Calculated based on number of publications stored in Pure and citations from Scopus
20032021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2005

    On the performance and analysis of DNS security extensions

    Curtmola, R., Del Sorbo, A. & Ateniese, G., 2005, Cryptology and Network Security - 4th International Conference, CANS 2005, Proceedings. p. 288-303 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3810 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • On the survivability of routing protocols in ad hoc wireless networks

    Awerbuch, B., Curtmola, R., Holmer, D., Rubens, H. & Nita-Rotaru, C., 2005, Proceedings - First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005. p. 327-338 12 p. 1607589. (Proceedings - First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    37 Scopus citations
  • 2006

    Dynamics of learning algorithms for the On-Demand Secure Byzantine Routing protocol

    Awerbuch, B., Cole, R. G., Curtmola, R., Holmer, D. & Rubens, H., 2006, Security and Privacy in Ad-Hoc and Sensor Networks - Third European Workshop, ESAS 2006, Revised Selected Papers. p. 98-112 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4357 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2007

    BSMR: Byzantine-resilient secure multicast routing in multi-hop wireless networks

    Curtmola, R. & Nita-Rotaru, C., 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON. p. 263-272 10 p. 4292838. (2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • Provable data possession at untrusted stores

    Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z. & Song, D., 2007, CCS'07 - Proceedings of the 14th ACM Conference on Computer and Communications Security. p. 598-610 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1830 Scopus citations
  • 2008

    MR-PDP: Multiple-replica provable data possession

    Curtmola, R., Khan, O., Burns, R. & Ateniese, G., 2008, Proceedings - The 28th International Conference on Distributed Computing Systems, ICDCS 2008. p. 411-420 10 p. 4595910. (Proceedings - The 28th International Conference on Distributed Computing Systems, ICDCS 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    366 Scopus citations
  • On the pitfalls of high-throughput multicast metrics in adversarial wireless mesh networks

    Jing, D., Curtmola, R. & Nita-Rotaru, C., 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON. p. 224-232 9 p. 4557759. (2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Robust remote data checking

    Curtmola, R., Khan, O. & Burns, R., 2008, Proceedings of the 4th ACM International Workshop on Storage Security and Survivability, StorageSS'08, Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08. p. 63-68 6 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    62 Scopus citations
  • Toward secure network coding in wireless networks: Threats and challenges

    Dong, J., Curtmola, R., Sethi, R. & Nita-Rotaru, C., 2008, 4th IEEE Workshop on Secure Network Protocols, NPSec'08. p. 33-38 6 p. 4664878. (4th IEEE Workshop on Secure Network Protocols, NPSec'08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    35 Scopus citations
  • 2009

    Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks

    Dong, J., Curtmola, R. & Nita-Rotaru, C., 2009, Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09. p. 111-122 12 p. (Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    89 Scopus citations
  • 2010

    Pollution attacks and defenses in wireless inter-flow network coding systems

    Dong, J., Curtmola, R., Nita-Rotaru, C. & Yau, D., 2010, 2010 3rd IEEE International Workshop on Wireless Network Coding, WiNC 2010. p. 1-6 6 p. 5507941. (2010 3rd IEEE International Workshop on Wireless Network Coding, WiNC 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Remote data checking for network coding-based distributed storage systems

    Chen, B., Curtmola, R., Ateniese, G. & Burns, R., 2010, Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, CCSW '10, Co-located with CCS'10. p. 31-42 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    144 Scopus citations
  • Tradeoffs between security and communication performance in wireless mesh networks

    Curtmola, R., Dong, J. & Nita-Rotaru, C., Aug 27 2010, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings. 5535005. (2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2012

    Entropy attacks and countermeasures in wireless network coding

    Newell, A., Curtmola, R. & Nita-Rotaru, C., 2012, WiSec'12 - Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks. p. 185-196 12 p. (WiSec'12 - Proceedings of the 5th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • LINK: Location verification through immediate neighbors knowledge

    Talasila, M., Curtmola, R. & Borcea, C., Dec 1 2012, Mobile and Ubiquitous Systems: Computing, Networking, and Services - 7th International ICST Conference, MobiQuitous 2010, Revised Selected Papers. p. 210-223 14 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 73 LNICST).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Scopus citations
  • POSTER: Robust dynamic Remote Data Checking for public clouds

    Chen, B. & Curtmola, R., Nov 26 2012, CCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security. p. 1043-1045 3 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Scopus citations
  • 2013

