Secret Information Leakage from Keystroke Timing Videos ESORICS, 2018.
- Moreno Ambrosin, Alberto Compagno, Mauro Conti, Cesar Ghali and Gene Tsudik, Security and Privacy Analysis of National Science Foundation Future Internet Architectures IEEE Communications Surveys & Tutorial, 2018.
- Paolo Gasti and Gene Tsudik, Content-Centric and Named-Data Networking Security: The Good, The Bad and The Rest IEEE LANMAN, 2018.
- Yoshimichi Nakatsuka, Janaka L. Wijekoon and Hiroaki Nishi, FROG: A Packet Hop Count based DDoS Countermeasure in NDN IEEE ISCC, 2018.
- Ivan De Oliveira Nunes, Karim Eldefrawy and Tancr\'ede Lepoint, Secure Non-Interactive User Re-Enrollment in Biometrics-based Identification and Authentication Systems CSCML, 2018.
- Xavier Carpent, Karim Eldefrawy, Norrathep Rattanavipanon, Ahmad-Reza Sadeghi and Gene Tsudik, Invited: Reconciling Remote Attestation and Safety-Critical Operation on Simple IoT Devices DAC, 2018.
- Tyler Kaczmarek, Ercan Ozturk, Gene Tsudik, Assentication: User Deauthentication and Lunchtime Attack Mitigation with Seated Posture Biometric ACNS, 2018.
- Ivan O. Nunes, Gene Tsudik, KRB-CCN: Lightweight Authentication & Access Control for Private Content-Centric Networks ACNS, 2018.
- Xavier Carpent, Karim Eldefrawy, Norrathep Rattanavipanon, Gene Tsudik, Temporal Consistency of Integrity-Ensuring Computations and Applications to Embedded Systems Security ACM ASIACCS, 2018.
- Xavier Carpent, Norrathep Rattanavipanon, Gene Tsudik, Remote Attestation of IoT Devices via SMARM: Shuffled Measurements Against Roving Malware IEEE HOST, 2018.
- Xavier Carpent, Norrathep Rattanavipanon, Gene Tsudik, ERASMUS: Efficient Remote Attestation via Self-Measurement for Unattended Settings DATE, 2018.
2017
-
Hailun Tan, Gene Tsudik, Sanjay Jha, MTRA: Multiple-tier remote attestation in IoT networks, IEEE CNS 2017.
- Xavier Carpent, Sky Faber, Tomas Sander, Gene Tsudik, Private Set Projections & Variants, In Workshop on Privacy in the Electronic Society – WPES 2017, Dallas, TX, USA, October 2017.
- Z. Zhang, X. Ding, G. Tsudik, J. Cui and Z. Li, Presence Attestation: The Missing Link In Dynamic Trust Bootstrapping, ACM CCS 2017.
- C. Ghali, G. Tsudik and C. Wood, When Encryption is Not Enough: Privacy Attacks in Content-Centric Networking, ACM ICN 2017.
- I. O. Nunes, G. Tsudik and C. Wood, Namespace Tunnels in Content-Centric Networks, IEEE Conference on Local Computer Networks (LCN), 2017.
- C. Ghali, G. Tsudik and C. Wood, Mitigating On-Path Adversaries in Content-Centric Networks, IEEE Conference on Local Computer Networks (LCN), 2017.
- K. El Defrawy, N. Rattanavipanon and G. Tsudik, HYDRA: HYbrid Design for Remote Attestation (Using a Formally Verified Microkernel), ACM WiSEC 2017.
- Cesar Ghali, Gene Tsudik, Ersin Uzun and Christopher A. Wood, Closing the Floodgate with Stateless Content-Centric Networking, IEEE ICCCN 2017.
- Bruce Berg, Tyler Kaczmarek, Alfred Kobsa and Gene Tsudik, Lights, Camera, Action! Exploring Effects of Visual Distractions on Completion of Security Tasks, ACNS 2017.
- Christopher A. Wood, Protecting the Long Tail: Transparent Packet Security in Content-Centric Networks, IFIP Networking 2017.
