scispace - formally typeset
G

Gene Tsudik

Researcher at University of California, Irvine

Publications -  465
Citations -  32121

Gene Tsudik is an academic researcher from University of California, Irvine. The author has contributed to research in topics: Authentication & The Internet. The author has an hindex of 90, co-authored 448 publications receiving 30539 citations. Previous affiliations of Gene Tsudik include University of California & University of Southern California.

Papers
More filters
Proceedings ArticleDOI

To NACK or Not to NACK? Negative Acknowledgments in Information-Centric Networking

TL;DR: It is demonstrated that providing secure NACKs triggers the threat of producer-bound flooding attacks and is best avoided, at least for security reasons.

Efficient techniques for privacy-preserving sharing of sensitive information

TL;DR: In this paper, the notion of Privacy-Preserving Sharing of Sensitive Information (PPSSI) is explored, and a concrete and efficient instantiation, modeled in the context of simple database querying, is provided.
Posted Content

Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information.

TL;DR: This paper explores the notion of Privacy-Preserving Sharing of Sensitive Information (PPSSI), and provides a concrete and efficient instantiation, modeled in the context of simple database querying, that functions as a privacy shield to protect parties from disclosing more than the required minimum of their respective sensitive information.
Proceedings ArticleDOI

Intrusion-Resilience in Mobile Unattended WSNs

TL;DR: It is argued that sensor mobility motivates a specific type of adversary and defending against it requires new security techniques, and a cooperative protocol is proposed that - by leveraging sensor mobility - allows compromised sensors to recover secure state after compromise.
Proceedings ArticleDOI

Leak-free group signatures with immediate revocation

TL;DR: This work reexamine the entire notion of group signatures from a systems perspective and identifies two new security requirements: leak-freedom and immediate-revocation, which are crucial for a large class of applications.