    Improving location reliability in crowd sensed data with minimal efforts

    Talasila, M., Curtmola, R. & Borcea, C., 2013, Proceedings of 2013 6th Joint IFIP Wireless and Mobile Networking Conference, WMNC 2013. 6549016. (Proceedings of 2013 6th Joint IFIP Wireless and Mobile Networking Conference, WMNC 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    38 Scopus citations
  • Towards self-repairing replication-based storage systems using untrusted clouds

    Chen, B. & Curtmola, R., 2013, CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy. p. 377-388 12 p. (CODASPY 2013 - Proceedings of the 3rd ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Scopus citations
  • 2015

    Alien vs. Mobile user game: Fast and efficient area coverage in crowdsensing

    Talasila, M., Curtmola, R. & Borcea, C., Jan 28 2015, Proceedings of the 2014 6th International Conference on Mobile Computing, Applications and Services, MobiCASE 2014. Institute of Electrical and Electronics Engineers Inc., p. 65-74 10 p. 7026279. (Proceedings of the 2014 6th International Conference on Mobile Computing, Applications and Services, MobiCASE 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations
  • Avatar: Mobile distributed computing in the cloud

    Borcea, C., Ding, X., Gehani, N., Curtmola, R., Khan, M. A. & Debnath, H., Jun 22 2015, Proceedings - 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2015. Institute of Electrical and Electronics Engineers Inc., p. 151-156 6 p. 7130880. (Proceedings - 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    28 Scopus citations
  • Towards server-side repair for erasure coding-based distributed storage systems

    Chen, B., Ammula, A. K. & Curtmola, R., Mar 2 2015, CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, p. 281-288 8 p. (CODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • 2016

    An Overlay File System for cloud-assisted mobile applications

    Shan, J., Paiker, N. R., Ding, X., Gehani, N., Curtmola, R. & Borcea, C., Jul 2 2016, 2016 32nd Symposium on Mass Storage Systems and Technologies, MSST 2016. IEEE Computer Society, 7897093. (IEEE Symposium on Mass Storage Systems and Technologies; vol. 0).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Indexing multimedia learning materials in ultimate course search

    Rajgure, S., Raghavan, K., Oria, V., Curtmola, R., Renfro-Michel, E. & Gouton, P., Jun 27 2016, 2016 14th International Workshop on Content-Based Multimedia Indexing, CBMI 2016. IEEE Computer Society, 7500250. (Proceedings - International Workshop on Content-Based Multimedia Indexing; vol. 2016-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Moitree: A middleware for cloud-assisted mobile distributed apps

    Khan, M. A., Debnath, H., Paiker, N. R., Gehani, N., Ding, X., Curtmola, R. & Borcea, C., May 19 2016, Proceedings - 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2016. Institute of Electrical and Electronics Engineers Inc., p. 21-30 10 p. 7474402. (Proceedings - 2016 4th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations
  • On omitting commits and committing omissions: Preventing Git metadata tampering that (re)introduces software vulnerabilities

    Torres-Arias, S., Ammula, A. K., Curtmola, R. & Cappos, J., Jan 1 2016, Proceedings of the 25th USENIX Security Symposium. USENIX Association, p. 379-395 17 p. (Proceedings of the 25th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • On-the-fly curbside parking assignment

    Hakeem, A., Gehani, N., Ding, X., Curtmola, R. & Borcea, C., Dec 1 2016, MobiCASE 2016 - 8th EAI International Conference on Mobile Computing, Applications and Services. Kawsar, F., Musolesi, M. & Zhang, P. (eds.). Association for Computing Machinery, Inc, (MobiCASE 2016 - 8th EAI International Conference on Mobile Computing, Applications and Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • UCS: Ultimate course search

    Rajgure, S., Oria, V., Raghavan, K., Dasadia, H., Devannagari, S. S., Curtmola, R., Geller, J., Gouton, P., Renfro-Michel, E. & Chun, S. A., Jun 27 2016, 2016 14th International Workshop on Content-Based Multimedia Indexing, CBMI 2016. IEEE Computer Society, 7500242. (Proceedings - International Workshop on Content-Based Multimedia Indexing; vol. 2016-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2017

    FaceDate: A mobile cloud computing app for people matching invited paper

    Neog, P., Debnath, H., Shan, J., Paiker, N. R., Gehani, N., Curtmola, R., Ding, X. & Borcea, C., Apr 24 2017, BODYNETS 2016 - 11th International Conference on Body Area Networks. EAI