- Marc Mosko, Ersin Uzun, and Christopher A. Wood, Mobile Sessions in Content-Centric Networks, IFIP Networking 2017.
- X. Carpent, K. El Defrawy, N. Rattanavipanon and G. Tsudik, LIghtweight Swarm Attestation: A Tale of Two LISAs, ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2017.
2016
- T. Abera, N. Asokan, L. Davi, J. Ekberg, T. Nyman, A. Paverd, A. Sadeghi and G. Tsudik, C-FLAT: Control-FLow ATtestation for Embedded Systems Software, ACM CCS 2016.
- Mishari Almishari, Ekin Oguz and Gene Tsudik, Trilateral Large-Scale OSN Account Linkability Study, AAAI Fall Symposium on Privacy and Language Technologies, 2016
- C. Ghali, G. Tsudik, and C. A. Wood, (The Futility of) Data Privacy in Content-Centric Networking), ACM CCS Workshop on Privacy in the Electronic Society (WPES), 2016.
- C. Ghali, G. Tsudik, and C. A. Wood, Network Names in Content-Centric Networking, 3rd ACM Conference on Information-Centric Networking (ICN 2016), 2016.
- T. Bradley, S. Faber and G. Tsudik, Bounded Size-Hiding Private Set Intersection, Security and Cryptography for Networks (SCN), 2016.
- G. Tsudik, Zero Knowledge Made Easy, So It Won't Make You Dizzy, Security and Cryptography for Networks (SCN), 2016.
- C. Tschudin, E. Uzun, C. A. Wood, Trust in Information-Centric Networking: From Theory to Practice, the 25th International Conference on Computer Communication and Networks (ICCCN 2016), 2016.
- I. Martinovic, K. Rasmussen, M. Roeschlin and G. Tsudik, "Authentication Using Pulse-Response Biometrics," Communications of the ACM (CACM): Research Highlights, 2016.
- Ahmad Ibrahim, Ahmad-Reza Sadeghi, Gene Tsudik, Shaza Zeitouni, "DARPA: Device Attestation Resilient to Physical Attacks," ACM WiSEC, 2016.
- Abera, T., N. Asokan, L. Davi, F. Koushanfar, A. Paverd, A. - R. Sadeghi, and G. Tsudik, "INVITED: Things, Trouble, Trust: On Building Trust in IoT Systems," Design Automation Conference (DAC), 2016.
- Ferdinand Brasser, Kasper B. Rasmussen, Ahmad-Reza Sadeghi, Gene Tsudik, "Remote Attestation for Low-End Embedded Devices: the Prover’s Perspective," Design Automation Conference (DAC), 2016.
- C. Ghali, G. Tsudik, C. A. Wood, "BEAD: Best Effort Autonomous Deletion in Content-Centric Networking," NETWORKING 2016, the IFIP Networking Conference, 2016.
- C. Ghali, G. Tsudik, C. A. Wood, E. Yeh, "Practical Accounting in Content-Centric Networking," NOMS 2016, IEEE/IFIP Network Operations and Management Symposium, 2016.
- K. ElDefrawy, T. Kaczmarek "Byzantine Fault Tolerant Software-Defined Networking (SDN) Controllers," MidCCI 2016: The 2nd IEEE International Workshop on Middleware for Cyber Security, Cloud Computing and Internetworking, 2016
- G. Tsudik, E. Uzun, and C. A. Wood, AC3N: An API and Service for Anonymous Communication in Content-Centric Networking, in the Proceedings of CCNC 2016, 2016.
2015
- S. Faber, S. Jarecki, S. Kentros and B. Wei, "Three-Party ORAM for Secure Computation," Advances in Cryptology (ASIACRYPT), 2015.
- N. Asokan, F. Brasser, A. Ibrahim, A. Sadeghi, M. Schunter, G. Tsudik and C. Wachsmann, "SEDA: Scalable Embedded Device Attestation," ACM Conference on Computer and Communications Security (CCS), 2015.
