Search Results - "Tsudik, Gene"
-
1
Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber–physical convergence
Published in Pervasive and mobile computing (01-02-2012)“…The physical environment is becoming more and more saturated with computing and communication entities that interact among themselves, as well as with users:…”
Get full text
Journal Article -
2
SRDP: Secure route discovery for dynamic source routing in MANETs
Published in Ad hoc networks (01-08-2009)“…Routing is a critical function in multi-hop mobile ad hoc networks (MANETs). A number of MANET-oriented routing protocols have been proposed, of which DSR is…”
Get full text
Journal Article -
3
A comparative study of secure device pairing methods
Published in Pervasive and mobile computing (01-12-2009)“…“Secure Device Pairing” or “Secure First Connect” is the process of bootstrapping a secure channel between two previously unassociated devices over some…”
Get full text
Journal Article -
4
The Chills and Thrills of Whole Genome Sequencing
Published in Computer (Long Beach, Calif.) (2013)“…In recent years, whole genome sequencing (WGS) evolved from a futuristic-sounding research project to an increasingly affordable technology for determining…”
Get full text
Journal Article -
5
Extended Abstract: Forward-Secure Sequential Aggregate Authentication
Published in 2007 IEEE Symposium on Security and Privacy (SP '07) (01-05-2007)“…Wireless sensors are employed in a wide range of applications. One common feature of many sensor settings is the need to communicate sensed data to some…”
Get full text
Conference Proceeding -
6
Reducing RFID reader load with the meet-in-the-middle strategy
Published in Journal of communications and networks (01-02-2012)“…When tag privacy is required in radio frequency identification (ID) system, a reader needs to identify, and optionally authenticate, a multitude of tags…”
Get full text
Journal Article -
7
POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks
Published in 2008 Symposium on Reliable Distributed Systems (01-10-2008)“…Unattended Wireless Sensor Networks (UWSNs) are composed of many small resource-constrained devices and operate autonomously, gathering data which is…”
Get full text
Conference Proceeding -
8
Initializing trust in smart devices via presence attestation
Published in Computer communications (01-10-2018)“…Many personal computing and more specialized (e.g., high-end IoT) devices are now equipped with sophisticated processors that only a few years ago were present…”
Get full text
Journal Article -
9
In Content We Trust: Network-Layer Trust in Content-Centric Networking
Published in IEEE/ACM transactions on networking (01-10-2019)“…Content-Centric Networking (CCN), an instance of information-centric networking, is a candidate next-generation Internet architecture that emphasizes on…”
Get full text
Journal Article -
10
MTRA: Multi-Tier randomized remote attestation in IoT networks
Published in Computers & security (01-03-2019)“…Large numbers of Internet of Things (IoT) devices are increasingly deployed in many aspects of modern life. Given their limited resources and computational…”
Get full text
Journal Article -
11
Reducing RFID Reader Load with the Meet-in-the-Middle Strategy
Published in Journal of communications and networks (2012)“…When tag privacy is required in radio frequency identification (ID) system, a reader needs to identify, and optionally authenticate, a multitude of tags…”
Get full text
Journal Article -
12
DoS and DDoS in Named Data Networking
Published in 2013 22nd International Conference on Computer Communication and Networks (ICCCN) (01-07-2013)“…With the growing realization that current Internet protocols are reaching the limits of their senescence, several on-going research efforts aim to design…”
Get full text
Conference Proceeding -
13
ASSURED: Architecture for Secure Software Update of Realistic Embedded Devices
Published in IEEE transactions on computer-aided design of integrated circuits and systems (01-11-2018)“…Secure firmware update is an important stage in the Internet of Things (IoT) device life-cycle. Prior techniques, designed for other computational settings,…”
Get full text
Journal Article -
14
ERASMUS: Efficient remote attestation via self-measurement for unattended settings
Published in 2018 Design, Automation & Test in Europe Conference & Exhibition (DATE) (01-03-2018)“…Remote attestation (RA) is a popular means of detecting malware in embedded and IoT devices. RA is usually realized as a protocol via which a trusted verifier…”
Get full text
Conference Proceeding -
15
Security and Privacy Analysis of National Science Foundation Future Internet Architectures
Published in IEEE Communications surveys and tutorials (01-01-2018)“…The Internet protocol (IP) is the lifeblood of the modern Internet. Its simplicity and universality have fueled the unprecedented and lasting global success of…”
Get full text
Journal Article -
16
KESIC: Kerberos Extensions for Smart, IoT and CPS Devices
Published in 2024 33rd International Conference on Computer Communications and Networks (ICCCN) (29-07-2024)“…Secure and efficient multi-user access mechanisms are increasingly important for the growing number of Internet of Things (IoT) devices being used…”
Get full text
Conference Proceeding -
17
Privacy-Preserving Location-Based On-Demand Routing in MANETs
Published in IEEE journal on selected areas in communications (01-12-2011)“…Mobile Ad-Hoc Networks (MANETs) are particularly useful and well-suited for critical scenarios, including military, law enforcement as well as emergency rescue…”
Get full text
Journal Article -
18
BLUFADER: Blurred face detection & recognition for privacy-friendly continuous authentication
Published in Pervasive and mobile computing (01-05-2023)“…Authentication and de-authentication phases should occur at the beginning and end of secure user sessions, respectively. A secure session requires the user to…”
Get full text
Journal Article -
19
Whole Genome Sequencing: Revolutionary Medicine or Privacy Nightmare?
Published in Computer (Long Beach, Calif.) (01-02-2015)“…Whole genome sequencing will soon become affordable for many individuals, but thorny privacy and ethical issues could jeopardize its popularity and thwart the…”
Get full text
Journal Article -
20
Privacy-Aware Caching in Information-Centric Networking
Published in IEEE transactions on dependable and secure computing (01-03-2019)“…Information-Centric Networking (ICN) is an emerging networking paradigm where named and routable data (content) is the focal point. Users send explicit…”
Get full text
Journal Article