Follow
Gene Tsudik
Gene Tsudik
Peter & Lois Griffin Professor, Jolly Good Fellow of This & That
Verified email at ics.uci.edu - Homepage
Title
Cited by
Cited by
Year
A security architecture for computational grids
I Foster, C Kesselman, G Tsudik, S Tuecke
Proceedings of the 5th ACM Conference on Computer and Communications …, 1998
21061998
Scalable and efficient provable data possession
G Ateniese, R Di Pietro, LV Mancini, G Tsudik
Proceedings of the 4th international conference on Security and privacy in …, 2008
17792008
Named data networking (ndn) project
L Zhang, D Estrin, J Burke, V Jacobson, JD Thornton, DK Smetters, ...
Relatório Técnico NDN-0001, Xerox Palo Alto Research Center-PARC 157, 158, 2010
1339*2010
A practical and provably secure coalition-resistant group signature scheme
G Ateniese, J Camenisch, M Joye, G Tsudik
Advances in Cryptology—CRYPTO 2000: 20th Annual International Cryptology …, 2000
12972000
Named data networking (ndn) project
L Zhang, D Estrin, J Burke, V Jacobson, JD Thornton, DK Smetters, ...
Relatório Técnico NDN-0001, Xerox Palo Alto Research Center-PARC 157, 158, 2010
12472010
Diffie-Hellman key distribution extended to group communication
M Steiner, G Tsudik, M Waidner
Proceedings of the 3rd ACM Conference on Computer and Communications …, 1996
12061996
Readings in agents
MN Huhns, MP Singh
Morgan Kaufmann, 1998
8881998
Key agreement in dynamic peer groups
M Steiner, G Tsudik, M Waidner
IEEE Transactions on Parallel and Distributed Systems 11 (8), 769-780, 2000
8772000
Efficient aggregation of encrypted data in wireless sensor networks
C Castelluccia, E Mykletun, G Tsudik
Mobile and Ubiquitous Systems: Networking and Services, 2005. MobiQuitous …, 2005
7882005
Simple and fault-tolerant key agreement for dynamic collaborative groups
Y Kim, A Perrig, G Tsudik
Proceedings of the 7th ACM Conference on Computer and Communications …, 2000
7642000
Tree-based group key agreement
Y Kim, A Perrig, G Tsudik
ACM Transactions on Information and System Security (TISSEC) 7 (1), 60-96, 2004
7632004
Itinerant agents for mobile computing
D Chess, B Grosof, C Harrison, D Levine, C Parris, G Tsudik
IEEE Personal Communications 2 (5), 34-49, 1995
7561995
A privacy-preserving index for range queries
B Hore, S Mehrotra, G Tsudik
Proceedings of the Thirtieth international conference on Very large data …, 2004
6442004
Authentication and Integrity in Outsourced Databases
E MYKLETUN, M NARASIMHA, G TSUDIK
Symposium on Network and Distributed Systems Security (NDSS), 2004
6132004
DoS and DDoS in Named-Data Networking
P Gasti, G Tsudik, E Uzun, L Zhang
Proceedings of 2013 IEEE International Conference on Computer Communications …, 2013
6102013
CLIQUES: A new approach to group key agreement
M Steiner, G Tsudik, M Waidner
Proceedings. 18th International Conference on Distributed Computing Systems …, 1998
5641998
Message authentication with one-way hash functions
G Tsudik
ACM SIGCOMM Computer Communication Review 22 (5), 29-38, 1992
5571992
Message authentication with one-way hash functions
G Tsudik
IEEE INFOCOM '92: The Conference on Computer Communications, 1992
5571992
Practical private set intersection protocols with linear complexity
E De Cristofaro, G Tsudik
International Conference on Financial Cryptography and Data Security, 143-159, 2010
5482010
Personal key archive
MH Linehan, NJ Simicich, GY Tsudik
US Patent 5,495,533, 1996
5451996
The system can't perform the operation now. Try again later.
Articles 1–20