Gene Tsudik

Personal Homepage
Employer
()
Email

Publication Statistics

Publication period start
2004
Publication period end
2010
Number of co-authors
14

Co-authors
Number of publications with favourite co-authors

Productive Colleagues
Most productive colleagues in number of publications

Publications

Nithyanand, Rishab, Saxena, Nitesh, Tsudik, Gene, Uzun, Ersin (2010): Groupthink: usability of secure group association for wireless devices. In: Proceedings of the 2010 International Conference on Uniquitous Computing , 2010, . pp. 331-340. http://doi.acm.org/10.1145/1864349.1864399

Kobsa, Alfred, Sonawalla, Rahim, Tsudik, Gene, Uzun, Ersin, Wang, Yang (2009): Serial hook-ups: a comparative usability study of secure device pairing methods. In: Proceedings of the 2009 Symposium on Usable Privacy and Security , 2009, . pp. 10. http://doi.acm.org/10.1145/1572532.1572546

Pietro, Roberto Di, Mancini, Luigi V., Soriente, Claudio, Spognardi, Angelo, Tsudik, Gene (2008): Catch Me (If You Can): Data Survival in Unattended Sensor Networks. In: PerCom 2008 - Sixth Annual IEEE International Conference on Pervasive Computing and Communications 17-21 March, 2008, Hong Kong. pp. 185-194. http://doi.ieeecomputersociety.org/10.1109/PERCOM.2008.31

Ding, Xuhua, Mazzocchi, Daniele, Tsudik, Gene (2007): Equipping smart devices with public key signatures. In ACM Trans. Internet Techn., 7 (1) pp. . http://doi.acm.org/10.1145/1189740.1189743

Tsudik, Gene (2006): YA-TRAP: Yet Another Trivial RFID Authentication Protocol. In: PerCom 2006 - 4th IEEE Conference on Pervasive Computing and Communications Workshops 13-17 March, 2006, Pisa, Italy. pp. 640-643. http://doi.ieeecomputersociety.org/10.1109/PERCOMW.2006.152

Narasimha, Maithili, Tsudik, Gene (2005): DSAC: integrity for outsourced databases with signature aggregation and chaining. In: Herzog, Otthein, Schek, Hans-Jorg, Fuhr, Norbert (eds.) Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management October 31 - November 5, 2005, Bremen, Germany. pp. 235-236. http://doi.acm.org/10.1145/1099554.1099604

Boneh, Dan, Ding, Xuhua, Tsudik, Gene (2004): Fine-grained control of security capabilities. In ACM Trans. Internet Techn., 4 (1) pp. 60-82. http://doi.acm.org/10.1145/967030.967033