Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Tsudik, Gene
add a person with the name Tsudik, Gene
 

Other publications of authors with the same name

AudES - An Expert System for Security Auditing., and . IAAI, page 221-232. AAAI, (1990)A Method for Fast Revocation of Public Key Certificates and Security Capabilities., , , and . USENIX Security Symposium, USENIX, (2001)E.cient Aggregation of encrypted data in Wireless Sensor Networks., , and . MobiQuitous, page 109-117. IEEE Computer Society, (2005)Exploring Robustness in Group Key Agreement., , , , , and . ICDCS, page 399-408. IEEE Computer Society, (2001)Secure Spread: An Integrated Architecture for Secure Group Communication., , , and . IEEE Trans. Dependable Sec. Comput., 2 (3): 248-261 (2005)Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks., , and . COMPSAC (1), page 271-279. IEEE Computer Society, (2009)Secure Fragmentation for Content-Centric Networks., , , , and . NCA, page 47-56. IEEE Computer Society, (2015)Initializing trust in smart devices via presence attestation., and . Computer Communications, (2018)A comparative study of secure device pairing methods., , , and . Pervasive and Mobile Computing, 5 (6): 734-749 (2009)Intrusion-resilient integrity in data-centric unattended WSNs., , , and . Pervasive and Mobile Computing, 7 (4): 495-508 (2011)