2016 - Fellow of the American Association for the Advancement of Science (AAAS)
2015 - Member of Academia Europaea
2014 - ACM Fellow For contributions to Internet security and privacy.
2013 - ACM Senior Member
2013 - IEEE Fellow For contributions to distributed systems security and privacy
Fellow of the International Federation for Information Processing (IFIP) for his significant contributions to cybersecurity and privacy, particularly through the development of the highly efficient provably secure PDP technique (Provable Data Possession) based entirely on symmetric key cryptography, as well as his group signature and companion identity escrow scheme.
The scientist’s investigation covers issues in Computer security, Computer network, Cryptography, The Internet and Group key. With his scientific publications, his incorporates both Computer security and Context. Gene Tsudik interconnects Wireless ad hoc network and Hash function in the investigation of issues within Computer network.
His research in Cryptography intersects with topics in Wireless sensor network, Credit card and Encryption. His biological study spans a wide range of topics, including Software deployment and Traffic analysis. The concepts of his Group key study are interwoven with issues in Group Domain of Interpretation, Key exchange, Diffie–Hellman key exchange, Distributed computing and Key-agreement protocol.
Gene Tsudik spends much of his time researching Computer security, Computer network, Cryptography, Authentication and The Internet. In general Computer security, his work in Public-key cryptography, Encryption and Key is often linked to Context linking many areas of study. He combines subjects such as Wireless ad hoc network and Distributed computing with his study of Computer network.
The Cryptography study combines topics in areas such as Theoretical computer science and Network security. His Authentication research is multidisciplinary, incorporating perspectives in Secure communication, Access control, Key distribution and Identification. His The Internet research is multidisciplinary, incorporating elements of Network packet and Router.
Gene Tsudik mainly focuses on Computer security, Software, Embedded system, Malware and Context. His Computer security study frequently links to related topics such as The Internet. His The Internet study integrates concerns from other disciplines, such as Computer network, Router and Content centric.
The study incorporates disciplines such as Security service, Overhead, State, Hardware security module and Exploit in addition to Software. His research integrates issues of Isolation, SIMPLE and Access control in his study of Embedded system. His Malware research includes themes of Process, Protocol and Transient.
His primary areas of investigation include Computer security, Software, Embedded system, Malware and Internet of Things. His Computer security study combines topics in areas such as Computer network, Host and The Internet. His Software course of study focuses on State and Security service, Exploit, Distributed computing and Swarm behaviour.
His studies deal with areas such as Isolation, Hardware software, Cryptography and Access control as well as Embedded system. His study in the field of Message authentication code also crosses realms of Function. His Malware research integrates issues from Modality, Process, Scalability and Protocol.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A security architecture for computational grids
Ian Foster;Carl Kesselman;Gene Tsudik;Steven Tuecke.
computer and communications security (1998)
Scalable and efficient provable data possession
Giuseppe Ateniese;Roberto Di Pietro;Luigi V. Mancini;Gene Tsudik.
international workshop on security (2008)
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme
Giuseppe Ateniese;Jan Camenisch;Marc Joye;Gene Tsudik.
international cryptology conference (2000)
Diffie-Hellman key distribution extended to group communication
Michael Steiner;Gene Tsudik;Michael Waidner.
computer and communications security (1996)
Named Data Networking (NDN) Project
Lixia Zhang;Deborah Estrin;Jeffrey Burke;Van Jacobson.
Efficient and provably secure aggregation of encrypted data in wireless sensor networks
Claude Castelluccia;Aldar C-F. Chan;Einar Mykletun;Gene Tsudik.
ACM Transactions on Sensor Networks (2009)
Key agreement in dynamic peer groups
M. Steiner;G. Tsudik;M. Waidner.
IEEE Transactions on Parallel and Distributed Systems (2000)
Itinerant agents for mobile computing
David Chess;Benjamin Grosof;Colin Harrison;David Levine.
IEEE Personal Communications (1995)
Simple and fault-tolerant key agreement for dynamic collaborative groups
Yongdae Kim;Adrian Perrig;Gene Tsudik.
computer and communications security (2000)
Efficient aggregation of encrypted data in wireless sensor networks
C. Castelluccia;E. Mykletun;G. Tsudik.
international conference on mobile and ubiquitous systems: networking and services (2005)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below: