G
Gene Tsudik
Researcher at University of California, Irvine
Publications - 465
Citations - 32121
Gene Tsudik is an academic researcher from University of California, Irvine. The author has contributed to research in topics: Authentication & The Internet. The author has an hindex of 90, co-authored 448 publications receiving 30539 citations. Previous affiliations of Gene Tsudik include University of California & University of Southern California.
Papers
More filters
Proceedings ArticleDOI
To NACK or Not to NACK? Negative Acknowledgments in Information-Centric Networking
TL;DR: It is demonstrated that providing secure NACKs triggers the threat of producer-bound flooding attacks and is best avoided, at least for security reasons.
Efficient techniques for privacy-preserving sharing of sensitive information
TL;DR: In this paper, the notion of Privacy-Preserving Sharing of Sensitive Information (PPSSI) is explored, and a concrete and efficient instantiation, modeled in the context of simple database querying, is provided.
Posted Content
Efficient Techniques for Privacy-Preserving Sharing of Sensitive Information.
TL;DR: This paper explores the notion of Privacy-Preserving Sharing of Sensitive Information (PPSSI), and provides a concrete and efficient instantiation, modeled in the context of simple database querying, that functions as a privacy shield to protect parties from disclosing more than the required minimum of their respective sensitive information.
Proceedings ArticleDOI
Intrusion-Resilience in Mobile Unattended WSNs
TL;DR: It is argued that sensor mobility motivates a specific type of adversary and defending against it requires new security techniques, and a cooperative protocol is proposed that - by leveraging sensor mobility - allows compromised sensors to recover secure state after compromise.
Proceedings ArticleDOI
Leak-free group signatures with immediate revocation
TL;DR: This work reexamine the entire notion of group signatures from a systems perspective and identifies two new security requirements: leak-freedom and immediate-revocation, which are crucial for a large class of applications.