Calculated based on number of publications stored in Pure and citations from Scopus
20032021

Research activity per year

If you made any changes in Pure these will be visible here soon.

Search results

  • 2010

    Tradeoffs between security and communication performance in wireless mesh networks

    Curtmola, R., Dong, J. & Nita-Rotaru, C., Aug 27 2010, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings. 5535005. (2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2009

    BSMR: Byzantine-resilient secure multicast routing in multihop wireless networks

    Curtmola, R. & Nita-Rotaru, C., Apr 2009, In: IEEE Transactions on Mobile Computing. 8, 4, p. 445-459 15 p., 4624271.

    Research output: Contribution to journalArticlepeer-review

    33 Scopus citations
  • Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks

    Dong, J., Curtmola, R. & Nita-Rotaru, C., 2009, Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09. p. 111-122 12 p. (Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    89 Scopus citations
  • Secure network coding for wireless mesh networks: Threats, challenges, and directions

    Dong, J., Curtmola, R. & Nita-Rotaru, C., Nov 15 2009, In: Computer Communications. 32, 17, p. 1790-1801 12 p.

    Research output: Contribution to journalArticlepeer-review

    62 Scopus citations
  • 2008

    MR-PDP: Multiple-replica provable data possession

    Curtmola, R., Khan, O., Burns, R. & Ateniese, G., 2008, Proceedings - The 28th International Conference on Distributed Computing Systems, ICDCS 2008. p. 411-420 10 p. 4595910. (Proceedings - The 28th International Conference on Distributed Computing Systems, ICDCS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    366 Scopus citations
  • ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks

    Awerbuch, B., Curtmola, R., Holmer, D., Nita-Rotaru, C. & Rubens, H., Jan 1 2008, In: ACM Transactions on Information and System Security. 10, 4, 18.

    Research output: Contribution to journalArticlepeer-review

    107 Scopus citations
  • On the pitfalls of high-throughput multicast metrics in adversarial wireless mesh networks

    Jing, D., Curtmola, R. & Nita-Rotaru, C., 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON. p. 224-232 9 p. 4557759. (2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Robust remote data checking

    Curtmola, R., Khan, O. & Burns, R., 2008, Proceedings of the 4th ACM International Workshop on Storage Security and Survivability, StorageSS'08, Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08. p. 63-68 6 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    62 Scopus citations
  • Toward secure network coding in wireless networks: Threats and challenges

    Dong, J., Curtmola, R., Sethi, R. & Nita-Rotaru, C., 2008, 4th IEEE Workshop on Secure Network Protocols, NPSec'08. p. 33-38 6 p. 4664878. (4th IEEE Workshop on Secure Network Protocols, NPSec'08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    35 Scopus citations
  • 2007

    A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks

    Curtmola, R. & Kamara, S., Apr 14 2007, In: Electronic Notes in Theoretical Computer Science. 171, 1 SPEC. ISS., p. 57-69 13 p.

    Research output: Contribution to journalArticlepeer-review

    7 Scopus citations
  • BSMR: Byzantine-resilient secure multicast routing in multi-hop wireless networks

    Curtmola, R. & Nita-Rotaru, C., 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON. p. 263-272 10 p. 4292838. (2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • Provable data possession at untrusted stores

    Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z. & Song, D., 2007, CCS'07 - Proceedings of the 14th ACM Conference on Computer and Communications Security. p. 598-610 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1830 Scopus citations
  • 2006

    Dynamics of learning algorithms for the On-Demand Secure Byzantine Routing protocol

    Awerbuch, B., Cole, R. G., Curtmola, R., Holmer, D. & Rubens, H., 2006, Security and Privacy in Ad-Hoc and Sensor Networks - Third European Workshop, ESAS 2006, Revised Selected Papers. p. 98-112 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4357 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Searchable symmetric encryption: Improved definitions and efficient constructions

    Curtmola, R., Garay, J., Kamara, S. & Ostrovsky, R., Dec 1 2006, In: Proceedings of the ACM Conference on Computer and Communications Security. p. 79-88 10 p., 1180417.

    Research output: Contribution to journalConference articlepeer-review

    1235 Scopus citations
  • 2005

    On the performance and analysis of DNS security extensions

    Curtmola, R., Del Sorbo, A. & Ateniese, G., 2005, Cryptology and Network Security - 4th International Conference, CANS 2005, Proceedings. p. 288-303 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3810 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • On the survivability of routing protocols in ad hoc wireless networks

    Awerbuch, B., Curtmola, R., Holmer, D., Rubens, H. & Nita-Rotaru, C., 2005, Proceedings - First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005. p. 327-338 12 p. 1607589. (Proceedings - First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    37 Scopus citations
  • 2003

    Medical information privacy assurance: Cryptographic and system aspects

    Ateniese, G., Curtmola, R., De Medeiros, B. & Davis, D., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Cimato, S., Persiano, G. & Galdi, C. (eds.). Springer Verlag, p. 199-218 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2576).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    11 Scopus citations