BibTeX records: Reza Curtmola

download as .bib file

@article{DBLP:journals/jcs/AfzaliTCC23,
  author       = {Hammad Afzali and
                  Santiago Torres{-}Arias and
                  Reza Curtmola and
                  Justin Cappos},
  title        = {Towards verifiable web-based code review systems},
  journal      = {J. Comput. Secur.},
  volume       = {31},
  number       = {2},
  pages        = {153--184},
  year         = {2023},
  url          = {https://doi.org/10.3233/JCS-210098},
  doi          = {10.3233/JCS-210098},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/AfzaliTCC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftsec/ChakrabortiCKNS22,
  author       = {Anrin Chakraborti and
                  Reza Curtmola and
                  Jonathan Katz and
                  Jason Nieh and
                  Ahmad{-}Reza Sadeghi and
                  Radu Sion and
                  Yinqian Zhang},
  title        = {Cloud Computing Security: Foundations and Research Directions},
  journal      = {Found. Trends Priv. Secur.},
  volume       = {3},
  number       = {2},
  pages        = {103--213},
  year         = {2022},
  url          = {https://doi.org/10.1561/3300000028},
  doi          = {10.1561/3300000028},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ftsec/ChakrabortiCKNS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/HakeemCDB22,
  author       = {Abeer Hakeem and
                  Reza Curtmola and
                  Xiaoning Ding and
                  Cristian Borcea},
  title        = {{DFPS:} {A} Distributed Mobile System for Free Parking Assignment},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {21},
  number       = {12},
  pages        = {4279--4295},
  year         = {2022},
  url          = {https://doi.org/10.1109/TMC.2021.3080222},
  doi          = {10.1109/TMC.2021.3080222},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmc/HakeemCDB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/VaidyaTCC22,
  author       = {Sangat Vaidya and
                  Santiago Torres{-}Arias and
                  Justin Cappos and
                  Reza Curtmola},
  editor       = {Fengjun Li and
                  Kaitai Liang and
                  Zhiqiang Lin and
                  Sokratis K. Katsikas},
  title        = {Bootstrapping Trust in Community Repository Projects},
  booktitle    = {Security and Privacy in Communication Networks - 18th {EAI} International
                  Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {462},
  pages        = {450--469},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25538-0\_24},
  doi          = {10.1007/978-3-031-25538-0\_24},
  timestamp    = {Thu, 06 Jul 2023 17:45:42 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/VaidyaTCC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZaheriOC22,
  author       = {Mojtaba Zaheri and
                  Yossi Oren and
                  Reza Curtmola},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {1505--1523},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/zaheri},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ZaheriOC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ZaheriC21,
  author       = {Mojtaba Zaheri and
                  Reza Curtmola},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Shujun Li and
                  Radha Poovendran and
                  Herv{\'{e}} Debar and
                  Moti Yung},
  title        = {Leakuidator: Leaky Resource Attacks and Countermeasures},
  booktitle    = {Security and Privacy in Communication Networks - 17th {EAI} International
                  Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings,
                  Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {399},
  pages        = {143--163},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90022-9\_8},
  doi          = {10.1007/978-3-030-90022-9\_8},
  timestamp    = {Tue, 23 Nov 2021 14:40:29 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/ZaheriC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/AfzaliTCC20,
  author       = {Hammad Afzali and
                  Santiago Torres{-}Arias and
                  Reza Curtmola and
                  Justin Cappos},
  title        = {Towards adding verifiability to web-based Git repositories},
  journal      = {J. Comput. Secur.},
  volume       = {28},
  number       = {4},
  pages        = {405--436},
  year         = {2020},
  url          = {https://doi.org/10.3233/JCS-191371},
  doi          = {10.3233/JCS-191371},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/AfzaliTCC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/PaikerSBGCD20,
  author       = {Nafize Rabbani Paiker and
                  Jianchen Shan and
                  Cristian Borcea and
                  Narain Gehani and
                  Reza Curtmola and
                  Xiaoning Ding},
  title        = {Design and Implementation of an Overlay File System for Cloud-Assisted
                  Mobile Apps},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {8},
  number       = {1},
  pages        = {97--111},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCC.2017.2763158},
  doi          = {10.1109/TCC.2017.2763158},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/PaikerSBGCD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/GuoLZDCB20,
  author       = {Chang Guo and
                  Demin Li and
                  Guanglin Zhang and
                  Xiaoning Ding and
                  Reza Curtmola and
                  Cristian Borcea},
  title        = {Dynamic Interior Point Method for Vehicular Traffic Optimization},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {69},
  number       = {5},
  pages        = {4855--4868},
  year         = {2020},
  url          = {https://doi.org/10.1109/TVT.2020.2983434},
  doi          = {10.1109/TVT.2020.2983434},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/GuoLZDCB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/DebnathKPDGCB19,
  author       = {Hillol Debnath and
                  Mohammad A. Khan and
                  Nafize R. Paiker and
                  Xiaoning Ding and
                  Narain Gehani and
                  Reza Curtmola and