- S. Faber, R. Petrlic, and G. Tsudik, "UnLinked: Private Proximity-based Off-line OSN Interaction," ACM CCS Workshop on Privacy in the Electronic Society (WPES), 2015.
- S. Faber, S. Jarecki, H. Krawczyk, Q. Nguyen, M. Rosu and M. Steiner, "Rich Queries on Encrypted Data: Beyond Exact Matches," European Symposium on Research in Computer Security (ESORICS), 2015.
- C. Ghali, A. Narayanan, D. Oran, G. Tsudik and C. Wood, "Secure Fragmentation for Content-Centric Networks," IEEE Symposium on Network Computing and Applications (NCA), 2015.
- C. Ghali, M. Schlosberg, G. Tsudik and C. Wood, "Interest-Based Access Control for Content Centric Networks," ACM Conference on Information-Centric Networking (ICN), 2015.
- A. Compagno, M. Conti, C. Ghali and G. Tsudik, "To NACK or not to NACK? Negative Acknowledgments in Information-Centric Networking," IEEE Conference on Computer Communications and Networks (ICCCN), 2015.
- A. Compagno, M. Conti, P. Gasti, L. Mancini and G. Tsudik, "Violating Consumer Anonymity: Geo-locating Nodes in
Named Data Networking," Applied Cryptography and Network Security (ACNS), 2015.
- K. El Defrawy, G. Holland and G. Tsudik, "Remote Attestation of Heterogeneous Cyber-Physical Systems: The Automotive Use Case," Conference on Embedded Security in Cars (ESCAR), 2015. Slides.
- T. Kaczmarek, A. Kobsa, R. Sy and G. Tsudik, "An Unattended Study of Users Performing Security Critical Tasks Under Adversarial Noise," NDSS Workshop on Usable Security (USEC), 2015.
- E. Ayday, E. De Cristofaro, JP Hubaux and G. Tsudik, "Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare?," IEEE Computer, 2015.
2014
- C. Ghali, G. Tsudik, E. Uzun, "Needle in a Haystack: Mitigating Content Poisoning in Named-Data Networking," NDSS Workshop on Security of Emerging Networking Technologies (SENT), 2014.
- C. Ghali, G. Tsudik, E. Uzun, "Network-Layer Trust in Named-Data Networking," ACM Computer Communication Review (CCR), vol. 44, issue 5, 13-19, 2014.
- M. Almishari, E. Oguz, G. Tsudik, "Fighting Authorship Linkability with Crowdsourcing," ACM Conference on Online Social Networks (COSN), 2014.
- M. Almishari, D. Kaafar, G. Tsudik, E. Oguz, "Stylometric Linkability of Tweets," Workshop on Privacy in the Electronic Society (WPES), 2014.
2013
- G. Acs, M. Conti, P. Gasti, C. Ghali, G. Tsudik, "Cache Privacy in Named-Data Networking," the 33rd International Conference on Distributed Computing Systems (ICDCS), 2013.
- P. Gasti, G. Tsudik, E. Uzun, L. Zhang, "DoS and DDoS in Named-Data Networking," the 22nd International Conference on Computer Communications and Networks (ICCCN), 2013.
- J. Burke, P. Gasti, N. Nathan, G. Tsudik, "Securing Instrumented Environments over Content-Centric Networking: The Case of Lighting Control," the 2nd IEEE International Workshop on Emerging Design Choices in Name-Oriented Networking (NOMEN), 2013.
- E. De Cristofaro, S. Faber, G. Tsudik, "Secure Genomic Testing with Size- and Position-Hiding Private Substring Matching," 12th ACM Workshop on Privacy in the Electronic Society (WPES), 2013.
- Karim El Defrawy and Sky Faber, "Blindfolded Data Search via Secure Pattern Matching," IEEE Computer, vol. 46, issue 12, 68-75, 2013.
- M. Almishari, P. Gasti, G. Tsudik, E. Oguz., "Privacy-Preserving Matching of Community-Contributed Content," the 18th European Symposium on Research in Computer Security (ESORICS), 2013.
