Calculated based on number of publications stored in Pure and citations from Scopus
20032023

Research activity per year

Search results

  • 2012

    Robust dynamic provable data possession

    Chen, B. & Curtmola, R., 2012, p. 515-525. 11 p.

    Research output: Contribution to conferencePaperpeer-review

    Open Access
    50 Scopus citations
  • 2011

    Practical defenses against pollution attacks in wireless network coding

    Dong, J., Curtmola, R. & Nita-Rotaru, C., May 2011, In: ACM Transactions on Information and System Security. 14, 1, 7.

    Research output: Contribution to journalArticlepeer-review

    33 Scopus citations
  • Remote data checking using provable data possession

    Ateniese, G., Burns, R., Curtmola, R., Herring, J., Khan, O., Kissner, L., Peterson, Z. & Song, D., May 2011, In: ACM Transactions on Information and System Security. 14, 1, 12.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    340 Scopus citations
  • Searchable symmetric encryption: Improved definitions and efficient constructions

    Curtmola, R., Garay, J., Kamara, S. & Ostrovsky, R., 2011, In: Journal of Computer Security. 19, 5, p. 895-934 40 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    723 Scopus citations
  • Secure high-throughput multicast routing in wireless mesh networks

    Dong, J., Curtmola, R. & Nita-Rotaru, C., May 2011, In: IEEE Transactions on Mobile Computing. 10, 5, p. 653-668 16 p., 5601734.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    31 Scopus citations
  • 2010

    Pollution attacks and defenses in wireless inter-flow network coding systems

    Dong, J., Curtmola, R., Nita-Rotaru, C. & Yau, D., 2010, 2010 3rd IEEE International Workshop on Wireless Network Coding, WiNC 2010. p. 1-6 6 p. 5507941. (2010 3rd IEEE International Workshop on Wireless Network Coding, WiNC 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Remote data checking for network coding-based distributed storage systems

    Chen, B., Curtmola, R., Ateniese, G. & Burns, R., 2010, Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, CCSW '10, Co-located with CCS'10. p. 31-42 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    153 Scopus citations
  • Tradeoffs between security and communication performance in wireless mesh networks

    Curtmola, R., Dong, J. & Nita-Rotaru, C., 2010, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings. 5535005. (2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2009

    BSMR: Byzantine-resilient secure multicast routing in multihop wireless networks

    Curtmola, R. & Nita-Rotaru, C., Apr 2009, In: IEEE Transactions on Mobile Computing. 8, 4, p. 445-459 15 p., 4624271.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    34 Scopus citations
  • Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks

    Dong, J., Curtmola, R. & Nita-Rotaru, C., 2009, Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09. p. 111-122 12 p. (Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    90 Scopus citations
  • Secure network coding for wireless mesh networks: Threats, challenges, and directions

    Dong, J., Curtmola, R. & Nita-Rotaru, C., Nov 15 2009, In: Computer Communications. 32, 17, p. 1790-1801 12 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    63 Scopus citations
  • 2008

    MR-PDP: Multiple-replica provable data possession

    Curtmola, R., Khan, O., Burns, R. & Ateniese, G., 2008, Proceedings - The 28th International Conference on Distributed Computing Systems, ICDCS 2008. p. 411-420 10 p. 4595910. (Proceedings - The 28th International Conference on Distributed Computing Systems, ICDCS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    425 Scopus citations
  • ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks

    Awerbuch, B., Curtmola, R., Holmer, D., Nita-Rotaru, C. & Rubens, H., Jan 1 2008, In: ACM Transactions on Information and System Security. 10, 4, 18.

    Research output: Contribution to journalArticlepeer-review

    111 Scopus citations
  • On the pitfalls of high-throughput multicast metrics in adversarial wireless mesh networks

    Jing, D., Curtmola, R. & Nita-Rotaru, C., 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON. p. 224-232 9 p. 4557759. (2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    7 Scopus citations
  • Robust remote data checking

    Curtmola, R., Khan, O. & Burns, R., 2008, Proceedings of the 4th ACM International Workshop on Storage Security and Survivability, StorageSS'08, Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08. p. 63-68 6 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    66 Scopus citations
  • Toward secure network coding in wireless networks: Threats and challenges

    Dong, J., Curtmola, R., Sethi, R. & Nita-Rotaru, C., 2008, 4th IEEE Workshop on Secure Network Protocols, NPSec'08. p. 33-38 6 p. 4664878. (4th IEEE Workshop on Secure Network Protocols, NPSec'08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    36 Scopus citations
  • 2007

    A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks

    Curtmola, R. & Kamara, S., Apr 14 2007, In: Electronic Notes in Theoretical Computer Science. 171, 1 SPEC. ISS., p. 57-69 13 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    8 Scopus citations
  • BSMR: Byzantine-resilient secure multicast routing in multi-hop wireless networks

    Curtmola, R. & Nita-Rotaru, C., 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON. p. 263-272 10 p. 4292838. (2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    14 Scopus citations
  • Provable data possession at untrusted stores

    Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z. & Song, D., 2007, CCS'07 - Proceedings of the 14th ACM Conference on Computer and Communications Security. p. 598-610 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2208 Scopus citations
  • 2006

    Dynamics of learning algorithms for the On-Demand Secure Byzantine Routing protocol

    Awerbuch, B., Cole, R. G., Curtmola, R., Holmer, D. & Rubens, H., 2006, Security and Privacy in Ad-Hoc and Sensor Networks - Third European Workshop, ESAS 2006, Revised Selected Papers. p. 98-112 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4357 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Searchable symmetric encryption: Improved definitions and efficient constructions

    Curtmola, R., Garay, J., Kamara, S. & Ostrovsky, R., 2006, In: Proceedings of the ACM Conference on Computer and Communications Security. p. 79-88 10 p., 1180417.

    Research output: Contribution to journalConference articlepeer-review

    1478 Scopus citations
  • 2005

    On the performance and analysis of DNS security extensions

    Curtmola, R., Del Sorbo, A. & Ateniese, G., 2005, Cryptology and Network Security - 4th International Conference, CANS 2005, Proceedings. p. 288-303 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3810 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • On the survivability of routing protocols in ad hoc wireless networks

    Awerbuch, B., Curtmola, R., Holmer, D., Rubens, H. & Nita-Rotaru, C., 2005, Proceedings - First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005. p. 327-338 12 p. 1607589. (Proceedings - First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    38 Scopus citations
  • 2003

    Medical information privacy assurance: Cryptographic and system aspects

    Ateniese, G., Curtmola, R., De Medeiros, B. & Davis, D., 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Cimato, S., Persiano, G. & Galdi, C. (eds.). Springer Verlag, p. 199-218 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2576).

    Research output: Chapter in Book/Report/Conference proceedingChapter

    11 Scopus citations