                  Cristian Borcea},
  title        = {The Moitree middleware for distributed mobile-cloud computing},
  journal      = {J. Syst. Softw.},
  volume       = {157},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jss.2019.07.089},
  doi          = {10.1016/J.JSS.2019.07.089},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/DebnathKPDGCB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/LeontiadisC19,
  author       = {Iraklis Leontiadis and
                  Reza Curtmola},
  editor       = {Zhiqiang Lin and
                  Charalampos Papamanthou and
                  Michalis Polychronakis},
  title        = {Auditable Compressed Storage},
  booktitle    = {Information Security - 22nd International Conference, {ISC} 2019,
                  New York City, NY, USA, September 16-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11723},
  pages        = {67--86},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30215-3\_4},
  doi          = {10.1007/978-3-030-30215-3\_4},
  timestamp    = {Mon, 02 Sep 2019 15:19:30 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/LeontiadisC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/HakeemGDCB19,
  author       = {Abeer Hakeem and
                  Narain Gehani and
                  Xiaoning Ding and
                  Reza Curtmola and
                  Cristian Borcea},
  editor       = {H. Vincent Poor and
                  Zhu Han and
                  Dario Pompili and
                  Zhi Sun and
                  Miao Pan},
  title        = {Multi-destination vehicular route planning with parking and traffic
                  constraints},
  booktitle    = {MobiQuitous 2019, Proceedings of the 16th {EAI} International Conference
                  on Mobile and Ubiquitous Systems: Computing, Networking and Services,
                  Houston, Texas, USA, November 12-14, 2019},
  pages        = {298--307},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3360774.3360824},
  doi          = {10.1145/3360774.3360824},
  timestamp    = {Wed, 05 Jan 2022 14:31:20 +0100},
  biburl       = {https://dblp.org/rec/conf/mobiquitous/HakeemGDCB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/VaidyaTCC19,
  author       = {Sangat Vaidya and
                  Santiago Torres{-}Arias and
                  Reza Curtmola and
                  Justin Cappos},
  editor       = {Gurpreet Dhillon and
                  Fredrik Karlsson and
                  Karin Hedstr{\"{o}}m and
                  Andr{\'{e}} Z{\'{u}}quete},
  title        = {Commit Signatures for Centralized Version Control Systems},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 34th {IFIP} {TC} 11
                  International Conference, {SEC} 2019, Lisbon, Portugal, June 25-27,
                  2019, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {562},
  pages        = {359--373},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22312-0\_25},
  doi          = {10.1007/978-3-030-22312-0\_25},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/VaidyaTCC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Torres-AriasAKC19,
  author       = {Santiago Torres{-}Arias and
                  Hammad Afzali and
                  Trishank Karthik Kuppusamy and
                  Reza Curtmola and
                  Justin Cappos},
  editor       = {Nadia Heninger and
                  Patrick Traynor},
  title        = {in-toto: Providing farm-to-table guarantees for bits and bytes},
  booktitle    = {28th {USENIX} Security Symposium, {USENIX} Security 2019, Santa Clara,
                  CA, USA, August 14-16, 2019},
  pages        = {1393--1410},
  publisher    = {{USENIX} Association},
  year         = {2019},
  url          = {https://www.usenix.org/conference/usenixsecurity19/presentation/torres-arias},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Torres-AriasAKC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeontiadisC19,
  author       = {Iraklis Leontiadis and
                  Reza Curtmola},
  title        = {Auditable Compressed Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1143},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1143},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeontiadisC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AfzaliTCC18,
  author       = {Hammad Afzali and
                  Santiago Torres{-}Arias and
                  Reza Curtmola and
                  Justin Cappos},
  editor       = {Jong Kim and
                  Gail{-}Joon Ahn and
                  Seungjoo Kim and
                  Yongdae Kim and
                  Javier L{\'{o}}pez and
                  Taesoo Kim},
  title        = {le-git-imate: Towards Verifiable Web-based Git Repositories},
  booktitle    = {Proceedings of the 2018 on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
  pages        = {469--482},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196494.3196523},
  doi          = {10.1145/3196494.3196523},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AfzaliTCC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cloudcom/PaikerDCB18,
  author       = {Nafize R. Paiker and
                  Xiaoning Ding and
                  Reza Curtmola and
                  Cristian Borcea},
  title        = {Context-Aware File Discovery System for Distributed Mobile-Cloud Apps},
  booktitle    = {2018 {IEEE} International Conference on Cloud Computing Technology
                  and Science, CloudCom 2018, Nicosia, Cyprus, December 10-13, 2018},
  pages        = {198--203},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CloudCom2018.2018.00047},
  doi          = {10.1109/CLOUDCOM2018.2018.00047},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cloudcom/PaikerDCB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/LeontiadisC18,
  author       = {Iraklis Leontiadis and
                  Reza Curtmola},
  editor       = {Ziming Zhao and
                  Gail{-}Joon Ahn and
                  Ram Krishnan and
                  Gabriel Ghinita},
  title        = {Secure Storage with Replication and Transparent Deduplication},
  booktitle    = {Proceedings of the Eighth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21,
                  2018},
