scispace - formally typeset
G

Gene Tsudik

Researcher at University of California, Irvine

Publications -  465
Citations -  32121

Gene Tsudik is an academic researcher from University of California, Irvine. The author has contributed to research in topics: Authentication & The Internet. The author has an hindex of 90, co-authored 448 publications receiving 30539 citations. Previous affiliations of Gene Tsudik include University of California & University of Southern California.

Papers
More filters
Proceedings ArticleDOI

Scalability and flexibility in authentication services: the KryptoKnight approach

TL;DR: This paper studies the issues of flexibility and scalability in the context of network security by presenting the design criteria, specification, and step-by-step construction of authentication and key distribution services based on experience in the KryptoKnight project.
Posted Content

Don't Skype & Type! Acoustic Eavesdropping in Voice-Over-IP

TL;DR: It is shown that one very popular VoIP software (Skype) conveys enough audio information to reconstruct the victim's input -- keystrokes typed on the remote keyboard, and it is demonstrated that S&T is robust to various VoIP issues, thus confirming feasibility of this attack.
Proceedings ArticleDOI

Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks

TL;DR: This paper designs a scheme that allows users to leverage social contact information to exchange confidential and authentic messages and evaluates the proposed scheme by analyzing real-world social network data, simulating communication scenarios, and through an informal security analysis.
Proceedings ArticleDOI

Interest-Based Access Control for Content Centric Networks

TL;DR: In this paper, the authors proposed an Interest-Based Access Control (IBAC) scheme for access control enforcement using only information contained in interest messages, which makes sensitive content names unpredictable to unauthorized parties.
Book ChapterDOI

Group secret handshakes or affiliation-hiding authenticated group key agreement

TL;DR: In this article, the authors strengthen the prior definition of AH-AGKA so that the security and privacy properties are maintained under any composition of protocol instances, and they also construct two novel protocols secure in this new and stronger model under the RSA and Gap Diffie-Hellman assumptions.