Остановите войну!
for scientists:
default search action
Reza Curtmola
- > Home > Persons > Reza Curtmola
Publications
- 2023
- [j21]Hammad Afzali, Santiago Torres-Arias, Reza Curtmola, Justin Cappos:
Towards verifiable web-based code review systems. J. Comput. Secur. 31(2): 153-184 (2023) - 2022
- [j20]Anrin Chakraborti, Reza Curtmola, Jonathan Katz, Jason Nieh, Ahmad-Reza Sadeghi, Radu Sion, Yinqian Zhang:
Cloud Computing Security: Foundations and Research Directions. Found. Trends Priv. Secur. 3(2): 103-213 (2022) - [c44]Sangat Vaidya, Santiago Torres-Arias, Justin Cappos, Reza Curtmola:
Bootstrapping Trust in Community Repository Projects. SecureComm 2022: 450-469 - [c43]Mojtaba Zaheri, Yossi Oren, Reza Curtmola:
Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses. USENIX Security Symposium 2022: 1505-1523 - 2021
- [c42]Mojtaba Zaheri, Reza Curtmola:
Leakuidator: Leaky Resource Attacks and Countermeasures. SecureComm (2) 2021: 143-163 - 2020
- [j18]Hammad Afzali, Santiago Torres-Arias, Reza Curtmola, Justin Cappos:
Towards adding verifiability to web-based Git repositories. J. Comput. Secur. 28(4): 405-436 (2020) - 2019
- [c41]Iraklis Leontiadis, Reza Curtmola:
Auditable Compressed Storage. ISC 2019: 67-86 - [c39]Sangat Vaidya, Santiago Torres-Arias, Reza Curtmola, Justin Cappos:
Commit Signatures for Centralized Version Control Systems. SEC 2019: 359-373 - [c38]Santiago Torres-Arias, Hammad Afzali, Trishank Karthik Kuppusamy, Reza Curtmola, Justin Cappos:
in-toto: Providing farm-to-table guarantees for bits and bytes. USENIX Security Symposium 2019: 1393-1410 - [i3]Iraklis Leontiadis, Reza Curtmola:
Auditable Compressed Storage. IACR Cryptol. ePrint Arch. 2019: 1143 (2019) - 2018
- [c37]Hammad Afzali, Santiago Torres-Arias, Reza Curtmola, Justin Cappos:
le-git-imate: Towards Verifiable Web-based Git Repositories. AsiaCCS 2018: 469-482 - [c35]Iraklis Leontiadis, Reza Curtmola:
Secure Storage with Replication and Transparent Deduplication. CODASPY 2018: 13-23 - 2017
- [j14]Bo Chen, Reza Curtmola:
Remote data integrity checking with server-side repair. J. Comput. Secur. 25(6): 537-584 (2017) - 2016
- [c25]Santiago Torres-Arias, Anil Kumar Ammula, Reza Curtmola, Justin Cappos:
On Omitting Commits and Committing Omissions: Preventing Git Metadata Tampering That (Re)introduces Software Vulnerabilities. USENIX Security Symposium 2016: 379-395 - 2015
- [c24]Bo Chen, Anil Kumar Ammula, Reza Curtmola:
Towards Server-side Repair for Erasure Coding-based Distributed Storage Systems. CODASPY 2015: 281-288 - 2014
- [c21]Bo Chen, Reza Curtmola:
Auditable Version Control Systems. NDSS 2014 - 2013
- [c20]Bo Chen, Reza Curtmola:
Towards self-repairing replication-based storage systems using untrusted clouds. CODASPY 2013: 377-388 - 2012
- [j9]Jing Dong, Reza Curtmola, Cristina Nita-Rotaru, David K. Y. Yau:
Pollution Attacks and Defenses in Wireless Interflow Network Coding Systems. IEEE Trans. Dependable Secur. Comput. 9(5): 741-755 (2012) - [c18]Bo Chen, Reza Curtmola:
Robust dynamic remote data checking for public clouds. CCS 2012: 1043-1045 - [c17]Bo Chen, Reza Curtmola:
Robust Dynamic Provable Data Possession. ICDCS Workshops 2012: 515-525 - [c16]Andrew Newell, Reza Curtmola, Cristina Nita-Rotaru:
Entropy attacks and countermeasures in wireless network coding. WISEC 2012: 185-196 - 2011
- [j8]Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky:
Searchable symmetric encryption: Improved definitions and efficient constructions. J. Comput. Secur. 19(5): 895-934 (2011) - [j7]Jing Dong, Reza Curtmola, Cristina Nita-Rotaru:
Practical defenses against pollution attacks in wireless network coding. ACM Trans. Inf. Syst. Secur. 14(1): 7:1-7:31 (2011) - [j6]Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Osama Khan, Lea Kissner, Zachary N. J. Peterson, Dawn Song:
Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. 14(1): 12:1-12:34 (2011) - [j5]Jing Dong, Reza Curtmola, Cristina Nita-Rotaru:
Secure High-Throughput Multicast Routing in Wireless Mesh Networks. IEEE Trans. Mob. Comput. 10(5): 653-668 (2011) - [r4]Cristina Nita-Rotaru, Reza Curtmola:
