G
Gene Tsudik
Researcher at University of California, Irvine
Publications - 465
Citations - 32121
Gene Tsudik is an academic researcher from University of California, Irvine. The author has contributed to research in topics: Authentication & The Internet. The author has an hindex of 90, co-authored 448 publications receiving 30539 citations. Previous affiliations of Gene Tsudik include University of California & University of Southern California.
Papers
More filters
Journal ArticleDOI
SRDP: Secure route discovery for dynamic source routing in MANETs
Jihye Kim,Gene Tsudik +1 more
TL;DR: A secure route discovery protocol (SRDP) is constructed which allows the source to securely discover an authenticated route to the destination using either aggregated message authentication codes (MACs) or multi-signatures.
Things, Trouble, Trust: On Building Trust in IoT Systems
Tigist Abera,Nadarajah Asokan,Lucas Davi,Farinaz Koushanfar,Andrew Praverd,Gene Tsudik,Ahmad-Reza Sadeghi +6 more
TL;DR: The landscape of state-of-the-art attestation techniques from the IoT device perspective is surveyed and it is argued that most of them have a role to play in IoT trust establishment.
Proceedings ArticleDOI
Collaborative authentication in unattended WSNs
TL;DR: This paper proposes two schemes (CoMAC and ExCo) that leverage sensor co-operation to achieve data authentication and shows that proposed schemes cope well with real WSN issues, such as message loss and sensor failure.
Proceedings ArticleDOI
Groupthink: usability of secure group association for wireless devices
TL;DR: In this article, the authors discuss desirable features and evaluation criteria for secure group association, identifies suitable methods and presents a comparative usability study, showing that simple methods (e.g., peer- or leader-based number comparisons) are quite attractive for small groups, being fast, reasonably secure and well-received by users.
Book ChapterDOI
Privacy-Preserving Policy-Based Information Transfer
TL;DR: This paper constructs three PPIT schemes based, respectively, on: RSA, Schnorr and IBE techniques and investigates various performance improvements and demonstrates the practicality of proposedPPIT schemes.