2012
- K. Eldefrawy, A. Francillon, D. Perito and G. Tsudik, "SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust"," ISOC Symposium on Network and Distributed System Security (NDSS), 2012.
- M. Almishari, G. Tsudik, "Exploring Linkability of User Reviews ," the 17th European Symposium on Research in Computer Security (ESORICS), 2012.
- E. De Cristofaro, S. Faber, P. Gasti, G. Tsudik, "GenoDroid: Are Privacy-Preserving Genomic Tests Ready for Prime Time?," Workshop on Privacy in the Electronic Society (WPES), 2012.
- M. Almishari, E. De Cristofaro, K. Eldefrawy, G. Tsudik, "Harvesting SSL Certificate Data to Identify Web-Fraud," arXiv, vol. 14, issue 6, 2012.
- E. De Cristofaro, R. Di Pietro, "Preserving Query Privacy in Urban Sensing Systems," the 13th International Conference on Distributed Computing and Networking (ICDCN), 2012.
2011
- G. Ateniese, E. De Cristofaro, G. Tsudik, "(If) Size Matters: Size-Hiding Private Set Intersection," the 14th IACR International Conference on Practice and Theory of Public Key Cryptography (PKC), 2011.
- P. Baldi, R. Baronio, E. De Cristofaro, P. Gasti, G. Tsudik, "Countering GATTACA: Secure and Efficient Testing of Fully-Sequenced Human Genoms," the 18th ACM Conference on Computer and Communications Security (CCS), 2011.
- E. De Cristofaro, Y. Lu, G. Tsudik, "Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information," the 4th International Conference on Trust and Trustworthy Computing (TRUST), 2011.
- Y. Lu, G. Tsudik, "Enhancing Data Privacy in the Cloud," the 5th IFIP WG 11.11 International Conference on Trust Management (IFIPTM), 2011.
- C. Castelluccia, E. De Cristofaro, A. Francillon, M. A. Kafaar, "EphPub: Toward Robust Ephemeral Publishing," the 19th IEEE International Conference on Network Protocols (ICNP), 2011.
- E. Uzun, N. Saxena, A. Kumar, "Pairing Devices for Social Interactions: A Comparative Usability Evaluation," the ACM CHI Conference on Human Factors in Computing Systems (CHI), 2011.
- E. De Cristofaro, C. Soriente, "PEPSI: Privacy-Enhanced Participatory Sensing Infrastructure," the 4th ACM Conference on Wireless Network Security (WiSec), 2011.
- E. De Cristofaro, M. Manulis, B. Poettering, "Private Discovery of Common Social Contacts," the 9th International Conference on Applied Cryptography and Network Security (ACNS) , 2011.
- E. De Cristofaro, A. Durussel, I. Aad, "Reclaiming Privacy for Smartphone Applications," the 9th IEEE International Conference on Pervasive Computing and Communications (PerCom), 2011.
- A. Kobsa, R. Nithyanand, G. Tsudik, E. Uzun, "Usability of Display - Equipped RFID Tags for Security Purposes," the 16th European Symposium on Research in Computer Security (ESORICS), 2011.
2010
- R. Nithyanand, N. Saxena, G. Tsudik, E. Uzun, "Groupthink: On the Usability of Secure Group Association of Wireless Devices," the 12th ACM International Conference on Ubiquitous Computing (Ubicomp), 2010.
- D. Ma, G. Tsudik, "IRRES: Intrusion Resilient Remote Email Storage," First ICDCS Workshop on Security and Privacy in Cloud Computing (SPCC), 2010.
- E. De Cristofaro, J. Kim, G. Tsudik, "Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model," the 16th Annual International Conference on the Theory and Application of Cryptology and Information Security (Asiacrypt), 2010.
- C. Catellucia, K. E. Defrawy, G. Tsudik, "Link-Layer Encryption Effect on the Capacity of Network Coding in Wireless Networks," IEEE INFOCOM Work in Progress (WiP), 2010.