Secure Network Coding for Wireless Mesh Networks. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1123-1126 - [r3]Cristina Nita-Rotaru, Jing Dong, Reza Curtmola:
Secure Routing in Wireless Mesh Networks. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1126-1130 - [r2]Cristina Nita-Rotaru, Reza Curtmola, Jing Dong:
Security of Group Communication in Wireless Mesh Networks. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1159-1163 - [r1]Reza Curtmola, Jing Dong, Cristina Nita-Rotaru:
Security of Wireless Mesh Networks (General Overview). Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1163-1167 - 2010
- [c15]Bo Chen, Reza Curtmola, Giuseppe Ateniese, Randal C. Burns:
Remote data checking for network coding-based distributed storage systems. CCSW 2010: 31-42 - [c13]Reza Curtmola, Jing Dong, Cristina Nita-Rotaru:
Tradeoffs between security and communication performance in wireless mesh networks. WOWMOM 2010: 1-6 - [e1]Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, Francesc Sebé:
Financial Cryptography and Data Security, FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6054, Springer 2010, ISBN 978-3-642-14991-7 [contents] - 2009
- [j4]Jing Dong, Reza Curtmola, Cristina Nita-Rotaru:
Secure network coding for wireless mesh networks: Threats, challenges, and directions. Comput. Commun. 32(17): 1790-1801 (2009) - [j3]Reza Curtmola, Cristina Nita-Rotaru:
BSMR: Byzantine-Resilient Secure Multicast Routing in Multihop Wireless Networks. IEEE Trans. Mob. Comput. 8(4): 445-459 (2009) - [c12]Jing Dong, Reza Curtmola, Cristina Nita-Rotaru:
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks. WISEC 2009: 111-122 - 2008
- [j2]Baruch Awerbuch, Reza Curtmola, David Holmer, Cristina Nita-Rotaru, Herbert Rubens:
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks. ACM Trans. Inf. Syst. Secur. 10(4): 6:1-6:35 (2008) - [c11]Reza Curtmola, Osama Khan, Randal C. Burns, Giuseppe Ateniese:
MR-PDP: Multiple-Replica Provable Data Possession. ICDCS 2008: 411-420 - [c10]Jing Dong, Reza Curtmola, Cristina Nita-Rotaru:
On the Pitfalls of High-Throughput Multicast Metrics in Adversarial Wireless Mesh Networks. SECON 2008: 224-232 - [c9]Reza Curtmola, Osama Khan, Randal C. Burns:
Robust remote data checking. StorageSS 2008: 63-68 - 2007
- [j1]Reza Curtmola, Cristina Nita-Rotaru:
Secure multicast routing in wireless networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 11(2): 55-56 (2007) - [c8]Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, Dawn Xiaodong Song:
Provable data possession at untrusted stores. CCS 2007: 598-609 - [c7]Reza Curtmola, Cristina Nita-Rotaru:
BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks. SECON 2007: 263-272 - [i2]Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, Dawn Song:
Provable Data Possession at Untrusted Stores. IACR Cryptol. ePrint Arch. 2007: 202 (2007) - 2006
- [c6]Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky:
Searchable symmetric encryption: improved definitions and efficient constructions. CCS 2006: 79-88 - [c5]Baruch Awerbuch, Robert G. Cole, Reza Curtmola, David Holmer, Herbert Rubens:
Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol. ESAS 2006: 98-112 - [c4]Reza Curtmola, Seny Kamara:
A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks. WCAN@ICALP 2006: 57-69 - [i1]Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky:
Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. IACR Cryptol. ePrint Arch. 2006: 210 (2006) - 2005
- [c3]Reza Curtmola, Aniello Del Sorbo, Giuseppe Ateniese:
On the Performance and Analysis of DNS Security Extensions. CANS 2005: 288-303 - [c2]Baruch Awerbuch, Reza Curtmola, David Holmer, Herbert Rubens, Cristina Nita-Rotaru:
On the Survivability of Routing Protocols in Ad Hoc Wireless Networks. SecureComm 2005: 327-338 - 2002
- [c1]Giuseppe Ateniese, Reza Curtmola, Breno de Medeiros, Darren Davis:
Medical Information Privacy Assurance: Cryptographic and System Aspects. SCN 2002: 199-218
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint