G
Gene Tsudik
Researcher at University of California, Irvine
Publications - 465
Citations - 32121
Gene Tsudik is an academic researcher from University of California, Irvine. The author has contributed to research in topics: Authentication & The Internet. The author has an hindex of 90, co-authored 448 publications receiving 30539 citations. Previous affiliations of Gene Tsudik include University of California & University of Southern California.
Papers
More filters
Book ChapterDOI
Signature Bouquets: Immutability for Aggregated/Condensed Signatures
TL;DR: In this article, the authors discuss the security and privacy of outsourced data in database outsourcing, which involves organizations delegating their data management needs to an external service provider, since a service provider is almost never fully trusted.
Journal ArticleDOI
IP multicast security: Issues and directions
Thomas Hardjono,Gene Tsudik +1 more
TL;DR: The present work identifies and discusses various concepts and issues underlying multicast security, covering some core problems, infrastructure problems, and certain complex applications that might be built atop secure ip multicast.
Proceedings Article
ANDaNA: Anonymous Named Data Networking Application
TL;DR: An NDN add-on tool is designed, called ANDaNA, that borrows a number of features from Tor and provides comparable anonymity with lower relative overhead and presents an initial attempt to achieve communication privacy.
Book ChapterDOI
Exploring Linkability of User Reviews
Mishari Almishari,Gene Tsudik +1 more
TL;DR: This study studies linkability of community-based reviewing and suggests that contributors reliably expose their identities in reviews, which has important implications for cross-referencing accounts between different review sites.
Posted Content
Signature Bouquets: Immutability for Aggregated/Condensed Signatures.
TL;DR: In this article, the authors discuss the security and privacy of outsourced data in database outsourcing, which involves organizations delegating their data management needs to an external service provider, since a service provider is almost never fully trusted.