  pages        = {13--23},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3176258.3176315},
  doi          = {10.1145/3176258.3176315},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/LeontiadisC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobilecloud/DebnathGCGDCB18,
  author       = {Hillol Debnath and
                  Giacomo Gezzi and
                  Antonio Corradi and
                  Narain Gehani and
                  Xiaoning Ding and
                  Reza Curtmola and
                  Cristian Borcea},
  title        = {Collaborative Offloading for Distributed Mobile-Cloud Apps},
  booktitle    = {6th {IEEE} International Conference on Mobile Cloud Computing, Services,
                  and Engineering, MobileCloud 2018, Bamberg, Germany, March 26-29,
                  2018},
  pages        = {87--94},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/MobileCloud.2018.00021},
  doi          = {10.1109/MOBILECLOUD.2018.00021},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobilecloud/DebnathGCGDCB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/DebnathGDCB18,
  author       = {Hillol Debnath and
                  Narain Gehani and
                  Xiaoning Ding and
                  Reza Curtmola and
                  Cristian Borcea},
  title        = {Sentio: Distributed Sensor Virtualization for Mobile Apps},
  booktitle    = {2018 {IEEE} International Conference on Pervasive Computing and Communications,
                  PerCom 2018, Athens, Greece, March 19-23, 2018},
  pages        = {1--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/PERCOM.2018.8444605},
  doi          = {10.1109/PERCOM.2018.8444605},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/DebnathGDCB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ChenC17,
  author       = {Bo Chen and
                  Reza Curtmola},
  title        = {Remote data integrity checking with server-side repair},
  journal      = {J. Comput. Secur.},
  volume       = {25},
  number       = {6},
  pages        = {537--584},
  year         = {2017},
  url          = {https://doi.org/10.3233/JCS-16868},
  doi          = {10.3233/JCS-16868},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ChenC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vnc/HakeemGCDB17,
  author       = {Abeer Hakeem and
                  Narain Gehani and
                  Reza Curtmola and
                  Xiaoning Ding and
                  Cristian Borcea},
  title        = {Cooperative system for free parking assignment},
  booktitle    = {2017 {IEEE} Vehicular Networking Conference, {VNC} 2017, Torino, Italy,
                  November 27-29, 2017},
  pages        = {319--326},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/VNC.2017.8275639},
  doi          = {10.1109/VNC.2017.8275639},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/vnc/HakeemGCDB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pervasive/TalasilaCB16,
  author       = {Manoop Talasila and
                  Reza Curtmola and
                  Cristian Borcea},
  title        = {Crowdsensing in the Wild with Aliens and Micropayments},
  journal      = {{IEEE} Pervasive Comput.},
  volume       = {15},
  number       = {1},
  pages        = {68--77},
  year         = {2016},
  url          = {https://doi.org/10.1109/MPRV.2016.18},
  doi          = {10.1109/MPRV.2016.18},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pervasive/TalasilaCB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cbmi/RajgureORDDCGGR16,
  author       = {Sheetal Rajgure and
                  Vincent Oria and
                  Krithika Raghavan and
                  Hardik Dasadia and
                  Sai Shashank Devannagari and
                  Reza Curtmola and
                  James Geller and
                  Pierre Gouton and
                  Edina Renfro{-}Michel and
                  Soon Ae Chun},
  title        = {{UCS:} Ultimate course search},
  booktitle    = {14th International Workshop on Content-Based Multimedia Indexing,
                  {CBMI} 2016, Bucharest, Romania, June 15-17, 2016},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CBMI.2016.7500242},
  doi          = {10.1109/CBMI.2016.7500242},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cbmi/RajgureORDDCGGR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cbmi/RajgureROCRG16,
  author       = {Sheetal Rajgure and
                  Krithika Raghavan and
                  Vincent Oria and
                  Reza Curtmola and
                  Edina Renfro{-}Michel and
                  Pierre Gouton},
  title        = {Indexing multimedia learning materials in ultimate course search},
  booktitle    = {14th International Workshop on Content-Based Multimedia Indexing,
                  {CBMI} 2016, Bucharest, Romania, June 15-17, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CBMI.2016.7500250},
  doi          = {10.1109/CBMI.2016.7500250},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cbmi/RajgureROCRG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicase/HakeemGDCB16,
  author       = {Abeer Hakeem and
                  Narain Gehani and
                  Xiaoning Ding and
                  Reza Curtmola and
                  Cristian Borcea},
  editor       = {Fahim Kawsar and
                  Pei Zhang and
                  Mirco Musolesi},
  title        = {On-The-Fly Curbside Parking Assignment},
  booktitle    = {Proceedings of the 8th {EAI} International Conference on Mobile Computing,
                  Applications and Services, MobiCASE 2016, Cambridge, UK, November
                  30 - December 01, 2016},
  pages        = {1--10},
  publisher    = {{ACM} / {ICST}},
  year         = {2016},
  url          = {https://doi.org/10.4108/eai.30-11-2016.2267101},
  doi          = {10.4108/EAI.30-11-2016.2267101},
  timestamp    = {Mon, 07 May 2018 13:03:04 +0200},
  biburl       = {https://dblp.org/rec/conf/mobicase/HakeemGDCB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobilecloud/KhanDPGDCB16,
  author       = {Mohammad A. Khan and
                  Hillol Debnath and
                  Nafize R. Paiker and
                  Narain Gehani and
                  Xiaoning Ding and
                  Reza Curtmola and
                  Cristian Borcea},
