Search Results - "Tsudik, Gene"

Refine Results
  1. 1

    Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber–physical convergence by Conti, Marco, Das, Sajal K., Bisdikian, Chatschik, Kumar, Mohan, Ni, Lionel M., Passarella, Andrea, Roussos, George, Tröster, Gerhard, Tsudik, Gene, Zambonelli, Franco

    Published in Pervasive and mobile computing (01-02-2012)
    “…The physical environment is becoming more and more saturated with computing and communication entities that interact among themselves, as well as with users:…”
    Get full text
    Journal Article
  2. 2

    SRDP: Secure route discovery for dynamic source routing in MANETs by Kim, Jihye, Tsudik, Gene

    Published in Ad hoc networks (01-08-2009)
    “…Routing is a critical function in multi-hop mobile ad hoc networks (MANETs). A number of MANET-oriented routing protocols have been proposed, of which DSR is…”
    Get full text
    Journal Article
  3. 3

    A comparative study of secure device pairing methods by Kumar, Arun, Saxena, Nitesh, Tsudik, Gene, Uzun, Ersin

    Published in Pervasive and mobile computing (01-12-2009)
    “…“Secure Device Pairing” or “Secure First Connect” is the process of bootstrapping a secure channel between two previously unassociated devices over some…”
    Get full text
    Journal Article
  4. 4

    The Chills and Thrills of Whole Genome Sequencing by Ayday, Erman, De Cristofaro, Emiliano, Hubaux, Jean-Pierre, Tsudik, Gene

    Published in Computer (Long Beach, Calif.) (2013)
    “…In recent years, whole genome sequencing (WGS) evolved from a futuristic-sounding research project to an increasingly affordable technology for determining…”
    Get full text
    Journal Article
  5. 5

    Extended Abstract: Forward-Secure Sequential Aggregate Authentication by Di Ma, Tsudik, G.

    “…Wireless sensors are employed in a wide range of applications. One common feature of many sensor settings is the need to communicate sensed data to some…”
    Get full text
    Conference Proceeding
  6. 6

    Reducing RFID reader load with the meet-in-the-middle strategy by Jung Hee Cheon, Jeongdae Hong, Tsudik, Gene

    Published in Journal of communications and networks (01-02-2012)
    “…When tag privacy is required in radio frequency identification (ID) system, a reader needs to identify, and optionally authenticate, a multitude of tags…”
    Get full text
    Journal Article
  7. 7

    POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks by Di Pietro, R., Di Ma, Soriente, C., Tsudik, G.

    “…Unattended Wireless Sensor Networks (UWSNs) are composed of many small resource-constrained devices and operate autonomously, gathering data which is…”
    Get full text
    Conference Proceeding
  8. 8

    Initializing trust in smart devices via presence attestation by Ding, Xuhua, Tsudik, Gene

    Published in Computer communications (01-10-2018)
    “…Many personal computing and more specialized (e.g., high-end IoT) devices are now equipped with sophisticated processors that only a few years ago were present…”
    Get full text
    Journal Article
  9. 9

    In Content We Trust: Network-Layer Trust in Content-Centric Networking by Ghali, Cesar, Tsudik, Gene, Uzun, Ersin

    Published in IEEE/ACM transactions on networking (01-10-2019)
    “…Content-Centric Networking (CCN), an instance of information-centric networking, is a candidate next-generation Internet architecture that emphasizes on…”
    Get full text
    Journal Article
  10. 10

    MTRA: Multi-Tier randomized remote attestation in IoT networks by Tan, Hailun, Tsudik, Gene, Jha, Sanjay

    Published in Computers & security (01-03-2019)
    “…Large numbers of Internet of Things (IoT) devices are increasingly deployed in many aspects of modern life. Given their limited resources and computational…”
    Get full text
    Journal Article
  11. 11

    Reducing RFID Reader Load with the Meet-in-the-Middle Strategy by Cheon, Jung-Hee, Hong, Jeong-Dae, Tsudik, Gene

    “…When tag privacy is required in radio frequency identification (ID) system, a reader needs to identify, and optionally authenticate, a multitude of tags…”
    Get full text
    Journal Article
  12. 12

    DoS and DDoS in Named Data Networking by Gasti, Paolo, Tsudik, Gene, Uzun, Ersin, Lixia Zhang

    “…With the growing realization that current Internet protocols are reaching the limits of their senescence, several on-going research efforts aim to design…”
    Get full text
    Conference Proceeding
  13. 13

    ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices by Asokan, N., Nyman, Thomas, Rattanavipanon, Norrathep, Sadeghi, Ahmad-Reza, Tsudik, Gene

    “…Secure firmware update is an important stage in the Internet of Things (IoT) device life-cycle. Prior techniques, designed for other computational settings,…”
    Get full text
    Journal Article
  14. 14

    ERASMUS: Efficient remote attestation via self-measurement for unattended settings by Carpent, Xavier, Tsudik, Gene, Rattanavipanon, Norrathep

    “…Remote attestation (RA) is a popular means of detecting malware in embedded and IoT devices. RA is usually realized as a protocol via which a trusted verifier…”
    Get full text
    Conference Proceeding
  15. 15

    Security and Privacy Analysis of National Science Foundation Future Internet Architectures by Ambrosin, Moreno, Compagno, Alberto, Conti, Mauro, Ghali, Cesar, Tsudik, Gene

    Published in IEEE Communications surveys and tutorials (01-01-2018)
    “…The Internet protocol (IP) is the lifeblood of the modern Internet. Its simplicity and universality have fueled the unprecedented and lasting global success of…”
    Get full text
    Journal Article
  16. 16

    KESIC: Kerberos Extensions for Smart, IoT and CPS Devices by Prapty, Renascence Tarafder, Jakkamsetti, Sashidhar, Tsudik, Gene

    “…Secure and efficient multi-user access mechanisms are increasingly important for the growing number of Internet of Things (IoT) devices being used…”
    Get full text
    Conference Proceeding
  17. 17

    Privacy-Preserving Location-Based On-Demand Routing in MANETs by El Defrawy, K., Tsudik, G.

    “…Mobile Ad-Hoc Networks (MANETs) are particularly useful and well-suited for critical scenarios, including military, law enforcement as well as emergency rescue…”
    Get full text
    Journal Article
  18. 18

    BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication by Cardaioli, Matteo, Conti, Mauro, Orazi, Gabriele, Tricomi, Pier Paolo, Tsudik, Gene

    Published in Pervasive and mobile computing (01-05-2023)
    “…Authentication and de-authentication phases should occur at the beginning and end of secure user sessions, respectively. A secure session requires the user to…”
    Get full text
    Journal Article
  19. 19

    Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare? by Ayday, Erman, De Cristofaro, Emiliano, Hubaux, Jean-Pierre, Tsudik, Gene

    Published in Computer (Long Beach, Calif.) (01-02-2015)
    “…Whole genome sequencing will soon become affordable for many individuals, but thorny privacy and ethical issues could jeopardize its popularity and thwart the…”
    Get full text
    Journal Article
  20. 20

    Privacy-Aware Caching in Information-Centric Networking by Acs, Gergely, Conti, Mauro, Gasti, Paolo, Ghali, Cesar, Tsudik, Gene, Wood, Christopher A.

    “…Information-Centric Networking (ICN) is an emerging networking paradigm where named and routable data (content) is the focal point. Users send explicit…”
    Get full text
    Journal Article