Publication statistics

Pub. period:2004-2010
Pub. count:7
Number of co-authors:14



Co-authors

Number of publications with 3 favourite co-authors:

Ersin Uzun:2
Xuhua Ding:2
Yang Wang:1

 

 

Productive colleagues

Gene Tsudik's 3 most productive colleagues in number of publications:

Alfred Kobsa:35
Yang Wang:14
Dan Boneh:7
 
 
 
Jul 22

... in an information-rich world, the wealth of information means a dearth of something else: a scarcity of whatever it is that information consumes. What information consumes is rather obvious: it consumes the attention of its recipients. Hence a wealth of information creates a poverty of attention, and a need to allocate that attention efficiently among the overabundance of information sources that might consume it.

-- Herbert Simon in "Computers, Communications and the Public Interest," 1971

 
 

Featured chapter

Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess

User Experience and Experience Design !

 
 

Our Latest Books

Kumar and Herger 2013: Gamification at Work: Designing Engaging Business Software...
by Janaki Mythily Kumar and Mario Herger

 
Start reading

Whitworth and Ahmad 2013: The Social Design of Technical Systems: Building technologies for communities...
by Brian Whitworth and Adnan Ahmad

 
Start reading

Soegaard and Dam 2013: The Encyclopedia of Human-Computer Interaction, 2nd Ed....
by Mads Soegaard and Rikke Friis Dam

 
Start reading
 
 

Help us help you!

 
 

Gene Tsudik

Add description
Add publication

Publications by Gene Tsudik (bibliography)

 what's this?
2010
 
Edit | Del

Nithyanand, Rishab, Saxena, Nitesh, Tsudik, Gene and Uzun, Ersin (2010): Groupthink: usability of secure group association for wireless devices. In: Proceedings of the 2010 International Conference on Uniquitous Computing 2010. pp. 331-340.

A fairly common modern setting entails users, each in possession of a personal wireless device, wanting to communicate securely, via their devices. If these users (and their devices) have no prior association, a new security context must be established. In order to prevent potential attacks, the initial context (association) establishment process must involve only the intended devices and their users. A number of methods for initial secure association of two devices have been proposed; their usability factors have been explored and compared extensively. However, a more challenging problem of initial secure association of a group of devices (and users) has not received much attention. Although a few secure group association methods have been proposed, their usability aspects have not been studied, especially, in a comparative manner. This paper discusses desirable features and evaluation criteria for secure group association, identifies suitable methods and presents a comparative usability study. Results show that some simple methods (e.g., peer- or leader-based number comparisons) are quite attractive for small groups, being fast, reasonably secure and well-received by users.

© All rights reserved Nithyanand et al. and/or their publisher

2009
 
Edit | Del

Kobsa, Alfred, Sonawalla, Rahim, Tsudik, Gene, Uzun, Ersin and Wang, Yang (2009): Serial hook-ups: a comparative usability study of secure device pairing methods. In: Proceedings of the 2009 Symposium on Usable Privacy and Security 2009. p. 10.

Secure Device Pairing is the bootstrapping of secure communication between two previously unassociated devices over a wireless channel. The human-imperceptible nature of wireless communication, lack of any prior security context, and absence of a common trust infrastructure open the door for Man-in-the-Middle (aka Evil Twin) attacks. A number of methods have been proposed to mitigate these attacks, each requiring user assistance in authenticating information exchanged over the wireless channel via some human-perceptible auxiliary channels, e.g., visual, acoustic or tactile. In this paper, we present results of the first comprehensive and comparative study of eleven notable secure device pairing methods. Usability measures include: task performance times, ratings on System Usability Scale (SUS), task completion rates, and perceived security. Study subjects were controlled for age, gender and prior experience with device pairing. We present overall results and identify problematic methods for certain classes of users as well as methods best-suited for various device configurations.

© All rights reserved Kobsa et al. and/or ACM Press

2008
 
Edit | Del

Pietro, Roberto Di, Mancini, Luigi V., Soriente, Claudio, Spognardi, Angelo and Tsudik, Gene (2008): Catch Me (If You Can): Data Survival in Unattended Sensor Networks. In: PerCom 2008 - Sixth Annual IEEE International Conference on Pervasive Computing and Communications 17-21 March, 2008, Hong Kong. pp. 185-194.

2007
 
Edit | Del

Ding, Xuhua, Mazzocchi, Daniele and Tsudik, Gene (2007): Equipping smart devices with public key signatures. In ACM Trans. Internet Techn., 7 (1) .

2006
 
Edit | Del

Tsudik, Gene (2006): YA-TRAP: Yet Another Trivial RFID Authentication Protocol. In: PerCom 2006 - 4th IEEE Conference on Pervasive Computing and Communications Workshops 13-17 March, 2006, Pisa, Italy. pp. 640-643.

2005
 
Edit | Del

Narasimha, Maithili and Tsudik, Gene (2005): DSAC: integrity for outsourced databases with signature aggregation and chaining. In: Herzog, Otthein, Schek, Hans-Jörg and Fuhr, Norbert (eds.) Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management October 31 - November 5, 2005, Bremen, Germany. pp. 235-236.

2004
 
Edit | Del

Boneh, Dan, Ding, Xuhua and Tsudik, Gene (2004): Fine-grained control of security capabilities. In ACM Trans. Internet Techn., 4 (1) pp. 60-82.

 
Add publication
Show list on your website
 

Join our community and advance:

Your
Skills

Your
Network

Your
Career

 
 
 
 

Changes to this page (author)

02 Nov 2010: Modified
08 Sep 2009: Modified
24 Aug 2009: Modified
24 Aug 2009: Modified
18 Aug 2009: Modified
18 Aug 2009: Modified
29 May 2009: Added

Page Information

Page maintainer: The Editorial Team
URL: http://www.interaction-design.org/references/authors/gene_tsudik.html

Publication statistics

Pub. period:2004-2010
Pub. count:7
Number of co-authors:14



Co-authors

Number of publications with 3 favourite co-authors:

Ersin Uzun:2
Xuhua Ding:2
Yang Wang:1

 

 

Productive colleagues

Gene Tsudik's 3 most productive colleagues in number of publications:

Alfred Kobsa:35
Yang Wang:14
Dan Boneh:7
 
 
 
Jul 22

... in an information-rich world, the wealth of information means a dearth of something else: a scarcity of whatever it is that information consumes. What information consumes is rather obvious: it consumes the attention of its recipients. Hence a wealth of information creates a poverty of attention, and a need to allocate that attention efficiently among the overabundance of information sources that might consume it.

-- Herbert Simon in "Computers, Communications and the Public Interest," 1971

 
 

Featured chapter

Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess

User Experience and Experience Design !

 
 

Our Latest Books

Kumar and Herger 2013: Gamification at Work: Designing Engaging Business Software...
by Janaki Mythily Kumar and Mario Herger

 
Start reading

Whitworth and Ahmad 2013: The Social Design of Technical Systems: Building technologies for communities...
by Brian Whitworth and Adnan Ahmad

 
Start reading

Soegaard and Dam 2013: The Encyclopedia of Human-Computer Interaction, 2nd Ed....
by Mads Soegaard and Rikke Friis Dam

 
Start reading
 
 

Help us help you!