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • P2F2: Privacy-preserving face finder

    Almalki, N., Curtmola, R., Ding, X., Gehani, N. & Borcea, C., Feb 7 2017, 37th IEEE Sarnoff Symposium, Sarnoff 2016. Institute of Electrical and Electronics Engineers Inc., p. 214-219 6 p. 7846758. (37th IEEE Sarnoff Symposium, Sarnoff 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2018

    Collaborative Offloading for Distributed Mobile-Cloud Apps

    Debnath, H., Gezzi, G., Corradi, A., Gehani, N., Ding, X., Curtmola, R. & Borcea, C., Apr 26 2018, Proceedings - 6th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2018. Institute of Electrical and Electronics Engineers Inc., p. 87-94 8 p. (Proceedings - 6th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2018; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • Context-aware file discovery system for distributed mobile-cloud apps

    Paiker, N., Ding, X., Curtmola, R. & Borcea, C., Dec 26 2018, Proceedings - IEEE 10th International Conference on Cloud Computing Technology and Science, CloudCom 2018. IEEE Computer Society, p. 198-203 6 p. 8591016. (Proceedings of the International Conference on Cloud Computing Technology and Science, CloudCom; vol. 2018-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Cooperative system for free parking assignment

    Hakeem, A., Gehani, N., Curtmola, R., Ding, X. & Borcea, C., Jan 30 2018, 2017 IEEE Vehicular Networking Conference, VNC 2017. Altintas, O., Casetti, C., Meireles, R., Kirsch, N. & Lo Cigno, R. (eds.). IEEE Computer Society, p. 319-326 8 p. (IEEE Vehicular Networking Conference, VNC; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Le-git-imate: Towards verifiable web-based git repositories

    Afzali, H., Torres-Arias, S., Curtmola, R. & Cappos, J., May 29 2018, ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 469-482 14 p. (ASIACCS 2018 - Proceedings of the 2018 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Secure storage with replication and transparent deduplication

    Leontiadis, I. & Curtmola, R., Mar 13 2018, CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 13-23 11 p. (CODASPY 2018 - Proceedings of the 8th ACM Conference on Data and Application Security and Privacy; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • Sentio: Distributed Sensor Virtualization for Mobile Apps

    Debnath, H., Gehani, N., Ding, X., Curtmola, R. & Borcea, C., Aug 22 2018, 2018 IEEE International Conference on Pervasive Computing and Communications, PerCom 2018. Institute of Electrical and Electronics Engineers Inc., 8444605. (2018 IEEE International Conference on Pervasive Computing and Communications, PerCom 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • 2019

    Auditable Compressed Storage

    Leontiadis, I. & Curtmola, R., 2019, Information Security - 22nd International Conference, ISC 2019, Proceedings. Lin, Z., Papamanthou, C. & Polychronakis, M. (eds.). Springer Verlag, p. 67-86 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11723 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Commit signatures for centralized version control systems

    Vaidya, S., Torres-Arias, S., Curtmola, R. & Cappos, J., 2019, ICT Systems Security and Privacy Protection - 34th IFIP TC 11 International Conference, SEC 2019, Proceedings. Dhillon, G., Karlsson, F., Hedström, K. & Zúquete, A. (eds.). Springer New York LLC, p. 359-373 15 p. (IFIP Advances in Information and Communication Technology; vol. 562).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • In-Toto: Providing farm-to-table guarantees for bits and bytes

    Torres-Arias, S., Afzali, H., Kuppusamy, T. K., Curtmola, R. & Cappos, J., 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 1393-1410 18 p. (Proceedings of the 28th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • In-Toto: Providing farm-to-table guarantees for bits and bytes

    Torres-Arias, S., Afzali, H., Kuppusamy, T. K., Curtmola, R. & Cappos, J., Jan 1 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 1393-1410 18 p. (Proceedings of the 28th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Multi-destination vehicular route planning with parking and traffic constraints

    Hakeem, A., Gehani, N., Ding, X., Curtmola, R. & Borcea, C., Nov 12 2019, Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, MobiQuitous 2019. Association for Computing Machinery, p. 298-307 10 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • 2021

    Leakuidator: Leaky Resource Attacks and Countermeasures

    Zaheri, M. & Curtmola, R., 2021, Security and Privacy in Communication Networks - 17th EAI International Conference, SecureComm 2021, Proceedings. Garcia-Alfaro, J., Li, S., Poovendran, R., Debar, H. & Yung, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 143-163 21 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 399 LNICST).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution