!!Gene Tsudik - Publications \\ __Summary:__ \\ *149 Refereed Conference Publications\\ *67 Refereed Journal Articles\\ *8 Issued Patents (further 2 pending)\\ *Google Scholar: H-Index: 74 (55 since 2010), Total Citations: 20,877 (9287 since 2010)\\ *Microsoft Academic Search: Field Rating: 45, Overall Rank in Computer Science: 301\\ \\ __NOTE:__ on all publications, authors are listed in alphabetical order.\\ \\ __Prominent Publications (5 selected)__ \\ \\ 1) I. Foster, C. Kesselman, G. Tsudik and S. Tuecke, Security Architecture for Large-Scale Distributed Computations,\\ ACM Conference on Computer and Communications Security (CCS), 1998.\\ \\ 2) G. Ateniese, J. Camenisch, M. Joye and G. Tsudik, A Practical and Provably Secure Coalition-Resistant Group \\ Signature Scheme, IACR Advances in Cryptology—CRYPTO 2000.\\ \\ 3) M. Steiner, G. Tsudik and M. Waidner, Diffie-Hellman Key Distribution Extended to Groups, \\ ACM Conference onComputer and Communications Security (CCS), 1996. Extended version appeared in: \\ Key Agreement in Dynamic Peer Groups, IEEE Transactions on Parallel and Distributed Systems. Vol. 11, No. 8, 2000.\\ \\ 4) Y. Kim. A. Perrig and G. Tsudik, Simple and Fault-Tolerant Key Agreement for Dynamic Collaborative Groups, \\ ACM Conference on Computer and Communication Security (CCS), 2000. Extended version appeared in: \\ Tree-Based Group Key Agreement, ACM Transactions on Information Systems Security, Vol. 7, No. 1, 2004.\\ \\ 5) D. Ma and G. Tsudik, Forward-Secure Sequential Aggregate Authentication,\\ IEEE Symposium on Research in Security and Privacy (S&P), 2007. Extended version appeared in: \\ A New Approach to Secure Logging, ACM Transactions on Storage, Vol. 5, No. 1, 2009.\\ \\ __Recent Publications (5 selected):__ \\ \\ 6) K. El Defrawy and G. Tsudik, ALARM: Anonymous Location-Aided Routing in Suspicious MANETs, \\ IEEE International Conference on Network Protocols (ICNP), 2007. Extended version appeared in:\\ IEEE Transactions on Mobile Computing, Vol. 10, No. 9, September 2011.\\ \\ 7) A. Francillon, Q. Nguyen, K. Rasmussen and G. Tsudik, A Minimalist Approach to Remote Attestation, \\ IEEE/ACM Design, Automation, and Test in Europe (DATE), 2014.\\ \\ 8) I. Martinovic, K. Rasmussen, M. Roeschlin and G. Tsudik, Authentication Using Pulse-Response Biometrics, \\ ISOC Symposium on Network and Distributed System Security (NDSS), 2014.\\ \\ 9) P. Baldi, R. Baronio, E. De Cristofaro, P. Gasti and G. Tsudik, Countering GATTACA: Efficient and Secure Testing of Fully-Sequenced Human Genomes, ACM Computer and Communication Security Conference (CCS), 2011.\\ \\ 10) E. De Cristofaro, C. Soriente, G. Tsudik and A. Williams, Hummingbird: Privacy at the time of Twitter, \\ IEEE Symposium on Research in Security and Privacy (S&P), 2012. Extended version appeared in: \\ IEEE Data Engineering Bulletin, Special Issue on Cloud Security and Privacy, Vol. 35, No. 4, December 2012.