Gene Tsudik - Publications#
Summary:
- 149 Refereed Conference Publications
- 67 Refereed Journal Articles
- 8 Issued Patents (further 2 pending)
- Google Scholar: H-Index: 74 (55 since 2010), Total Citations: 20,877 (9287 since 2010)
- Microsoft Academic Search: Field Rating: 45, Overall Rank in Computer Science: 301
NOTE: on all publications, authors are listed in alphabetical order.
Prominent Publications (5 selected)
1) I. Foster, C. Kesselman, G. Tsudik and S. Tuecke, Security Architecture for Large-Scale Distributed Computations,
ACM Conference on Computer and Communications Security (CCS), 1998.
2) G. Ateniese, J. Camenisch, M. Joye and G. Tsudik, A Practical and Provably Secure Coalition-Resistant Group
Signature Scheme, IACR Advances in Cryptology—CRYPTO 2000.
3) M. Steiner, G. Tsudik and M. Waidner, Diffie-Hellman Key Distribution Extended to Groups,
ACM Conference onComputer and Communications Security (CCS), 1996. Extended version appeared in:
Key Agreement in Dynamic Peer Groups, IEEE Transactions on Parallel and Distributed Systems. Vol. 11, No. 8, 2000.
4) Y. Kim. A. Perrig and G. Tsudik, Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups,
ACM Conference on Computer and Communication Security (CCS), 2000. Extended version appeared in:
Tree-Based Group Key Agreement, ACM Transactions on Information Systems Security, Vol. 7, No. 1, 2004.
5) D. Ma and G. Tsudik, Forward-Secure Sequential Aggregate Authentication,
IEEE Symposium on Research in Security and Privacy (S&P), 2007. Extended version appeared in:
A New Approach to Secure Logging, ACM Transactions on Storage, Vol. 5, No. 1, 2009.
Recent Publications (5 selected):
6) K. El Defrawy and G. Tsudik, ALARM: Anonymous Location-Aided Routing in Suspicious MANETs,
IEEE International Conference on Network Protocols (ICNP), 2007. Extended version appeared in:
IEEE Transactions on Mobile Computing, Vol. 10, No. 9, September 2011.
7) A. Francillon, Q. Nguyen, K. Rasmussen and G. Tsudik, A Minimalist Approach to Remote Attestation,
IEEE/ACM Design, Automation, and Test in Europe (DATE), 2014.
8) I. Martinovic, K. Rasmussen, M. Roeschlin and G. Tsudik, Authentication Using Pulse-Response Biometrics,
ISOC Symposium on Network and Distributed System Security (NDSS), 2014.
9) P. Baldi, R. Baronio, E. De Cristofaro, P. Gasti and G. Tsudik, Countering GATTACA: Efficient and Secure Testing of Fully-Sequenced Human Genomes, ACM Computer and Communication Security Conference (CCS), 2011.
10) E. De Cristofaro, C. Soriente, G. Tsudik and A. Williams, Hummingbird: Privacy at the time of Twitter,
IEEE Symposium on Research in Security and Privacy (S&P), 2012. Extended version appeared in:
IEEE Data Engineering Bulletin, Special Issue on Cloud Security and Privacy, Vol. 35, No. 4, December 2012.