- E. De Cristofaro, G.Tsudik., "Practical Private Set Intersection Protocols with Linear Complexity," Financial Cryptography, 2010.
- C. Castelluccia, E. De Cristofaro, D. Perito., "Private Information Disclosure from Web Searches," the 10th Privacy Enhancing Technologies Symposium (PETS), 2010.
- R. Nithyanand, G. Tsudik, E. Uzun, "Readers Behaving Badly: Reader Revocation in PKI-Based RFID Systems," the 15th European Symposium on Research in Computer Security (ESORICS) , 2010.
- M. Wilhelm, I. Martinovic, E. Uzun, J. B. Schmitt, "SUDOKU: Secure and Usable Deployment of Keys on Wireless Sensors," the 6th Workshop on Secure Network Protocols (NPSEC), 2010.
- Y. Lu, G. Tsudik, "Towards Plugging Privacy Leaks in the Domain Name System," the IEEE International Conference on Peer-to-Peer Computing (P2P), 2010.
- D. Ma, G. Tsudik, "Security and Privacy in Emerging Wireless Networks," IEEE Wireless Communications, vol. 17, issue 5, 2--11, 2010.
- E. De Cristofaro, J. Kim., "Some like it private. Sharing Confidential Information based on Oblivious Authorization," IEEE Security and Privacy, vol. 8, issue 4, 2010.
2009
- A. Kumar, N. Saxena, G. Tsudik, E. Uzun, "Caveat Emptor: A Comparative Study of Secure Device Pairing Methods," the 7th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), 2009.
- E. De Cristofaro, J. M. Bohli, D. Westhoff., "FAIR: Fuzzy-based Aggregation Providing In-Network Resilience for Real-Time Sensor Networks," the 2nd ACM Conference on Wireless Network Security (WISEC), 2009.
- M. Cagalj, A. Kumar, N. Saxena, E. Uzun, "On the Usability of Wireless Device Authentication Based on Distance Bounding," the 8th International Conference on Cryptology And Network Security (CANS), 2009.
- E. De Cristofaro, S. Jarecki, J. Kim, G. Tsudik., "Privacy-preserving Policy-based Information Transfer," the 9th Privacy Enhancing Technologies Symposium (PETS), 2009.
- E. De Cristofaro, X. Ding, G. Tsudik. , "Privacy-Preserving Querying in Sensor Networks," the 18th International Conference on Computer Communications and Networks (ICCCN), 2009.
- A. Kobsa, R. Sonawalla, G. Tsudik, E. Uzun, Y. Wang, "Serial Hook-Ups: A Comparative Usability Study of Secure Device Pairing Methods," the 5th Symposium on Usable Privacy and Security (SOUPS), 2009.
- A. Kumar, N. Saxena, G. Tsudik, E. Uzun., "A comparative Study of Secure Device Pairing Methods," the Pervasive and Mobile Computing Journal (PMC), vol. 5, issue 6, 2009.
- D. Ma, G. Tsudik, "A New Approach to Secure Logging," ACM Transactions on Storage, vol. 5, issue 1, 2:1--2:21, 2009.
- D. Ma, C. Soriente, G. Tsudik, "New Adversary and New Threats: Security in Unattended Sensor Networks," IEEE Network, vol. 23, issue 2, 43--48, 2009.
- C. Soriente, G. Tsudik, E. Uzun, "Secure Pairing of Interface Constrained Devices," the International Journal on Security and Networks, vol. 4, issue 1, 2009.
- M. T. Goodrich, M. Sirivianos, J. Solis, C. Soriente, G. Tsudik, E. Uzun, "Using Audio in Secure Device Pairing," the International Journal on Security and Networks, vol. 4, issue 1, 2009.
2008
- C. Blundo, E. De Cristofaro, C. Galdi, G. Persiano., "A Distributed Implementation of the Certified Information Access Service," the European Symposium on Research in Computer Security (ESORICS), 2008.
- D. Ma, G. Tsudik, "A New Approach to Secure Logging," the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC), 2008.