  title        = {Moitree: {A} Middleware for Cloud-Assisted Mobile Distributed Apps},
  booktitle    = {4th {IEEE} International Conference on Mobile Cloud Computing, Services,
                  and Engineering, MobileCloud 2016, Oxford, United Kingdom, March 29
                  - April 1, 2016},
  pages        = {21--30},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MobileCloud.2016.21},
  doi          = {10.1109/MOBILECLOUD.2016.21},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobilecloud/KhanDPGDCB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mss/ShanPDGCB16,
  author       = {Jianchen Shan and
                  Nafize R. Paiker and
                  Xiaoning Ding and
                  Narain H. Gehani and
                  Reza Curtmola and
                  Cristian Borcea},
  title        = {An Overlay File System for cloud-assisted mobile applications},
  booktitle    = {32nd Symposium on Mass Storage Systems and Technologies, {MSST} 2016,
                  Santa Clara, CA, USA, May 2-6, 2016},
  pages        = {1--14},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/MSST.2016.7897093},
  doi          = {10.1109/MSST.2016.7897093},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mss/ShanPDGCB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sarnoff/AlmalkiCDGB16,
  author       = {Nora Almalki and
                  Reza Curtmola and
                  Xiaoning Ding and
                  Narain H. Gehani and
                  Cristian Borcea},
  title        = {{P2F2:} Privacy-preserving face finder},
  booktitle    = {37th {IEEE} Sarnoff Symposium 2016, Newark, NJ, USA, September 19-21,
                  2016},
  pages        = {214--219},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/SARNOF.2016.7846758},
  doi          = {10.1109/SARNOF.2016.7846758},
  timestamp    = {Mon, 10 Feb 2020 16:25:22 +0100},
  biburl       = {https://dblp.org/rec/conf/sarnoff/AlmalkiCDGB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Torres-AriasACC16,
  author       = {Santiago Torres{-}Arias and
                  Anil Kumar Ammula and
                  Reza Curtmola and
                  Justin Cappos},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {On Omitting Commits and Committing Omissions: Preventing Git Metadata
                  Tampering That (Re)introduces Software Vulnerabilities},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {379--395},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/torres-arias},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Torres-AriasACC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/TalasilaCB15,
  author       = {Manoop Talasila and
                  Reza Curtmola and
                  Cristian Borcea},
  title        = {Collaborative Bluetooth-based location authentication on smart phones},
  journal      = {Pervasive Mob. Comput.},
  volume       = {17},
  pages        = {43--62},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.pmcj.2014.02.004},
  doi          = {10.1016/J.PMCJ.2014.02.004},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/percom/TalasilaCB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ChenAC15,
  author       = {Bo Chen and
                  Anil Kumar Ammula and
                  Reza Curtmola},
  editor       = {Jaehong Park and
                  Anna Cinzia Squicciarini},
  title        = {Towards Server-side Repair for Erasure Coding-based Distributed Storage
                  Systems},
  booktitle    = {Proceedings of the 5th {ACM} Conference on Data and Application Security
                  and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015},
  pages        = {281--288},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2699026.2699122},
  doi          = {10.1145/2699026.2699122},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/ChenAC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobilecloud/BorceaDGCKD15,
  author       = {Cristian Borcea and
                  Xiaoning Ding and
                  Narain Gehani and
                  Reza Curtmola and
                  Mohammad A. Khan and
                  Hillol Debnath},
  title        = {Avatar: Mobile Distributed Computing in the Cloud},
  booktitle    = {3rd {IEEE} International Conference on Mobile Cloud Computing, Services,
                  and Engineering, MobileCloud 2015, San Francisco, CA, USA, March 30
                  - April 3, 2015},
  pages        = {151--156},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/MobileCloud.2015.22},
  doi          = {10.1109/MOBILECLOUD.2015.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobilecloud/BorceaDGCKD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicase/TalasilaCB14,
  author       = {Manoop Talasila and
                  Reza Curtmola and
                  Cristian Borcea},
  editor       = {Christine Julien and
                  Nicholas D. Lane and
                  Shivakant Mishra},
  title        = {Alien vs. Mobile user game: Fast and efficient area coverage in crowdsensing},
  booktitle    = {6th International Conference on Mobile Computing, Applications and
                  Services, MobiCASE 2014, Austin, TX, USA, November 6-7, 2014},
  pages        = {65--74},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.4108/icst.mobicase.2014.257779},
  doi          = {10.4108/ICST.MOBICASE.2014.257779},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobicase/TalasilaCB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ChenC14,
  author       = {Bo Chen and
                  Reza Curtmola},
  title        = {Auditable Version Control Systems},
  booktitle    = {21st Annual Network and Distributed System Security Symposium, {NDSS}
                  2014, San Diego, California, USA, February 23-26, 2014},
  publisher    = {The Internet Society},
  year         = {2014},
  url          = {https://www.ndss-symposium.org/ndss2014/auditable-version-control-systems},
  timestamp    = {Mon, 01 Feb 2021 08:42:18 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/ChenC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/CardoneFBCBTC13,
  author       = {Giuseppe Cardone and
                  Luca Foschini and
                  Paolo Bellavista and
                  Antonio Corradi and
                  Cristian Borcea and
                  Manoop Talasila and
                  Reza Curtmola},
  title        = {Fostering participaction in smart cities: a geo-social crowdsensing
                  platform},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {51},
  number       = {6},
  year         = {2013},
  url          = {https://doi.org/10.1109/MCOM.2013.6525603},
  doi          = {10.1109/MCOM.2013.6525603},
  timestamp    = {Wed, 12 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cm/CardoneFBCBTC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijbdcn/TalasilaCB13,
  author       = {Manoop Talasila and
                  Reza Curtmola and
                  Cristian Borcea},
  title        = {{ILR:} Improving Location Reliability in Mobile Crowd Sensing},
  journal      = {Int. J. Bus. Data Commun. Netw.},
  volume       = {9},
  number       = {4},
  pages        = {65--85},
  year         = {2013},
  url          = {https://doi.org/10.4018/ijbdcn.2013100104},
  doi          = {10.4018/IJBDCN.2013100104},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijbdcn/TalasilaCB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ChenC13,
  author       = {Bo Chen and
                  Reza Curtmola},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Lujo Bauer and
                  Jaehong Park},
  title        = {Towards self-repairing replication-based storage systems using untrusted
                  clouds},
  booktitle    = {Third {ACM} Conference on Data and Application Security and Privacy,
                  CODASPY'13, San Antonio, TX, USA, February 18-20, 2013},
  pages        = {377--388},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2435349.2435402},
  doi          = {10.1145/2435349.2435402},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/ChenC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mwcn/TalasilaCB13,
  author       = {Manoop Talasila and
                  Reza Curtmola and
                  Cristian Borcea},
  title        = {Improving location reliability in crowd sensed data with minimal efforts},
  booktitle    = {6th Joint {IFIP} Wireless and Mobile Networking Conference, {WMNC}
                  2013, Dubai, United Arab Emirates, 23-25 April, 2013},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/WMNC.2013.6549016},
  doi          = {10.1109/WMNC.2013.6549016},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/mwcn/TalasilaCB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DongCNY12,
  author       = {Jing Dong and
                  Reza Curtmola and
                  Cristina Nita{-}Rotaru and
                  David K. Y. Yau},
  title        = {Pollution Attacks and Defenses in Wireless Interflow Network Coding
                  Systems},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {5},
  pages        = {741--755},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.39},
  doi          = {10.1109/TDSC.2012.39},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/DongCNY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenC12,
  author       = {Bo Chen and
                  Reza Curtmola},
  editor       = {Ting Yu and
                  George Danezis and
                  Virgil D. Gligor},
  title        = {Robust dynamic remote data checking for public clouds},
  booktitle    = {the {ACM} Conference on Computer and Communications Security, CCS'12,
                  Raleigh, NC, USA, October 16-18, 2012},
  pages        = {1043--1045},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382196.2382319},
  doi          = {10.1145/2382196.2382319},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ChenC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/ChenC12,
  author       = {Bo Chen and
                  Reza Curtmola},
  title        = {Robust Dynamic Provable Data Possession},
  booktitle    = {32nd International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2012 Workshops), Macau, China, June 18-21, 2012},
  pages        = {515--525},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ICDCSW.2012.57},
  doi          = {10.1109/ICDCSW.2012.57},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/ChenC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/NewellCN12,
  author       = {Andrew Newell and
                  Reza Curtmola and
                  Cristina Nita{-}Rotaru},
  editor       = {Marwan Krunz and
                  Loukas Lazos and
                  Roberto Di Pietro and
                  Wade Trappe},
  title        = {Entropy attacks and countermeasures in wireless network coding},
  booktitle    = {Proceedings of the Fifth {ACM} Conference on Security and Privacy
                  in Wireless and Mobile Networks, {WISEC} 2012, Tucson, AZ, USA, April
                  16-18, 2012},
  pages        = {185--196},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2185448.2185473},
  doi          = {10.1145/2185448.2185473},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wisec/NewellCN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/CurtmolaGKO11,
  author       = {Reza Curtmola and
                  Juan A. Garay and
                  Seny Kamara and
                  Rafail Ostrovsky},
  title        = {Searchable symmetric encryption: Improved definitions and efficient
                  constructions},
  journal      = {J. Comput. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {895--934},
  year         = {2011},
  url          = {https://doi.org/10.3233/JCS-2011-0426},
  doi          = {10.3233/JCS-2011-0426},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/CurtmolaGKO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/DongCN11,
  author       = {Jing Dong and
                  Reza Curtmola and
                  Cristina Nita{-}Rotaru},
  title        = {Practical defenses against pollution attacks in wireless network coding},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {7:1--7:31},
  year         = {2011},
  url          = {https://doi.org/10.1145/1952982.1952989},
  doi          = {10.1145/1952982.1952989},
  timestamp    = {Thu, 06 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/DongCN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AtenieseBCHKKPS11,
  author       = {Giuseppe Ateniese and
