H-Index & Metrics Best Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science D-index 93 Citations 37,528 339 World Ranking 220 National Ranking 132

Research.com Recognitions

Awards & Achievements

2016 - Fellow of the American Association for the Advancement of Science (AAAS)

2015 - Member of Academia Europaea

2014 - ACM Fellow For contributions to Internet security and privacy.

2013 - ACM Senior Member

2013 - IEEE Fellow For contributions to distributed systems security and privacy

Fellow of the International Federation for Information Processing (IFIP) for his significant contributions to cybersecurity and privacy, particularly through the development of the highly efficient provably secure PDP technique (Provable Data Possession) based entirely on symmetric key cryptography, as well as his group signature and companion identity escrow scheme.

Overview

What is he best known for?

The fields of study he is best known for:

  • Computer network
  • The Internet
  • Operating system

The scientist’s investigation covers issues in Computer security, Computer network, Cryptography, The Internet and Group key. With his scientific publications, his incorporates both Computer security and Context. Gene Tsudik interconnects Wireless ad hoc network and Hash function in the investigation of issues within Computer network.

His research in Cryptography intersects with topics in Wireless sensor network, Credit card and Encryption. His biological study spans a wide range of topics, including Software deployment and Traffic analysis. The concepts of his Group key study are interwoven with issues in Group Domain of Interpretation, Key exchange, Diffie–Hellman key exchange, Distributed computing and Key-agreement protocol.

His most cited work include:

  • A security architecture for computational grids (1201 citations)
  • Scalable and efficient provable data possession (852 citations)
  • Named Data Networking (NDN) Project (819 citations)

What are the main themes of his work throughout his whole career to date?

Gene Tsudik spends much of his time researching Computer security, Computer network, Cryptography, Authentication and The Internet. In general Computer security, his work in Public-key cryptography, Encryption and Key is often linked to Context linking many areas of study. He combines subjects such as Wireless ad hoc network and Distributed computing with his study of Computer network.

The Cryptography study combines topics in areas such as Theoretical computer science and Network security. His Authentication research is multidisciplinary, incorporating perspectives in Secure communication, Access control, Key distribution and Identification. His The Internet research is multidisciplinary, incorporating elements of Network packet and Router.

He most often published in these fields:

  • Computer security (54.74%)
  • Computer network (29.74%)
  • Cryptography (15.95%)

What were the highlights of his more recent work (between 2016-2021)?

  • Computer security (54.74%)
  • Software (6.03%)
  • Embedded system (5.82%)

In recent papers he was focusing on the following fields of study:

Gene Tsudik mainly focuses on Computer security, Software, Embedded system, Malware and Context. His Computer security study frequently links to related topics such as The Internet. His The Internet study integrates concerns from other disciplines, such as Computer network, Router and Content centric.

The study incorporates disciplines such as Security service, Overhead, State, Hardware security module and Exploit in addition to Software. His research integrates issues of Isolation, SIMPLE and Access control in his study of Embedded system. His Malware research includes themes of Process, Protocol and Transient.

Between 2016 and 2021, his most popular works were:

  • Lightweight Swarm Attestation: A Tale of Two LISA-s (41 citations)
  • HYDRA: hybrid design for remote attestation (using a formally verified microkernel) (32 citations)
  • Don't Skype & Type!: Acoustic Eavesdropping in Voice-Over-IP (28 citations)

In his most recent research, the most cited papers focused on:

  • Computer network
  • Operating system
  • The Internet

His primary areas of investigation include Computer security, Software, Embedded system, Malware and Internet of Things. His Computer security study combines topics in areas such as Computer network, Host and The Internet. His Software course of study focuses on State and Security service, Exploit, Distributed computing and Swarm behaviour.

His studies deal with areas such as Isolation, Hardware software, Cryptography and Access control as well as Embedded system. His study in the field of Message authentication code also crosses realms of Function. His Malware research integrates issues from Modality, Process, Scalability and Protocol.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

A security architecture for computational grids

Ian Foster;Carl Kesselman;Gene Tsudik;Steven Tuecke.
computer and communications security (1998)

2019 Citations

Scalable and efficient provable data possession

Giuseppe Ateniese;Roberto Di Pietro;Luigi V. Mancini;Gene Tsudik.
international workshop on security (2008)

1415 Citations

A Practical and Provably Secure Coalition-Resistant Group Signature Scheme

Giuseppe Ateniese;Jan Camenisch;Marc Joye;Gene Tsudik.
international cryptology conference (2000)

1213 Citations

Diffie-Hellman key distribution extended to group communication

Michael Steiner;Gene Tsudik;Michael Waidner.
computer and communications security (1996)

1096 Citations

Named Data Networking (NDN) Project

Lixia Zhang;Deborah Estrin;Jeffrey Burke;Van Jacobson.
(2010)

1030 Citations

Efficient and provably secure aggregation of encrypted data in wireless sensor networks

Claude Castelluccia;Aldar C-F. Chan;Einar Mykletun;Gene Tsudik.
ACM Transactions on Sensor Networks (2009)

837 Citations

Key agreement in dynamic peer groups

M. Steiner;G. Tsudik;M. Waidner.
IEEE Transactions on Parallel and Distributed Systems (2000)

826 Citations

Itinerant agents for mobile computing

David Chess;Benjamin Grosof;Colin Harrison;David Levine.
IEEE Personal Communications (1995)

734 Citations

Simple and fault-tolerant key agreement for dynamic collaborative groups

Yongdae Kim;Adrian Perrig;Gene Tsudik.
computer and communications security (2000)

730 Citations

Efficient aggregation of encrypted data in wireless sensor networks

C. Castelluccia;E. Mykletun;G. Tsudik.
international conference on mobile and ubiquitous systems: networking and services (2005)

680 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Gene Tsudik

Ian Foster

Ian Foster

University of Chicago

Publications: 61

Mauro Conti

Mauro Conti

University of Padua

Publications: 61

Yi Mu

Yi Mu

Fujian Normal University

Publications: 57

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 52

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

TU Darmstadt

Publications: 49

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 49

Jan Camenisch

Jan Camenisch

DFINITY

Publications: 45

Roberto Di Pietro

Roberto Di Pietro

Hamad bin Khalifa University

Publications: 45

Nitesh Saxena

Nitesh Saxena

University of Alabama at Birmingham

Publications: 43

Elisa Bertino

Elisa Bertino

Purdue University West Lafayette

Publications: 42

Refik Molva

Refik Molva

EURECOM

Publications: 41

Emiliano De Cristofaro

Emiliano De Cristofaro

University College London

Publications: 41

Nadarajah Asokan

Nadarajah Asokan

University of Waterloo

Publications: 39

Lixia Zhang

Lixia Zhang

University of California, Los Angeles

Publications: 38

Paul Syverson

Paul Syverson

United States Naval Research Laboratory

Publications: 38

J.J. Garcia-Luna-Aceves

J.J. Garcia-Luna-Aceves

University of California, Santa Cruz

Publications: 37

Something went wrong. Please try again later.