A security architecture for computational grids I Foster, C Kesselman, G Tsudik, S Tuecke Proceedings of the 5th ACM Conference on Computer and Communications …, 1998 | 2098 | 1998 |
Scalable and efficient provable data possession G Ateniese, R Di Pietro, LV Mancini, G Tsudik Proceedings of the 4th international conference on Security and privacy in …, 2008 | 1713 | 2008 |
Named data networking (ndn) project L Zhang, D Estrin, J Burke, V Jacobson, JD Thornton, DK Smetters, ... Relatório Técnico NDN-0001, Xerox Palo Alto Research Center-PARC 157, 158, 2010 | 1306* | 2010 |
A practical and provably secure coalition-resistant group signature scheme G Ateniese, J Camenisch, M Joye, G Tsudik Advances in Cryptology—CRYPTO 2000: 20th Annual International Cryptology …, 2000 | 1290 | 2000 |
Named data networking (ndn) project L Zhang, D Estrin, J Burke, V Jacobson, JD Thornton, DK Smetters, ... Relatório Técnico NDN-0001, Xerox Palo Alto Research Center-PARC 157, 158, 2010 | 1200 | 2010 |
Diffie-Hellman key distribution extended to group communication M Steiner, G Tsudik, M Waidner Proceedings of the 3rd ACM Conference on Computer and Communications …, 1996 | 1175 | 1996 |
Key agreement in dynamic peer groups M Steiner, G Tsudik, M Waidner IEEE Transactions on Parallel and Distributed Systems 11 (8), 769-780, 2000 | 856 | 2000 |
Readings in agents MN Huhns, MP Singh Morgan Kaufmann, 1998 | 851 | 1998 |
Efficient aggregation of encrypted data in wireless sensor networks C Castelluccia, E Mykletun, G Tsudik Mobile and Ubiquitous Systems: Networking and Services, 2005. MobiQuitous …, 2005 | 773 | 2005 |
Itinerant agents for mobile computing D Chess, B Grosof, C Harrison, D Levine, C Parris, G Tsudik IEEE Personal Communications 2 (5), 34-49, 1995 | 764 | 1995 |
Simple and fault-tolerant key agreement for dynamic collaborative groups Y Kim, A Perrig, G Tsudik Proceedings of the 7th ACM Conference on Computer and Communications …, 2000 | 760 | 2000 |
Tree-based group key agreement Y Kim, A Perrig, G Tsudik ACM Transactions on Information and System Security (TISSEC) 7 (1), 60-96, 2004 | 745 | 2004 |
A privacy-preserving index for range queries B Hore, S Mehrotra, G Tsudik Proceedings of the Thirtieth international conference on Very large data …, 2004 | 630 | 2004 |
Authentication and Integrity in Outsourced Databases E MYKLETUN, M NARASIMHA, G TSUDIK Symposium on Network and Distributed Systems Security (NDSS), 2004 | 603 | 2004 |
DoS and DDoS in Named-Data Networking P Gasti, G Tsudik, E Uzun, L Zhang Proceedings of 2013 IEEE International Conference on Computer Communications …, 2013 | 590 | 2013 |
CLIQUES: A new approach to group key agreement M Steiner, G Tsudik, M Waidner Proceedings. 18th International Conference on Distributed Computing Systems …, 1998 | 556 | 1998 |
Message authentication with one-way hash functions G Tsudik ACM SIGCOMM Computer Communication Review 22 (5), 29-38, 1992 | 545 | 1992 |
Message authentication with one-way hash functions G Tsudik IEEE INFOCOM '92: The Conference on Computer Communications, 1992 | 545 | 1992 |
Personal key archive MH Linehan, NJ Simicich, GY Tsudik US Patent 5,495,533, 1996 | 532 | 1996 |
Towards an analysis of onion routing security P Syverson, G Tsudik, M Reed, C Landwehr Designing Privacy Enhancing Technologies: International Workshop on Design …, 2001 | 524 | 2001 |