2009 | ||
---|---|---|
133 | Stanislaw Jarecki, Gene Tsudik: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings Springer 2009 | |
132 | Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin: Logging key assurance indicators in business processes. ASIACCS 2009: 364-367 | |
131 | Karim M. El Defrawy, John Solis, Gene Tsudik: Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks. COMPSAC (1) 2009: 271-279 | |
130 | Arun Kumar, Nitesh Saxena, Gene Tsudik, Ersin Uzun: Caveat Emptor: A Comparative Study of Secure Device Pairing Methods. PerCom 2009: 1-10 | |
129 | Emiliano De Cristofaro, Stanislaw Jarecki, Jihye Kim, Gene Tsudik: Privacy-Preserving Policy-Based Information Transfer. Privacy Enhancing Technologies 2009: 164-184 | |
128 | Alfred Kobsa, Rahim Sonawalla, Gene Tsudik, Ersin Uzun, Yang Wang: Serial hook-ups: a comparative usability study of secure device pairing methods. SOUPS 2009 | |
127 | Roberto Di Pietro, Claudio Soriente, Angelo Spognardi, Gene Tsudik: Collaborative authentication in unattended WSNs. WISEC 2009: 237-244 | |
126 | Mike Burmester, Tri Van Le, Breno de Medeiros, Gene Tsudik: Universally Composable RFID Identification and Authentication Protocols. ACM Trans. Inf. Syst. Secur. 12(4): (2009) | |
125 | Jihye Kim, Gene Tsudik: SRDP: Secure route discovery for dynamic source routing in MANETs. Ad Hoc Networks 7(6): 1097-1109 (2009) | |
124 | Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik: Playing hide-and-seek with a focused mobile adversary in unattended wireless sensor networks. Ad Hoc Networks 7(8): 1463-1475 (2009) | |
123 | Emiliano De Cristofaro, Xuhua Ding, Gene Tsudik: Privacy-Preserving Querying in Sensor Networks CoRR abs/0905.2158: (2009) | |
122 | Mishari Al Mishari, Emiliano De Cristofaro, Karim M. El Defrawy, Gene Tsudik: Harvesting SSL Certificate Data to Mitigate Web-Fraud CoRR abs/0909.3688: (2009) | |
121 | Yanbin Lu, Gene Tsudik: Towards Plugging Privacy Leaks in Domain Name System CoRR abs/0910.2472: (2009) | |
120 | Di Ma, Claudio Soriente, Gene Tsudik: New adversary and new threats: security in unattended sensor networks. IEEE Network 23(2): 43-48 (2009) | |
119 | Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik: Data Security in Unattended Wireless Sensor Networks. IEEE Trans. Computers 58(11): 1500-1511 (2009) | |
118 | Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi: Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs. IEEE Trans. Parallel Distrib. Syst. 20(2): 158-170 (2009) | |
117 | Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik: Remarks on ''Analysis of one popular group signature scheme'' in Asiacrypt 2006. IJACT 1(4): 320-322 (2009) | |
116 | Claudio Soriente, Gene Tsudik, Ersin Uzun: Secure pairing of interface constrained devices. IJSN 4(1/2): 17-26 (2009) | |
115 | Michael T. Goodrich, Michael Sirivianos, John Solis, Claudio Soriente, Gene Tsudik, Ersin Uzun: Using audio in secure device pairing. IJSN 4(1/2): 57-68 (2009) | |
114 | Maithili Narasimha, John Solis, Gene Tsudik: Privacy-preserving revocation checking. Int. J. Inf. Sec. 8(1): 61-75 (2009) | |
113 | Xuhua Ding, Gene Tsudik, Shouhuai Xu: Leak-free mediated group signatures. Journal of Computer Security 17(4): 489-514 (2009) | |
112 | Arun Kumar, Nitesh Saxena, Gene Tsudik, Ersin Uzun: A comparative study of secure device pairing methods. Pervasive and Mobile Computing 5(6): 734-749 (2009) | |
111 | Di Ma, Gene Tsudik: A new approach to secure logging. TOS 5(1): (2009) | |
110 | Claude Castelluccia, Aldar C.-F. Chan, Einar Mykletun, Gene Tsudik: Efficient and provably secure aggregation of encrypted data in wireless sensor networks. TOSN 5(3): (2009) | |
2008 | ||
109 | Gene Tsudik: Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers Springer 2008 | |
108 | Gene Tsudik: Confronting a mobile adversary in unattended sensor networks. ASIACCS 2008: 1 | |
107 | Stanislaw Jarecki, Jihye Kim, Gene Tsudik: Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange. CT-RSA 2008: 352-369 | |
106 | Di Ma, Gene Tsudik: A New Approach to Secure Logging. DBSec 2008: 48-63 | |
105 | Jihye Kim, Gene Tsudik: Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks. ICISC 2008: 66-83 | |
104 | Claudio Soriente, Gene Tsudik, Ersin Uzun: HAPADEP: Human-Assisted Pure Audio Device Pairing. ISC 2008: 385-400 | |
103 | Roberto Di Pietro, Luigi V. Mancini, Claudio Soriente, Angelo Spognardi, Gene Tsudik: Catch Me (If You Can): Data Survival in Unattended Sensor Networks. PerCom 2008: 185-194 | |
102 | Roberto Di Pietro, Di Ma, Claudio Soriente, Gene Tsudik: POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks. SRDS 2008: 185-194 | |
101 | Di Ma, Gene Tsudik: DISH: Distributed Self-Healing. SSS 2008: 47-62 | |
100 | Gene Tsudik, Mike Burmester, Ari Juels, Alfred Kobsa, David Molnar, Roberto Di Pietro, Melanie R. Rieback: RFID security and privacy: long-term research or short-term tinkering? WISEC 2008: 160 | |
99 | Gene Tsudik: Editorial. ACM Trans. Inf. Syst. Secur. 11(3): (2008) | |
2007 | ||
98 | Stanislaw Jarecki, Jihye Kim, Gene Tsudik: Robust group key agreement using short broadcasts. ACM Conference on Computer and Communications Security 2007: 411-420 | |
97 | Stanislaw Jarecki, Jihye Kim, Gene Tsudik: Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement. CT-RSA 2007: 287-308 | |
96 | Maithili Narasimha, Gene Tsudik: Privacy-Preserving Revocation Checking with Modified CRLs. EuroPKI 2007: 18-33 | |
95 | Karim M. El Defrawy, Gene Tsudik: ALARM: Anonymous Location-Aided Routing in Suspicious MANETs. ICNP 2007: 304-313 | |
94 | Di Ma, Gene Tsudik: Extended Abstract: Forward-Secure Sequential Aggregate Authentication. IEEE Symposium on Security and Privacy 2007: 86-91 | |
93 | Gene Tsudik: A Family of Dunces: Trivial RFID Identification and Authentication Protocols. Privacy Enhancing Technologies 2007: 45-61 | |
92 | Xuhua Ding, Daniele Mazzocchi, Gene Tsudik: Equipping smart devices with public key signatures. ACM Trans. Internet Techn. 7(1): (2007) | |
91 | Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi: Threshold cryptography in P2P and MANETs: The case of access control. Computer Networks 51(12): 3632-3649 (2007) | |
90 | Kumar Viswanath, Katia Obraczka, Gene Tsudik: Correction to "Exploring Mesh and Tree-Based Multicast Routing Protocols for MANETs". IEEE Trans. Mob. Comput. 6(2): 237 (2007) | |
2006 | ||
89 | Ari Juels, Gene Tsudik, Shouhuai Xu, Moti Yung: Proceedings of the 1st ACM Workshop on Scalable Trusted Computing, STC 2006, Alexandria, VA, USA, November 3, 2006 ACM 2006 | |
88 | Stanislaw Jarecki, Jihye Kim, Gene Tsudik: Authentication for Paranoids: Multi-party Secret Handshakes. ACNS 2006: 325-339 | |
87 | Claude Castelluccia, Einar Mykletun, Gene Tsudik: Improving secure server performance by re-balancing SSL/TLS handshakes. ASIACCS 2006: 26-34 | |
86 | Maithili Narasimha, Gene Tsudik: Authentication of Outsourced Databases Using Signature Aggregation and Chaining. DASFAA 2006: 420-436 | |
85 | Einar Mykletun, Gene Tsudik: Aggregation Queries in the Database-As-a-Service Model. DBSec 2006: 89-103 | |
84 | Samad Nasserian, Gene Tsudik: Revisiting Oblivious Signature-Based Envelopes. Financial Cryptography 2006: 221-235 | |
83 | Michael T. Goodrich, Michael Sirivianos, John Solis, Gene Tsudik, Ersin Uzun: Loud and Clear: Human-Verifiable Authentication Based on Audio. ICDCS 2006: 10 | |
82 | Gene Tsudik: YA-TRAP: Yet Another Trivial RFID Authentication Protocol. PerCom Workshops 2006: 640-643 | |
81 | Gene Tsudik, Shouhuai Xu: A Flexible Framework for Secret Handshakes. Privacy Enhancing Technologies 2006: 295-315 | |
80 | John Solis, Gene Tsudik: Simple and Flexible Revocation Checking with Privacy. Privacy Enhancing Technologies 2006: 351-367 | |
79 | Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik: Secure acknowledgment aggregation and multisignatures with limited robustness. Computer Networks 50(10): 1639-1652 (2006) | |
78 | Kumar Viswanath, Katia Obraczka, Gene Tsudik: Exploring Mesh and Tree-Based Multicast Routing Protocols for MANETs. IEEE Trans. Mob. Comput. 5(1): 28-42 (2006) | |
77 | Einar Mykletun, Maithili Narasimha, Gene Tsudik: Authentication and integrity in outsourced databases. TOS 2(2): 107-138 (2006) | |
2005 | ||
76 | Refik Molva, Gene Tsudik, Dirk Westhoff: Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, ESAS 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers Springer 2005 | |
75 | Maithili Narasimha, Gene Tsudik: DSAC: integrity for outsourced databases with signature aggregation and chaining. CIKM 2005: 235-236 | |
74 | Giuseppe Ateniese, Daniel H. Chou, Breno de Medeiros, Gene Tsudik: Sanitizable Signatures. ESORICS 2005: 159-177 | |
73 | Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi: Efficient Node Admission for Short-lived Mobile Ad Hoc Networks. ICNP 2005: 269-278 | |
72 | Claude Castelluccia, Einar Mykletun, Gene Tsudik: E.cient Aggregation of encrypted data in Wireless Sensor Networks. MobiQuitous 2005: 109-117 | |
71 | Jihye Kim, Gene Tsudik: SRDP: Securing Route Discovery in DSR. MobiQuitous 2005: 247-260 | |
70 | Gene Tsudik, Shouhuai Xu: Brief announcement: a flexible framework for secret handshakes. PODC 2005: 39 | |
69 | Yair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton, Gene Tsudik: Secure Spread: An Integrated Architecture for Secure Group Communication. IEEE Trans. Dependable Sec. Comput. 2(3): 248-261 (2005) | |
68 | Kyung Hyune Rhee, Young-Ho Park, Gene Tsudik: A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks. J. Inf. Sci. Eng. 21(2): 415-428 (2005) | |
2004 | ||
67 | Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik: Secret Handshakes from CA-Oblivious Encryption. ASIACRYPT 2004: 293-307 | |
66 | Balakrishna R. Iyer, Sharad Mehrotra, Einar Mykletun, Gene Tsudik, Yonghua Wu: A Framework for Efficient Storage Security in RDBMS. EDBT 2004: 147-164 | |
65 | Einar Mykletun, Maithili Narasimha, Gene Tsudik: Signature Bouquets: Immutability for Aggregated/Condensed Signatures. ESORICS 2004: 160-176 | |
64 | Xuhua Ding, Gene Tsudik, Shouhuai Xu: Leak-Free Group Signatures with Immediate Revocation. ICDCS 2004: 608-615 | |
63 | Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi: Identity-Based Access Control for Ad Hoc Groups. ICISC 2004: 362-379 | |
62 | Einar Mykletun, Maithili Narasimha, Gene Tsudik: Authentication and Integrity in Outsourced Databases. NDSS 2004 | |
61 | Claude Castelluccia, Stanislaw Jarecki, Gene Tsudik: Brief announcement: secret handshakes from CA-oblivious encryption. PODC 2004: 394 | |
60 | Claude Castelluccia, Stanislaw Jarecki, Jihye Kim, Gene Tsudik: A Robust Multisignatures Scheme with Applications to Acknowledgment Aggregation. SCN 2004: 193-207 | |
59 | Bijit Hore, Sharad Mehrotra, Gene Tsudik: A Privacy-Preserving Index for Range Queries. VLDB 2004: 720-731 | |
58 | Yongdae Kim, Adrian Perrig, Gene Tsudik: Tree-based group key agreement. ACM Trans. Inf. Syst. Secur. 7(1): 60-96 (2004) | |
57 | Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene Tsudik: On the performance of group key agreement protocols. ACM Trans. Inf. Syst. Secur. 7(3): 457-488 (2004) | |
56 | Dan Boneh, Xuhua Ding, Gene Tsudik: Fine-grained control of security capabilities. ACM Trans. Internet Techn. 4(1): 60-82 (2004) | |
55 | Yongdae Kim, Adrian Perrig, Gene Tsudik: Group Key Agreement Efficient in Communication. IEEE Trans. Computers 53(7): 905-921 (2004) | |
54 | Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Gene Tsudik: Secure Group Communication Using Robust Contributory Key Agreement. IEEE Trans. Parallel Distrib. Syst. 15(5): 468-480 (2004) | |
2003 | ||
53 | Gene Tsudik, Shouhuai Xu: Accumulating Composites and Improved Group Signing. ASIACRYPT 2003: 269-286 | |
52 | Xuhua Ding, Gene Tsudik: Simple Identity-Based Cryptography with Mediated RSA. CT-RSA 2003: 193-210 | |
51 | Yair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton, Gene Tsudik: Scaling Secure Group Communication Systems: Beyond Peer-to-Peer. DISCEX (1) 2003: 226-237 | |
50 | Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi: On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control. ICNP 2003: 336- | |
49 | Yongdae Kim, Daniele Mazzocchi, Gene Tsudik: Admission Control in Peer Groups. NCA 2003: 131-139 | |
48 | Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi: Admission control in Peer-to-Peer: design and performance evaluation. SASN 2003: 104-113 | |
47 | Kemal Bicakci, Gene Tsudik, Brian Tung: How to construct optimal one-time signatures. Computer Networks 43(3): 339-349 (2003) | |
2002 | ||
46 | Giuseppe Ateniese, Dawn Xiaodong Song, Gene Tsudik: Quasi-Efficient Revocation in Group Signatures. Financial Cryptography 2002: 183-197 | |
45 | Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene Tsudik: On the Performance of Group Key Agreement Protocols. ICDCS 2002: 463-464 | |
44 | Yongdae Kim, Maithili Narasimha, Fabio Maino, Gene Tsudik: Secure Group Services for Storage Area Networks. IEEE Security in Storage Workshop 2002: 80-93 | |
43 | Xuhua Ding, Daniele Mazzocchi, Gene Tsudik: Experimenting with Server-Aided Signatures. NDSS 2002 | |
42 | Gene Tsudik: Weak Forward Security in Mediated RSA. SCN 2002: 45-54 | |
2001 | ||
41 | Yair Amir, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Yongdae Kim, Gene Tsudik: Exploring Robustness in Group Key Agreement. ICDCS 2001: 399-408 | |
40 | Katia Obraczka, Gene Tsudik, Kumar Viswanath: Pushing the Limits of Multicast in Ad Hoc Networks. ICDCS 2001: 719-722 | |
39 | Deborah A. Agarwal, Olivier Chevassut, Mary R. Thompson, Gene Tsudik: An Integrated Solution for Secure Group Communication in Wide-Area Networks. ISCC 2001: 22-28 | |
38 | Yongdae Kim, Adrian Perrig, Gene Tsudik: Communication-Efficient Group Key Agreement. SEC 2001: 229-244 | |
37 | Katia Obraczka, Kumar Viswanath, Gene Tsudik: Flooding for Reliable Multicast in Multi-Hop Ad Hoc Networks. Wireless Networks 7(6): 627-634 (2001) | |
2000 | ||
36 | Yongdae Kim, Adrian Perrig, Gene Tsudik: Simple and fault-tolerant key agreement for dynamic collaborative groups. ACM Conference on Computer and Communications Security 2000: 235-244 | |
35 | Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik: A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. CRYPTO 2000: 255-270 | |
34 | Jonathan Robert Stanton, Yair Amir, Damian Hasse, Giuseppe Ateniese, Yongdae Kim, Cristina Nita-Rotaru, Theo Schlossnagle, John L. Schultz, Gene Tsudik: Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments. ICDCS 2000: 330-343 | |
33 | Paul F. Syverson, Gene Tsudik, Michael G. Reed, Carl E. Landwehr: Towards an Analysis of Onion Routing Security. Workshop on Design Issues in Anonymity and Unobservability 2000: 96-114 | |
32 | Michael Steiner, Gene Tsudik, Michael Waidner: Key Agreement in Dynamic Peer Groups. IEEE Trans. Parallel Distrib. Syst. 11(8): 769-780 (2000) | |
1999 | ||
31 | Christopher Ho, Katia Obraczka, Gene Tsudik, Kumar Viswanath: Flooding for reliable multicast in multi-hop ad hoc networks. DIAL-M 1999: 64-71 | |
30 | Giuseppe Ateniese, Gene Tsudik: Some Open Issues and New Directions in Group Signatures. Financial Cryptography 1999: 196-211 | |
29 | Giuseppe Ateniese, Gene Tsudik: Group Signatures Á la carte. SODA 1999: 848-849 | |
28 | Giuseppe Ateniese, Amir Herzberg, Hugo Krawczyk, Gene Tsudik: Untraceable mobility or how to travel incognito. Computer Networks 31(8): 871-884 (1999) | |
27 | Ralf C. Hauser, Tony Przygienda, Gene Tsudik: Lowering security overhead in link state routing. Computer Networks 31(8): 885-894 (1999) | |
1998 | ||
26 | Giuseppe Ateniese, Michael Steiner, Gene Tsudik: Authenticated Group Key Agreement and Friends. ACM Conference on Computer and Communications Security 1998: 17-26 | |
25 | Ian T. Foster, Carl Kesselman, Gene Tsudik, Steven Tuecke: A Security Architecture for Computational Grids. ACM Conference on Computer and Communications Security 1998: 83-92 | |
24 | Matthew K. Franklin, Gene Tsudik: Secure Group Barter: Multi-party Fair Exchange with Semi-Trusted Neutral Parties. Financial Cryptography 1998: 90-102 | |
23 | Michael Steiner, Gene Tsudik, Michael Waidner: CLIQUES: A New Approach to Group Key Agreement. ICDCS 1998: 380-387 | |
