Calculated based on number of publications stored in Pure and citations from Scopus
20032023

Research activity per year

If you made any changes in Pure these will be visible here soon.

Search results

  • Conference contribution

    On omitting commits and committing omissions: Preventing Git metadata tampering that (re)introduces software vulnerabilities

    Torres-Arias, S., Ammula, A. K., Curtmola, R. & Cappos, J., Jan 1 2016, Proceedings of the 25th USENIX Security Symposium. USENIX Association, p. 379-395 17 p. (Proceedings of the 25th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations
  • On-the-fly curbside parking assignment

    Hakeem, A., Gehani, N., Ding, X., Curtmola, R. & Borcea, C., Dec 1 2016, MobiCASE 2016 - 8th EAI International Conference on Mobile Computing, Applications and Services. Kawsar, F., Musolesi, M. & Zhang, P. (eds.). Association for Computing Machinery, Inc, (MobiCASE 2016 - 8th EAI International Conference on Mobile Computing, Applications and Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • On the performance and analysis of DNS security extensions

    Curtmola, R., Del Sorbo, A. & Ateniese, G., 2005, Cryptology and Network Security - 4th International Conference, CANS 2005, Proceedings. p. 288-303 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3810 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • On the pitfalls of high-throughput multicast metrics in adversarial wireless mesh networks

    Jing, D., Curtmola, R. & Nita-Rotaru, C., 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON. p. 224-232 9 p. 4557759. (2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • On the survivability of routing protocols in ad hoc wireless networks

    Awerbuch, B., Curtmola, R., Holmer, D., Rubens, H. & Nita-Rotaru, C., 2005, Proceedings - First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005. p. 327-338 12 p. 1607589. (Proceedings - First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    37 Scopus citations
  • P2F2: Privacy-preserving face finder

    Almalki, N., Curtmola, R., Ding, X., Gehani, N. & Borcea, C., Feb 7 2017, 37th IEEE Sarnoff Symposium, Sarnoff 2016. Institute of Electrical and Electronics Engineers Inc., p. 214-219 6 p. 7846758. (37th IEEE Sarnoff Symposium, Sarnoff 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Pollution attacks and defenses in wireless inter-flow network coding systems

    Dong, J., Curtmola, R., Nita-Rotaru, C. & Yau, D., 2010, 2010 3rd IEEE International Workshop on Wireless Network Coding, WiNC 2010. p. 1-6 6 p. 5507941. (2010 3rd IEEE International Workshop on Wireless Network Coding, WiNC 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • POSTER: Robust dynamic Remote Data Checking for public clouds

    Chen, B. & Curtmola, R., 2012, CCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security. p. 1043-1045 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Scopus citations
  • Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks

    Dong, J., Curtmola, R. & Nita-Rotaru, C., 2009, Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09. p. 111-122 12 p. (Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    90 Scopus citations
  • Provable data possession at untrusted stores

    Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z. & Song, D., 2007, CCS'07 - Proceedings of the 14th ACM Conference on Computer and Communications Security. p. 598-610 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2036 Scopus citations
  • Remote data checking for network coding-based distributed storage systems

    Chen, B., Curtmola, R., Ateniese, G. & Burns, R., 2010, Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, CCSW '10, Co-located with CCS'10. p. 31-42 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    147 Scopus citations
  • Robust remote data checking

    Curtmola, R., Khan, O. & Burns, R., 2008, Proceedings of the 4th ACM International Workshop on Storage Security and Survivability, StorageSS'08, Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08. p. 63-68 6 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    65 Scopus citations
  • Secure storage with replication and transparent deduplication

    Leontiadis, I. & Curtmola, R., Mar 13 2018, CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 13-23 11 p. (CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • Sentio: Distributed Sensor Virtualization for Mobile Apps

    Debnath, H., Gehani, N., Ding, X., Curtmola, R. & Borcea, C., Aug 22 2018, 2018 IEEE International Conference on Pervasive Computing and Communications, PerCom 2018. Institute of Electrical and Electronics Engineers Inc., 8444605. (2018 IEEE International Conference on Pervasive Computing and Communications, PerCom 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses

    Zaheri, M., Oren, Y. & Curtmola, R., 2022, Proceedings of the 31st USENIX Security Symposium, Security 2022. USENIX Association, p. 1505-1523 19 p. (Proceedings of the 31st USENIX Security Symposium, Security 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Toward secure network coding in wireless networks: Threats and challenges

    Dong, J., Curtmola, R., Sethi, R. & Nita-Rotaru, C., 2008, 4th IEEE Workshop on Secure Network Protocols, NPSec'08. p. 33-38 6 p. 4664878. (4th IEEE Workshop on Secure Network Protocols, NPSec'08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    36 Scopus citations
  • Towards self-repairing replication-based storage systems using untrusted clouds

    Chen, B. & Curtmola, R., 2013, CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. p. 377-388 12 p. (CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Scopus citations
  • Towards server-side repair for erasure coding-based distributed storage systems

    Chen, B., Ammula, A. K. & Curtmola, R., Mar 2 2015, CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, p. 281-288 8 p. (CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • Tradeoffs between security and communication performance in wireless mesh networks

    Curtmola, R., Dong, J. & Nita-Rotaru, C., Aug 27 2010, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings. 5535005. (2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • UCS: Ultimate course search

    Rajgure, S., Oria, V., Raghavan, K., Dasadia, H., Devannagari, S. S., Curtmola, R., Geller, J., Gouton, P., Renfro-Michel, E. & Chun, S. A., Jun 27 2016, 2016 14th International Workshop on Content-Based Multimedia Indexing, CBMI 2016. IEEE Computer Society, 7500242. (Proceedings - International Workshop on Content-Based Multimedia Indexing; vol. 2016-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Paper

    Cloud computing for education: A professional development program for high school teachers

    Curtmola, R., Carpinelli, J. D., Hirsch, L. S., Kimmel, H. S. & Burr-Alexander, L., Jan 1 2014.

    Research output: Contribution to conferencePaperpeer-review

  • Robust dynamic provable data possession

    Chen, B. & Curtmola, R., 2012, p. 515-525. 11 p.

    Research output: Contribution to conferencePaperpeer-review

    45 Scopus citations