All Media Types
Skype & Type: keyboard eavesdropping in voice-over-IP
Cecconello S., Compagno A., Conti M., Lain D., Tsudik G. ACM Transactions on Privacy and Security 22(4): 1-34, 2019. Type: Article
In our current environment, many people work remotely from their office and routinely use voice over Internet protocol (VoIP) tools for communicating with colleagues. During these voice calls, it is also quite common for participants to continue t...
Aug 24 2021
Collaborative authentication in unattended WSNs
Di Pietro R., Soriente C., Spognardi A., Tsudik G. WiSec 2009 (Proceedings of the 2nd ACM Conference on Wireless Network Security, Zurich, Switzerland, Mar 16-19, 2009) 237-244, 2009. Type: Proceedings
The concept of an unattended wireless sensor network (UWSN) is based on a mobile sink visiting a network to collect sensed data. This data is stored locally on the UWSN’s nodes until the next sink visit. A problem with UWSNs is the inability...
May 19 2009
Equipping smart devices with public key signatures
Ding X., Mazzocchi D., Tsudik G. ACM Transactions on Internet Technology 7(1): 3-es, 2007. Type: Article
This is a detailed and highly technical discussion of a proposed security solution for portable devices such as personal digital assistants and mobile telephones. It appears to be aimed at designers of software for such devices....
Jul 30 2007
On the performance of group key agreement protocols
Amir Y., Kim Y., Nita-Rotaru C., Tsudik G. ACM Transactions on Information and System Security 7(3): 457-488, 2004. Type: Article
“In practice, the actual costs of group key management cannot be trivially extrapolated from the theoretical analysis.” This is the most important statement in this thorough performance analysis....
Mar 7 2005
Reproduction in whole or in part without permission is prohibited. Copyright © 2000-2021 ThinkLoud, Inc.