22 | Refik Molva, Gene Tsudik: Secret Sets and Applications. Inf. Process. Lett. 65(1): 47-55 (1998) | |
1997 | ||
21 | Philippe A. Janson, Gene Tsudik, Moti Yung: Scalability and Flexibility in Authentication Services: The KryptoKnight Approach. INFOCOM 1997: 725-736 | |
20 | Ralf C. Hauser, Tony Przygienda, Gene Tsudik: Reducing the Cost of Security in Link-State Routing. NDSS 1997 | |
19 | N. Asokan, Gene Tsudik, Michael Waidner: Server-Supported Signatures. Journal of Computer Security 5(1): 91-108 (1997) | |
18 | James P. Gray, Ajay D. Kshemkalyani, Stephen M. Matyas, Mohammad Peyravian, Gene Tsudik: ATM cell encryption and key update synchronization. Telecommunication Systems 7(4): 391-408 (1997) | |
1996 | ||
17 | Michael Steiner, Gene Tsudik, Michael Waidner: Diffie-Hellman Key Distribution Extended to Group Communication. ACM Conference on Computer and Communications Security 1996: 31-37 | |
16 | N. Asokan, Gene Tsudik, Michael Waidner: Server-Supported Signatures. ESORICS 1996: 131-143 | |
15 | Stefano Zatti, Refik Molva, Angelo Tosi, Gene Tsudik, Helmut Kurth: Limitations of the Approach of Solving a Network's Security Problem with a Firewall. ESORICS 1996: 144-145 | |
14 | Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen: Robust and Secure Password and Key Change Method. Journal of Computer Security 4(1): 97-112 (1996) | |
1995 | ||
13 | Philippe A. Janson, Gene Tsudik: Secure and minimal protocols for authenticated key distribution. Computer Communications 18(9): 645-653 (1995) | |
12 | Michael Steiner, Gene Tsudik, Michael Waidner: Refinement and Extension of Encrypted Key Exchange. Operating Systems Review 29(3): 22-30 (1995) | |
1994 | ||
11 | Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen: Robust and Secure Password and Key Change Method. ESORICS 1994: 107-122 | |
1993 | ||
10 | Gene Tsudik, Els Van Herreweghen: On Simple and Secure Key Distribution. ACM Conference on Computer and Communications Security 1993: 49-57 | |
9 | Gene Tsudik, Els Van Herreweghen: Some Remarks on Protecting Weak Keys and Poorly-Chosen Secrets from Guessing Attacks. SRDS 1993: 136-142 | |
8 | Deborah Estrin, Martha Steenstrup, Gene Tsudik: A protocol for route establishment and packet forwarding across multidomain internets. IEEE/ACM Trans. Netw. 1(1): 56-70 (1993) | |
1992 | ||
7 | Refik Molva, Gene Tsudik, Els Van Herreweghen, Stefano Zatti: KryptoKnight Authentication and Key Distribution System. ESORICS 1992: 155-174 | |
6 | Gene Tsudik: Policy Enforcement in Stub Autonomous Domains. ESORICS 1992: 229-257 | |
5 | Gene Tsudik: Message Authentication with One-Way Hash Functions. INFOCOM 1992: 2055-2059 | |
1991 | ||
4 | Deborah Estrin, Gene Tsudik: Secure Control of Transit Internetwork Traffic. Computer Networks and ISDN Systems 22(5): 363-382 (1991) | |
1990 | ||
3 | Gene Tsudik, Rita C. Summers: AudES - An Expert System for Security Auditing. IAAI 1990: 221-232 | |
1989 | ||
2 | Deborah Estrin, Gene Tsudik: Security Issues in Policy Routing. IEEE Symposium on Security and Privacy 1989: 183-193 | |
1987 | ||
1 | Deborah Estrin, Gene Tsudik: Visa Scheme for Inter-Organization Network Security. IEEE Symposium on Security and Privacy 1987: 174-183 |