                  Randal C. Burns and
                  Reza Curtmola and
                  Joseph Herring and
                  Osama Khan and
                  Lea Kissner and
                  Zachary N. J. Peterson and
                  Dawn Song},
  title        = {Remote data checking using provable data possession},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {12:1--12:34},
  year         = {2011},
  url          = {https://doi.org/10.1145/1952982.1952994},
  doi          = {10.1145/1952982.1952994},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AtenieseBCHKKPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/DongCN11,
  author       = {Jing Dong and
                  Reza Curtmola and
                  Cristina Nita{-}Rotaru},
  title        = {Secure High-Throughput Multicast Routing in Wireless Mesh Networks},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {10},
  number       = {5},
  pages        = {653--668},
  year         = {2011},
  url          = {https://doi.org/10.1109/TMC.2010.194},
  doi          = {10.1109/TMC.2010.194},
  timestamp    = {Thu, 06 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/DongCN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Nita-RotaruC11,
  author       = {Cristina Nita{-}Rotaru and
                  Reza Curtmola},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Secure Network Coding for Wireless Mesh Networks},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1123--1126},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_58},
  doi          = {10.1007/978-1-4419-5906-5\_58},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Nita-RotaruC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Nita-RotaruDC11,
  author       = {Cristina Nita{-}Rotaru and
                  Jing Dong and
                  Reza Curtmola},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Secure Routing in Wireless Mesh Networks},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1126--1130},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_884},
  doi          = {10.1007/978-1-4419-5906-5\_884},
  timestamp    = {Thu, 06 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Nita-RotaruDC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Nita-RotaruCD11,
  author       = {Cristina Nita{-}Rotaru and
                  Reza Curtmola and
                  Jing Dong},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Security of Group Communication in Wireless Mesh Networks},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1159--1163},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_60},
  doi          = {10.1007/978-1-4419-5906-5\_60},
  timestamp    = {Thu, 06 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Nita-RotaruCD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/CurtmolaDN11,
  author       = {Reza Curtmola and
                  Jing Dong and
                  Cristina Nita{-}Rotaru},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Security of Wireless Mesh Networks (General Overview)},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1163--1167},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_56},
  doi          = {10.1007/978-1-4419-5906-5\_56},
  timestamp    = {Thu, 06 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/CurtmolaDN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenCAB10,
  author       = {Bo Chen and
                  Reza Curtmola and
                  Giuseppe Ateniese and
                  Randal C. Burns},
  editor       = {Adrian Perrig and
                  Radu Sion},
  title        = {Remote data checking for network coding-based distributed storage
                  systems},
  booktitle    = {Proceedings of the 2nd {ACM} Cloud Computing Security Workshop, {CCSW}
                  2010, Chicago, IL, USA, October 8, 2010},
  pages        = {31--42},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866835.1866842},
  doi          = {10.1145/1866835.1866842},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChenCAB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/TalasilaCB10,
  author       = {Manoop Talasila and
                  Reza Curtmola and
                  Cristian Borcea},
  editor       = {Patrick S{\'{e}}nac and
                  Max Ott and
                  Aruna Seneviratne},
  title        = {{LINK:} Location Verification through Immediate Neighbors Knowledge},
  booktitle    = {Mobile and Ubiquitous Systems: Computing, Networking, and Services
                  - 7th International {ICST} Conference, MobiQuitous 2010, Sydney, Australia,
                  December 6-9, 2010, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {73},
  pages        = {210--223},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-29154-8\_18},
  doi          = {10.1007/978-3-642-29154-8\_18},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mobiquitous/TalasilaCB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wowmom/CurtmolaDN10,
  author       = {Reza Curtmola and
                  Jing Dong and
                  Cristina Nita{-}Rotaru},
  title        = {Tradeoffs between security and communication performance in wireless
                  mesh networks},
  booktitle    = {11th {IEEE} International Symposium on a World of Wireless, Mobile
                  and Multimedia Networks, {WOWMOM} 2010, Montreal, QC, Canada, 14-17
                  June, 2010},
  pages        = {1--6},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/WOWMOM.2010.5535005},
  doi          = {10.1109/WOWMOM.2010.5535005},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wowmom/CurtmolaDN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fc/2010w,
  editor       = {Radu Sion and
                  Reza Curtmola and
                  Sven Dietrich and
                  Aggelos Kiayias and
                  Josep M. Miret and
                  Kazue Sako and
                  Francesc Seb{\'{e}}},
  title        = {Financial Cryptography and Data Security, {FC} 2010 Workshops, RLCPS,
                  WECSR, and {WLC} 2010, Tenerife, Canary Islands, Spain, January 25-28,
                  2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6054},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14992-4},
  doi          = {10.1007/978-3-642-14992-4},
  isbn         = {978-3-642-14991-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/2010w.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/DongCN09,
  author       = {Jing Dong and
                  Reza Curtmola and
                  Cristina Nita{-}Rotaru},
  title        = {Secure network coding for wireless mesh networks: Threats, challenges,
                  and directions},
  journal      = {Comput. Commun.},
  volume       = {32},
  number       = {17},
  pages        = {1790--1801},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.comcom.2009.07.010},
  doi          = {10.1016/J.COMCOM.2009.07.010},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/DongCN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/CurtmolaN09,
  author       = {Reza Curtmola and
                  Cristina Nita{-}Rotaru},
  title        = {{BSMR:} Byzantine-Resilient Secure Multicast Routing in Multihop Wireless
                  Networks},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {8},
  number       = {4},
  pages        = {445--459},
  year         = {2009},
  url          = {https://doi.org/10.1109/TMC.2008.134},
  doi          = {10.1109/TMC.2008.134},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/CurtmolaN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/DongCN09,
  author       = {Jing Dong and
                  Reza Curtmola and
                  Cristina Nita{-}Rotaru},
  editor       = {David A. Basin and
                  Srdjan Capkun and
                  Wenke Lee},
  title        = {Practical defenses against pollution attacks in intra-flow network
                  coding for wireless mesh networks},
  booktitle    = {Proceedings of the Second {ACM} Conference on Wireless Network Security,
                  {WISEC} 2009, Zurich, Switzerland, March 16-19, 2009},
  pages        = {111--122},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1514274.1514292},
  doi          = {10.1145/1514274.1514292},
  timestamp    = {Thu, 06 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisec/DongCN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AwerbuchCHNR08,
  author       = {Baruch Awerbuch and
                  Reza Curtmola and
                  David Holmer and
                  Cristina Nita{-}Rotaru and
                  Herbert Rubens},
  title        = {{ODSBR:} An on-demand secure Byzantine resilient routing protocol
                  for wireless ad hoc networks},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {6:1--6:35},
  year         = {2008},
  url          = {https://doi.org/10.1145/1284680.1341892},
  doi          = {10.1145/1284680.1341892},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/AwerbuchCHNR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/CurtmolaKBA08,
  author       = {Reza Curtmola and
                  Osama Khan and
                  Randal C. Burns and
                  Giuseppe Ateniese},
  title        = {{MR-PDP:} Multiple-Replica Provable Data Possession},
  booktitle    = {28th {IEEE} International Conference on Distributed Computing Systems
                  {(ICDCS} 2008), 17-20 June 2008, Beijing, China},
  pages        = {411--420},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICDCS.2008.68},
  doi          = {10.1109/ICDCS.2008.68},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/CurtmolaKBA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secon/DongCN08,
  author       = {Jing Dong and
                  Reza Curtmola and
                  Cristina Nita{-}Rotaru},
  title        = {On the Pitfalls of High-Throughput Multicast Metrics in Adversarial
                  Wireless Mesh Networks},
  booktitle    = {Proceedings of the Fifth Annual {IEEE} Communications Society Conference
                  on Sensor, Mesh and Ad Hoc Communications and Networks, {SECON} 2008,
                  June 16-20, 2008, Crowne Plaza, San Francisco International Airport,
                  California, {USA}},
  pages        = {224--232},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/SAHCN.2008.36},
  doi          = {10.1109/SAHCN.2008.36},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/secon/DongCN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/storagess/CurtmolaKB08,
  author       = {Reza Curtmola and
                  Osama Khan and
                  Randal C. Burns},
  editor       = {Yongdae Kim and
                  William Yurcik},
  title        = {Robust remote data checking},
  booktitle    = {Proceedings of the 2008 {ACM} Workshop On Storage Security And Survivability,
                  StorageSS 2008, Alexandria, VA, USA, October 31, 2008},
  pages        = {63--68},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456469.1456481},
  doi          = {10.1145/1456469.1456481},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/storagess/CurtmolaKB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmobile/CurtmolaN07,
  author       = {Reza Curtmola and
                  Cristina Nita{-}Rotaru},
  title        = {Secure multicast routing in wireless networks},
  journal      = {{ACM} {SIGMOBILE} Mob. Comput. Commun. Rev.},
  volume       = {11},
  number       = {2},
  pages        = {55--56},
  year         = {2007},
  url          = {https://doi.org/10.1145/1282221.1282233},
  doi          = {10.1145/1282221.1282233},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigmobile/CurtmolaN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AtenieseBCHKPS07,
  author       = {Giuseppe Ateniese and
                  Randal C. Burns and
                  Reza Curtmola and
                  Joseph Herring and
                  Lea Kissner and
                  Zachary N. J. Peterson and
                  Dawn Xiaodong Song},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Provable data possession at untrusted stores},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {598--609},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315318},
  doi          = {10.1145/1315245.1315318},
  timestamp    = {Tue, 10 Nov 2020 20:00:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AtenieseBCHKPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secon/CurtmolaN07,
  author       = {Reza Curtmola and
                  Cristina Nita{-}Rotaru},
  title        = {{BSMR:} Byzantine-Resilient Secure Multicast Routing in Multi-hop
                  Wireless Networks},
  booktitle    = {Proceedings of the Fourth Annual {IEEE} Communications Society Conference
                  on Sensor, Mesh and Ad Hoc Communications and Networks, {SECON} 2007,
                  Merged with {IEEE} International Workshop on Wireless Ad-hoc and Sensor
                  Networks (IWWAN), June 18-21, 2007, San Diego, California, {USA}},
  pages        = {263--272},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/SAHCN.2007.4292838},
  doi          = {10.1109/SAHCN.2007.4292838},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/secon/CurtmolaN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseBCHKPS07,
  author       = {Giuseppe Ateniese and
                  Randal C. Burns and
                  Reza Curtmola and
                  Joseph Herring and
                  Lea Kissner and
                  Zachary N. J. Peterson and
                  Dawn Song},
  title        = {Provable Data Possession at Untrusted Stores},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {202},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/202},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseBCHKPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CurtmolaGKO06,
  author       = {Reza Curtmola and
                  Juan A. Garay and
                  Seny Kamara and
                  Rafail Ostrovsky},
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {Searchable symmetric encryption: improved definitions and efficient
                  constructions},
  booktitle    = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  pages        = {79--88},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405.1180417},
  doi          = {10.1145/1180405.1180417},
  timestamp    = {Wed, 24 Feb 2021 17:28:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CurtmolaGKO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/AwerbuchCCHR06,
  author       = {Baruch Awerbuch and
                  Robert G. Cole and
                  Reza Curtmola and
                  David Holmer and
                  Herbert Rubens},
  editor       = {Levente Butty{\'{a}}n and
                  Virgil D. Gligor and
                  Dirk Westhoff},
  title        = {Dynamics of Learning Algorithms for the On-Demand Secure Byzantine
                  Routing Protocol},
  booktitle    = {Security and Privacy in Ad-Hoc and Sensor Networks, Third European
                  Workshop, {ESAS} 2006, Hamburg, Germany, September 20-21, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4357},
  pages        = {98--112},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11964254\_10},
  doi          = {10.1007/11964254\_10},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/AwerbuchCCHR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/CurtmolaK07,
  author       = {Reza Curtmola and
                  Seny Kamara},
  editor       = {Giovanni Di Crescenzo and
                  Luigi V. Mancini},
  title        = {A Mechanism for Communication-Efficient Broadcast Encryption over
                  Wireless Ad Hoc Networks},
  booktitle    = {Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks,
                  WCAN@ICALP 2006, Venice, Italy, July 16, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {171},
  number       = {1},
  pages        = {57--69},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2006.11.009},
  doi          = {10.1016/J.ENTCS.2006.11.009},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/entcs/CurtmolaK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CurtmolaGKO06,
  author       = {Reza Curtmola and
                  Juan A. Garay and
                  Seny Kamara and
                  Rafail Ostrovsky},
  title        = {Searchable Symmetric Encryption: Improved Definitions and Efficient
                  Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {210},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/210},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CurtmolaGKO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/CurtmolaSA05,
  author       = {Reza Curtmola and
                  Aniello Del Sorbo and
                  Giuseppe Ateniese},
  editor       = {Yvo Desmedt and
                  Huaxiong Wang and
                  Yi Mu and
                  Yongqing Li},
  title        = {On the Performance and Analysis of {DNS} Security Extensions},
  booktitle    = {Cryptology and Network Security, 4th International Conference, {CANS}
                  2005, Xiamen, China, December 14-16, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3810},
  pages        = {288--303},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11599371\_24},
  doi          = {10.1007/11599371\_24},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/CurtmolaSA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/AwerbuchCHRN05,
  author       = {Baruch Awerbuch and
                  Reza Curtmola and
                  David Holmer and
                  Herbert Rubens and
                  Cristina Nita{-}Rotaru},
  title        = {On the Survivability of Routing Protocols in Ad Hoc Wireless Networks},
  booktitle    = {First International Conference on Security and Privacy for Emerging
                  Areas in Communications Networks, SecureComm 2005, Athens, Greece,
                  5-9 September, 2005},
  pages        = {327--338},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/SECURECOMM.2005.30},
  doi          = {10.1109/SECURECOMM.2005.30},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/AwerbuchCHRN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/AtenieseCMD02,
  author       = {Giuseppe Ateniese and
                  Reza Curtmola and
                  Breno de Medeiros and
                  Darren Davis},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {Medical Information Privacy Assurance: Cryptographic and System Aspects},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {199--218},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_15},
  doi          = {10.1007/3-540-36413-7\_15},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/AtenieseCMD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics