关注
Gene Tsudik
Gene Tsudik
Peter & Lois Griffin Professor, Jolly Good Fellow of This & That
在 ics.uci.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A security architecture for computational grids
I Foster, C Kesselman, G Tsudik, S Tuecke
Proceedings of the 5th ACM Conference on Computer and Communications …, 1998
20981998
Scalable and efficient provable data possession
G Ateniese, R Di Pietro, LV Mancini, G Tsudik
Proceedings of the 4th international conference on Security and privacy in …, 2008
18102008
A practical and provably secure coalition-resistant group signature scheme
G Ateniese, J Camenisch, M Joye, G Tsudik
Advances in Cryptology—CRYPTO 2000: 20th Annual International Cryptology …, 2000
13092000
Diffie-Hellman key distribution extended to group communication
M Steiner, G Tsudik, M Waidner
Proceedings of the 3rd ACM Conference on Computer and Communications …, 1996
12191996
Readings in agents
MN Huhns, MP Singh
Morgan Kaufmann, 1998
8931998
Key agreement in dynamic peer groups
M Steiner, G Tsudik, M Waidner
IEEE Transactions on Parallel and Distributed Systems 11 (8), 769-780, 2000
8822000
Efficient aggregation of encrypted data in wireless sensor networks
C Castelluccia, E Mykletun, G Tsudik
Mobile and Ubiquitous Systems: Networking and Services, 2005. MobiQuitous …, 2005
7952005
Tree-based group key agreement
Y Kim, A Perrig, G Tsudik
ACM Transactions on Information and System Security (TISSEC) 7 (1), 60-96, 2004
7782004
Simple and fault-tolerant key agreement for dynamic collaborative groups
Y Kim, A Perrig, G Tsudik
Proceedings of the 7th ACM Conference on Computer and Communications …, 2000
7682000
Itinerant agents for mobile computing
D Chess, B Grosof, C Harrison, D Levine, C Parris, G Tsudik
IEEE Personal Communications 2 (5), 34-49, 1995
7571995
A privacy-preserving index for range queries
B Hore, S Mehrotra, G Tsudik
Proceedings of the Thirtieth international conference on Very large data …, 2004
6612004
DoS and DDoS in Named-Data Networking
P Gasti, G Tsudik, E Uzun, L Zhang
Proceedings of 2013 IEEE International Conference on Computer Communications …, 2013
6392013
Authentication and Integrity in Outsourced Databases
E MYKLETUN, M NARASIMHA, G TSUDIK
Symposium on Network and Distributed Systems Security (NDSS), 2004
6222004
Practical private set intersection protocols with linear complexity
E De Cristofaro, G Tsudik
International Conference on Financial Cryptography and Data Security, 143-159, 2010
5942010
CLIQUES: A new approach to group key agreement
M Steiner, G Tsudik, M Waidner
Proceedings. 18th International Conference on Distributed Computing Systems …, 1998
5711998
Towards an analysis of onion routing security
P Syverson, G Tsudik, M Reed, C Landwehr
Designing privacy enhancing technologies: International workshop on design …, 2001
5612001
Message authentication with one-way hash functions
G Tsudik
ACM SIGCOMM Computer Communication Review 22 (5), 29-38, 1992
5571992
Message authentication with one-way hash functions
G Tsudik
IEEE INFOCOM '92: The Conference on Computer Communications, 1992
5571992
Personal key archive
MH Linehan, NJ Simicich, GY Tsudik
US Patent 5,495,533, 1996
5501996
Smart: secure and minimal architecture for (establishing dynamic) root of trust.
K Eldefrawy, A Francillon, D Perito, G Tsudik
NDSS 12, 1-15, 2012
5152012
系统目前无法执行此操作,请稍后再试。
文章 1–20