Number of co-authors:14
Number of publications with 3 favourite co-authors:Ersin Uzun:2Xuhua Ding:2Yang Wang:1
Gene Tsudik's 3 most productive colleagues in number of publications:Alfred Kobsa:35Yang Wang:14Dan Boneh:7
go to course
Information Visualization: Getting Dashboards Right
go to course
User Experience: The Beginner's Guide
89% booked. Starts in 6 days
Marc Hassenzahl explains the fascinating concept of User Experience and Experience Design. Commentaries by Don Norman, Eric Reiss, Mark Blythe, and Whitney Hess
User Experience and Experience Design !
Our Latest Books
The Social Design of Technical Systems: Building technologies for communities. 2nd Edition
by Brian Whitworth and Adnan Ahmad
Gamification at Work: Designing Engaging Business Software
by Janaki Mythily Kumar and Mario Herger
The Social Design of Technical Systems: Building technologies for communities
by Brian Whitworth and Adnan Ahmad
The Encyclopedia of Human-Computer Interaction, 2nd Ed.
by Mads Soegaard and Rikke Friis Dam
Publications by Gene Tsudik (bibliography)
Nithyanand, Rishab, Saxena, Nitesh, Tsudik, Gene and Uzun, Ersin (2010): Groupthink: usability of secure group association for wireless devices. In: Proceedings of the 2010 International Conference on Uniquitous Computing 2010. pp. 331-340. Available online
A fairly common modern setting entails users, each in possession of a personal wireless device, wanting to communicate securely, via their devices. If these users (and their devices) have no prior association, a new security context must be established. In order to prevent potential attacks, the initial context (association) establishment process must involve only the intended devices and their users. A number of methods for initial secure association of two devices have been proposed; their usability factors have been explored and compared extensively. However, a more challenging problem of initial secure association of a group of devices (and users) has not received much attention. Although a few secure group association methods have been proposed, their usability aspects have not been studied, especially, in a comparative manner. This paper discusses desirable features and evaluation criteria for secure group association, identifies suitable methods and presents a comparative usability study. Results show that some simple methods (e.g., peer- or leader-based number comparisons) are quite attractive for small groups, being fast, reasonably secure and well-received by users.
© All rights reserved Nithyanand et al. and/or their publisher
Kobsa, Alfred, Sonawalla, Rahim, Tsudik, Gene, Uzun, Ersin and Wang, Yang (2009): Serial hook-ups: a comparative usability study of secure device pairing methods. In: Proceedings of the 2009 Symposium on Usable Privacy and Security 2009. p. 10. Available online
Secure Device Pairing is the bootstrapping of secure communication between two previously unassociated devices over a wireless channel. The human-imperceptible nature of wireless communication, lack of any prior security context, and absence of a common trust infrastructure open the door for Man-in-the-Middle (aka Evil Twin) attacks. A number of methods have been proposed to mitigate these attacks, each requiring user assistance in authenticating information exchanged over the wireless channel via some human-perceptible auxiliary channels, e.g., visual, acoustic or tactile. In this paper, we present results of the first comprehensive and comparative study of eleven notable secure device pairing methods. Usability measures include: task performance times, ratings on System Usability Scale (SUS), task completion rates, and perceived security. Study subjects were controlled for age, gender and prior experience with device pairing. We present overall results and identify problematic methods for certain classes of users as well as methods best-suited for various device configurations.
© All rights reserved Kobsa et al. and/or ACM Press
Pietro, Roberto Di, Mancini, Luigi V., Soriente, Claudio, Spognardi, Angelo and Tsudik, Gene (2008): Catch Me (If You Can): Data Survival in Unattended Sensor Networks. In: PerCom 2008 - Sixth Annual IEEE International Conference on Pervasive Computing and Communications 17-21 March, 2008, Hong Kong. pp. 185-194. Available online
Ding, Xuhua, Mazzocchi, Daniele and Tsudik, Gene (2007): Equipping smart devices with public key signatures. In ACM Trans. Internet Techn., 7 (1) . Available online
Tsudik, Gene (2006): YA-TRAP: Yet Another Trivial RFID Authentication Protocol. In: PerCom 2006 - 4th IEEE Conference on Pervasive Computing and Communications Workshops 13-17 March, 2006, Pisa, Italy. pp. 640-643. Available online
Narasimha, Maithili and Tsudik, Gene (2005): DSAC: integrity for outsourced databases with signature aggregation and chaining. In: Herzog, Otthein, Schek, Hans-Jorg and Fuhr, Norbert (eds.) Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management October 31 - November 5, 2005, Bremen, Germany. pp. 235-236. Available online
Boneh, Dan, Ding, Xuhua and Tsudik, Gene (2004): Fine-grained control of security capabilities. In ACM Trans. Internet Techn., 4 (1) pp. 60-82. Available online
Join our community and advance:
Page maintainer: The Editorial Team