Follow
Gene Tsudik
Gene Tsudik
Peter & Lois Griffin Professor, Jolly Good Fellow of This & That
Verified email at ics.uci.edu - Homepage
Title
Cited by
Cited by
Year
A security architecture for computational grids
I Foster, C Kesselman, G Tsudik, S Tuecke
Proceedings of the 5th ACM Conference on Computer and Communications …, 1998
20961998
Scalable and efficient provable data possession
G Ateniese, R Di Pietro, LV Mancini, G Tsudik
Proceedings of the 4th international conference on Security and privacy in …, 2008
17812008
A practical and provably secure coalition-resistant group signature scheme
G Ateniese, J Camenisch, M Joye, G Tsudik
Advances in Cryptology—CRYPTO 2000: 20th Annual International Cryptology …, 2000
13002000
Diffie-Hellman key distribution extended to group communication
M Steiner, G Tsudik, M Waidner
Proceedings of the 3rd ACM Conference on Computer and Communications …, 1996
12021996
Readings in agents
MN Huhns, MP Singh
Morgan Kaufmann, 1998
8821998
Key agreement in dynamic peer groups
M Steiner, G Tsudik, M Waidner
IEEE Transactions on Parallel and Distributed Systems 11 (8), 769-780, 2000
8692000
Efficient aggregation of encrypted data in wireless sensor networks
C Castelluccia, E Mykletun, G Tsudik
Mobile and Ubiquitous Systems: Networking and Services, 2005. MobiQuitous …, 2005
7922005
Simple and fault-tolerant key agreement for dynamic collaborative groups
Y Kim, A Perrig, G Tsudik
Proceedings of the 7th ACM Conference on Computer and Communications …, 2000
7652000
Tree-based group key agreement
Y Kim, A Perrig, G Tsudik
ACM Transactions on Information and System Security (TISSEC) 7 (1), 60-96, 2004
7642004
Itinerant agents for mobile computing
D Chess, B Grosof, C Harrison, D Levine, C Parris, G Tsudik
IEEE Personal Communications 2 (5), 34-49, 1995
7531995
A privacy-preserving index for range queries
B Hore, S Mehrotra, G Tsudik
Proceedings of the Thirtieth international conference on Very large data …, 2004
6482004
DoS and DDoS in Named-Data Networking
P Gasti, G Tsudik, E Uzun, L Zhang
Proceedings of 2013 IEEE International Conference on Computer Communications …, 2013
6312013
Authentication and Integrity in Outsourced Databases
E MYKLETUN, M NARASIMHA, G TSUDIK
Symposium on Network and Distributed Systems Security (NDSS), 2004
6122004
CLIQUES: A new approach to group key agreement
M Steiner, G Tsudik, M Waidner
Proceedings. 18th International Conference on Distributed Computing Systems …, 1998
5641998
Message authentication with one-way hash functions
G Tsudik
ACM SIGCOMM Computer Communication Review 22 (5), 29-38, 1992
5521992
Message authentication with one-way hash functions
G Tsudik
IEEE INFOCOM '92: The Conference on Computer Communications, 1992
5521992
Practical private set intersection protocols with linear complexity
E De Cristofaro, G Tsudik
International Conference on Financial Cryptography and Data Security, 143-159, 2010
5502010
Towards an analysis of onion routing security
P Syverson, G Tsudik, M Reed, C Landwehr
Designing privacy enhancing technologies: International workshop on design …, 2001
5492001
Personal key archive
MH Linehan, NJ Simicich, GY Tsudik
US Patent 5,495,533, 1996
5451996
New multiparty authentication services and key agreement protocols
G Ateniese, M Steiner, G Tsudik
IEEE journal on selected areas in communications 18 (4), 628-639, 2000
4952000
The system can't perform the operation now. Try again later.
Articles 1–20