Publications

Journals

- Collaborative Bluetooth-based Location Authentication on Smart Phones
(To appear) in Elsevier Pervasive and Mobile Computing Journal, 2014
(with Manoop Talasila and Cristian Borcea)

- Fostering ParticipAction in Smart Cities: A Geo-Social CrowdSensing Platform
In IEEE Communications Magazine, Special Issue on Smart Cities, Vol. 51, No. 6, 2013
(with Giuseppe Cardone, Luca Foschini, Cristian Borcea, Paolo Bellavista, Antonio Corradi, and Manoop Talasila)

- ILR: Improving Location Reliability in Mobile Crowd Sensing
In International Journal of Business Data Communications and Networking, Vol. 9, No. 4, 2013,
(with Manoop Talasila and Cristian Borcea)

- Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems
In IEEE Transactions on Dependable and Secure Computing (TDSC), Volume 9, Issue 5, 2012
(with Jing Dong, Cristina Nita-Rotaru, and David Yau)

- Searchable symmetric encryption: Improved definitions and efficient constructions
In Journal of Computer Security (JCS), Volume 19, Issue 5, 2011
(with Juan Garay, Seny Kamara and Rafail Ostrovsky)

- Remote Data Checking Using Provable Data Possession
In ACM Transactions on Information and System Security (TISSEC), Volume 14, Issue 1, 2011
(with Giuseppe Ateniese, Randal Burns, Joseph Herring, Osama Khan, Lea Kissner, Zachary Peterson, and Dawn Song)

- Practical Defenses Against Pollution Attacks in Wireless Network Coding
In ACM Transactions on Information and System Security (TISSEC), Volume 14, Issue 1, 2011
(with Jing Dong and Cristina Nita-Rotaru)

- Secure High-Throughput Multicast Routing in Wireless Mesh Networks
In IEEE Transactions on Mobile Computing (TMC), Volume 10, Issue 5, 2011
(with Jing Dong and Cristina Nita-Rotaru)

- Secure Network Coding for Wireless Mesh Networks: Threats, Challenges, and Directions
In Elsevier Computer Communications, Volume 32, Issue 17, 2009
(with Jing Dong and Cristina Nita-Rotaru)

- BSMR: Byzantine-Resilient Secure Multicast Routing in Multihop Wireless Networks
In IEEE Transactions on Mobile Computing (TMC), Volume 8, Issue 4, 2009
(with Cristina Nita-Rotaru)

- ODSBR: An On-Demand Secure Byzantine Resilient Routing Protocol for Wireless Ad Hoc Networks
In ACM Transactions on Information and System Security (TISSEC), Volume 10, Issue 4, 2007
(with Baruch Awerbuch, David Holmer, Cristina Nita-Rotaru and Herbert Rubens)
Available files:   Full Version (pdf)   Abstract   BibTex


Conferences and Workshops
- Alien vs. Mobile User Game: Fast and Efficient Area Coverage in Crowdsensing
Proc. of the 6th International Conference on Mobile Computing, Applications and Services
(MobiCASE '14), Austin, TX, November 2014
(with Manoop Talasila and Cristian Borcea)

- Auditable Version Control Systems
Proc. of the ISOC 21st Annual Network & Distributed System Security Symposium
(NDSS '14), San Diego, CA, February 2014
(with Bo Chen)

- Cloud Computing for Education: A Professional Development Program for High School Teachers
Proc. of the 2014 ASEE Annual Conference
(ASEE AC 2014), Indianapolis, IN, June 2014
(with John Carpinelli, Linda Hirsch, Howard S. Kimmel, and Levelle Burr-Alexander)

- Improving Location Reliability in Crowd Sensed Data with Minimal Efforts
Proc. of the Sixth Joint IFIP/IEEE Wireless and Mobile Networking Conference
(WMNC '13), Dubai, April 2013
(with Manoop Talasila and Cristian Borcea)

- Towards Self-Repairing Replication-Based Storage Systems Using Untrusted Clouds
(Outstanding Paper Award)

Proc. of the Third ACM Conference on Data and Application Security and Privacy
(CODASPY '13), San Antonio, TX, February 2013
(with Bo Chen)

- Entropy Attacks and Countermeasures in Wireless Network Coding
Proc. of The Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks
(WiSec 2012), Tucson, AZ, April 2012
(with Andrew Newell and Cristina Nita-Rotaru)

- Robust Dynamic Provable Data Possession
The Third IEEE International Workshop on Security and Privacy in Cloud Computing
(SPCC '12), Macau, China, June 2012 (in conjunction with ICDCS 2012)
(the full version of the paper is available as a Technical Report)
(with Bo Chen)

- LINK: Location verification through Immediate Neighbors Knowledge
Proc. of the 7th International ICST Conference on Mobile and Ubiquituous Systems
(MobiQuitous '10), Sydney, Australia, December 2010
(with Manoop Talasila and Cristian Borcea)

- Remote Data Checking for Network Coding-based Distributed Storage Systems
The Second ACM Cloud Computing Security Workshop
(CCSW '10), Chicago, IL, October 2010 (in conjunction with CCS 2010)
(with Bo Chen, Giuseppe Ateniese, and Randal Burns)

- Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems
The Third IEEE Wireless Network Coding Workshop
(WiNC 2010), Boston, MA, June 2010 (in conjunction with SECON 2010)
(with Jing Dong and Cristina Nita-Rotaru)

- Tradeoffs between Security and Communication Performance in Wireless Mesh Networks
The First International Workshop on Data Security and PrivAcy in wireless Networks
(D-SPAN 2010), Montreal, Canada, June 2010 (in conjunction with WoWMoM 2010)
(with Jing Dong and Cristina Nita-Rotaru)

- Practical Defenses Against Pollution Attacks in Intra-Flow Network Coding for Wireless Mesh Networks
Proc. of The Second ACM Conference on Wireless Network Security
(WiSec 2009), Zurich, Switzerland, March 2009
(with Jing Dong and Cristina Nita-Rotaru)

- Robust Remote Data Checking
The Fourth ACM International Workshop on Storage Security and Survivability
(StorageSS 2008), Alexandria, VA, October 2008 (in conjunction with CCS 2008)
(with Osama Khan and Randal Burns)

- Toward Secure Network Coding in Wireless Networks: Threats and Challenges
The Fourth IEEE Workshop on Secure Network Protocols
(NPSec 2008), Orlando, FL, October 2008 (in conjunction with ICNP 2008)
(with Jing Dong, Ruben Sethi, and Cristina Nita-Rotaru)

- MR. PDP: Multiple-Replica Provable Data Possession
Proc. of The 28th IEEE International Conference on Distributed Computing Systems
(ICDCS '08), Beijing, China, June 2008
(with Osama Khan, Randal Burns and Giuseppe Ateniese)
Available files:   Proceedings Version (pdf)   Abstract   BibTex

- On the Pitfalls of High-Throughput Multicast Metrics in Adversarial Wireless Mesh Networks
Proc. of The Fifth IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks
(SECON '08), San Francisco, CA, June 2008
(with Jing Dong and Cristina Nita-Rotaru)
Conference proceedings version:   Full Version (pdf)   Abstract   BibTex

- Provable Data Possession at Untrusted Stores
Proc. of The 14th ACM Conference on Computer and Communications Security
(CCS '07), Alexandria, VA, October 2007
(with Randal Burns, Giuseppe Ateniese, Joseph Herring, Lea Kissner, Zachary Peterson and Dawn Song)
Full version available as IACR ePrint report 2007/202 Full Version (pdf)  

- BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks
Proc. of The Fourth IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks
(SECON '07), San Diego, CA, June 2007
(with Cristina Nita-Rotaru)
Conference proceedings version:   Proceedings version (pdf)   Abstract   BibTex

- Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions
Proc. of The 13th ACM Conference on Computer and Communications Security
(CCS '06), Alexandria, VA, October 2006
(with Juan Garay, Seny Kamara and Rafail Ostrovsky)
Full version available as IACR ePrint report 2006/210 Full Version (pdf)  

- A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks
The Second Workshop on Cryptography for Ad Hoc Networks
(WCAN 2006), Venice (Italy), July 2006 (in conjunction with ICALP 2006)
(published in Electronic Notes in Theoretical Computer Science (ENTCS), Vol. 171, Issue 1, April 2007)
(with Seny Kamara)
Available files:   Full Version (pdf)   Abstract   BibTex

- On the Performance and Analysis of DNS Security Extensions
Proc of The Fourth International Conference on Cryptology and Network Security
(CANS 2005), Xiamen (China), December 2005; LNCS of Springer-Verlag
(with Giuseppe Ateniese and Aniello del Sorbo)
Available files:   Full Version (pdf)   Abstract   BibTex

- On the Survivability of Routing Protocols in Ad Hoc Wireless Networks
(or how to secure routing protocols for ad hoc wireless networks against Byzantine attacks)
Proc of The First IEEE Conference on Security and Privacy in Communication Networks
(SecureComm '05), Athens (Greece), September 2005
(with Baruch Awerbuch, David Holmer, Cristina Nita-Rotaru and Herbert Rubens)
Available files:   Proceedings Version (pdf)   Abstract   BibTex
Byzantine attack module for ns2

- Secure Multi-Hop Infrastructure Access
in NDSS 2005 Wireless and Mobile Security Workshop, San Diego, February 2005
(with Baruch Awerbuch, David Holmer, Cristina Nita-Rotaru and Herbert Rubens)
Available files:  

- ODSBR: An On-Demand Secure Byzantine Routing Protocol
Technical Report, October 2003.
(with Baruch Awerbuch, David Holmer, Cristina Nita-Rotaru and Herbert Rubens)
Available files:  

- Medical Information Privacy Assurance: Cryptographic and System Aspects
Proc. of The Third Conference on Security in Communication Networks (SCN 02), Amalfi (Italy), September 2002; LNCS of Springer-Verlag
(with Giuseppe Ateniese and Breno de Medeiros)
Available files:   Full Version (pdf)   Abstract   BibTex


Posters
- Secure Multicast Routing in Wireless Networks
in MOBICOM 2006, Poster, Los Angeles, CA, September 2006
(with Cristina Nita-Rotaru)
(published in ACM SIGMOBILE Mobile Computing and Communications Review (MC2R), Vol. 11, Issue 2, April 2007)