Reza Curtmola
Reza Curtmola
Professor of Computer Science, New Jersey Institute of Technology (NJIT)
Verified email at njit.edu - Homepage
Title
Cited by
Cited by
Year
Provable data possession at untrusted stores
G Ateniese, R Burns, R Curtmola, J Herring, L Kissner, Z Peterson, ...
Proceedings of the 14th ACM conference on Computer and communications …, 2007
30812007
Searchable symmetric encryption: improved definitions and efficient constructions
R Curtmola, J Garay, S Kamara, R Ostrovsky
Journal of Computer Security 19 (5), 895-934, 2011
24232011
MR-PDP: Multiple-replica provable data possession
R Curtmola, O Khan, R Burns, G Ateniese
2008 the 28th international conference on distributed computing systems, 411-420, 2008
5842008
Remote data checking using provable data possession
G Ateniese, R Burns, R Curtmola, J Herring, O Khan, L Kissner, ...
ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-34, 2011
4362011
Fostering participaction in smart cities: a geo-social crowdsensing platform
G Cardone, L Foschini, P Bellavista, A Corradi, C Borcea, M Talasila, ...
IEEE Communications Magazine 51 (6), 112-119, 2013
3232013
Remote data checking for network coding-based distributed storage systems
B Chen, R Curtmola, G Ateniese, R Burns
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 31-42, 2010
2622010
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
B Awerbuch, R Curtmola, D Holmer, C Nita-Rotaru, H Rubens
ACM Transactions on Information and System Security (TISSEC) 10 (4), 1-35, 2008
2272008
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
J Dong, R Curtmola, C Nita-Rotaru
Proceedings of the second ACM conference on Wireless network security, 111-122, 2009
1472009
Robust remote data checking
R Curtmola, O Khan, R Burns
Proceedings of the 4th ACM international workshop on Storage security and …, 2008
1352008
Mitigating byzantine attacks in ad hoc wireless networks
B Awerbuch, R Curtmola, D Holmer, C Nita-Rotaru, H Rubens
Department of Computer Science, Johns Hopkins University, Tech. Rep. Version …, 2004
1112004
On the survivability of routing protocols in ad hoc wireless networks
B Awerbuch, R Curtmola, D Holmer, H Rubens, C Nita-Rotaru
First International Conference on Security and Privacy for Emerging Areas in …, 2005
952005
Secure network coding for wireless mesh networks: Threats, challenges, and directions
J Dong, R Curtmola, C Nita-Rotaru
Computer Communications 32 (17), 1790-1801, 2009
942009
BSMR: Byzantine-resilient secure multicast routing in multihop wireless networks
R Curtmola, C Nita-Rotaru
IEEE Transactions on Mobile Computing 8 (4), 445-459, 2008
842008
Robust dynamic provable data possession
B Chen, R Curtmola
2012 32nd International Conference on Distributed Computing Systems …, 2012
592012
Link: Location verification through immediate neighbors knowledge
M Talasila, R Curtmola, C Borcea
International Conference on Mobile and Ubiquitous Systems: Computing …, 2010
582010
Medical information privacy assurance: Cryptographic and system aspects
G Ateniese, R Curtmola, B De Medeiros, D Davis
International Conference on Security in Communication Networks, 199-218, 2002
582002
Improving location reliability in crowd sensed data with minimal efforts
M Talasila, R Curtmola, C Borcea
6th Joint IFIP Wireless and Mobile Networking Conference (WMNC), 1-8, 2013
522013
Toward secure network coding in wireless networks: Threats and challenges
J Dong, R Curtmola, R Sethi, C Nita-Rotaru
2008 4th workshop on secure network protocols, 33-38, 2008
502008
Secure high-throughput multicast routing in wireless mesh networks
J Dong, R Curtmola, C Nita-Rotaru
IEEE Transactions on Mobile Computing 10 (5), 653-668, 2010
472010
Practical defenses against pollution attacks in wireless network coding
J Dong, R Curtmola, C Nita-Rotaru
ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-31, 2011
432011
The system can't perform the operation now. Try again later.
Articles 1–20