- C. Castelluccia, C. Soriente, "ABBA: A Balls and Bins Approach to Secure Aggregation in WSNs," the 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), 2008.
- R. Di Pietro, L.V. Mancini, A. Spognardi, C. Soriente, G. Tsudik, "Catch Me (If You Can): Data Survival in Unattended Sensor Networks," the 6th Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), 2008.
- D. Ma, G. Tsudik, "DISH: Distributed Self-Healing (in Unattended Sensor Networks)," the 10th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), Detroit, 2008.
- C.Soriente, G. Tsudik, E. Uzun, "HAPADEP: Human-Assisted Pure Audio Device Pairing," the 11th International Information Security Conference (ISC), 2008.
- R. Di Pietro, D. Ma, C. Soriente, G. Tsudik, "POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks," the 27th IEEE International Symposium on Reliable Distributed Systems (SRDS), 2008.
- D. Ma, "Practical Forward Secure Sequential Aggregate Signatures," the ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2008.
- K. El Defrawy, G. Tsudik, "PRISM: Privacy-friendly Routing In Suspicious MANETs (and VANETs)," the 16th IEEE International Conference of Network Protocols (ICNP), 2008.
- G. Ateniese, R. Di Pietro, L.V. Mancini, G. Tsudik, "Scalable and Efficient Provable Data Possession," the 4th International Conference on Security and Privacy in Communication Network (SecureComm),, 2008.
- C. Blundo, E. De Cristofaro, A. Del Sorbo, C. Galdi, G. Persiano, "Validating Orchestration of Web Services with BPEL and Aggregate Signatures," the European Conference on Web Services (ECOWS), 2008.
- N. Saxena, G. Tsudik, J. Yi, "Efficient Node Admission and Certificate-Less Secure Communication in Short-Lived MANETs," the IEEE Transactions on Parallel and Distributed Systems (TPDS), 2008.
- M. Narasimha, J. Solis, G. Tsudik, "Privacy-Preserving Revocation Checking," the International Journal of Information Security, 2008.
2007
- E. De Cristofaro, "A Secure and Privacy-Protecting Aggregation Scheme for Sensor Networks," the International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2007.
- K. El Defrawy, G. Tsudik, "ALARM: Anonymous Location-Aided Routing in Suspicious MANETs," the 15th IEEE International Conference of Network Protocols (ICNP), 2007.
- C. Soriente, G. Tsudik, Ersin Uzun, "BEDA: Button Enabled Device Association," the International Workshop on Security for Spontaneous Interaction (IWSSI), 2007.
- D. Ma, G. Tsudik, "Forward-Secure Sequential Aggregate Authentication," the IEEE Symposium on Security and Privacy (S&P), 2007.
- S. Jarecki, J. Kim, G. Tsudik, "Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement," RSA Conference - Cryptographers' Track, 2007.
- K. El Defrawy, M. El Zarki, G. Tsudik, "Incentive-Based Cooperative and Secure Inter-Personal Networking," the 1st International Workshop on Mobile Opportunistic Networking (MobiOpp), 2007.
- D. Ma, "Secure Feedback Service in Wireless Sensor Networks ," the 3rd Information Security Practice and Experience Conference (ISPEC), 2007.
- N. Saxena, G. Tsudik, J. Yi, "Threshold Cryptography in P2P and MANETs: the Case of Access Control," Computer Networks, vol. 51, issue 13, 3632--3649, 2007.
- E. Uzun, K. Karvonen, N. Asokan, "Usability Analysis of Secure Pairing Methods," the 1st International Workshop on Usable Security (USEC), 2007.
- K. Kostiainen, E. Uzun, N. Asokan, P. Ginzboorg, "Framework for Comparative Usability Testing of Distributed Applications," Nokia Research Center Technical Report NRC-TR, 2007.
- E. Uzun, K. Karvonen, N. Asokan, "Usability Analysis of Secure Pairing Methods," Nokia Research Center Technical Report NRC-TR-2007-002, 2007.