Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Tsudik, Gene Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 4 of 4 reviews    
  Skype & Type: keyboard eavesdropping in voice-over-IP
Cecconello S., Compagno A., Conti M., Lain D., Tsudik G. ACM Transactions on Privacy and Security 22(4): 1-34, 2019.  Type: Article

In our current environment, many people work remotely from their office and routinely use voice over Internet protocol (VoIP) tools for communicating with colleagues. During these voice calls, it is also quite common for participants t...
...
Aug 24 2021  
  Collaborative authentication in unattended WSNs
Di Pietro R., Soriente C., Spognardi A., Tsudik G.  WiSec 2009 (Proceedings of the 2nd ACM Conference on Wireless Network Security, Zurich, Switzerland, Mar 16-19, 2009) 237-244, 2009.  Type: Proceedings

The concept of an unattended wireless sensor network (UWSN) is based on a mobile sink visiting a network to collect sensed data. This data is stored locally on the UWSN’s nodes until the next sink visit. A problem with UWSNs ...
...
May 19 2009  
  Equipping smart devices with public key signatures
Ding X., Mazzocchi D., Tsudik G. ACM Transactions on Internet Technology 7(1): 3-es, 2007.  Type: Article

This is a detailed and highly technical discussion of a proposed security solution for portable devices such as personal digital assistants and mobile telephones. It appears to be aimed at designers of software for such devices....
...
Jul 30 2007  
  On the performance of group key agreement protocols
Amir Y., Kim Y., Nita-Rotaru C., Tsudik G. ACM Transactions on Information and System Security 7(3): 457-488, 2004.  Type: Article

“In practice, the actual costs of group key management cannot be trivially extrapolated from the theoretical analysis.” This is the most important statement in this thorough performance analysis....
...
Mar 7 2005  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy