Provable data possession at untrusted stores G Ateniese, R Burns, R Curtmola, J Herring, L Kissner, Z Peterson, ... Proceedings of the 14th ACM conference on Computer and communications …, 2007 | 4006 | 2007 |
Searchable symmetric encryption: improved definitions and efficient constructions R Curtmola, J Garay, S Kamara, R Ostrovsky Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 3363 | 2006 |
MR-PDP: Multiple-replica provable data possession R Curtmola, O Khan, R Burns, G Ateniese 2008 the 28th international conference on distributed computing systems, 411-420, 2008 | 757 | 2008 |
Remote data checking using provable data possession G Ateniese, R Burns, R Curtmola, J Herring, O Khan, L Kissner, ... ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-34, 2011 | 540 | 2011 |
Fostering participaction in smart cities: a geo-social crowdsensing platform G Cardone, L Foschini, P Bellavista, A Corradi, C Borcea, M Talasila, ... IEEE Communications Magazine 51 (6), 112-119, 2013 | 399 | 2013 |
Remote data checking for network coding-based distributed storage systems B Chen, R Curtmola, G Ateniese, R Burns Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 31-42, 2010 | 311 | 2010 |
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks B Awerbuch, R Curtmola, D Holmer, C Nita-Rotaru, H Rubens ACM Transactions on Information and System Security (TISSEC) 10 (4), 1-35, 2008 | 255 | 2008 |
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks J Dong, R Curtmola, C Nita-Rotaru Proceedings of the second ACM conference on Wireless network security, 111-122, 2009 | 161 | 2009 |
Robust remote data checking R Curtmola, O Khan, R Burns Proceedings of the 4th ACM international workshop on Storage security and …, 2008 | 157 | 2008 |
Mitigating byzantine attacks in ad hoc wireless networks B Awerbuch, R Curtmola, D Holmer, C Nita-Rotaru, H Rubens Department of Computer Science, Johns Hopkins University, Tech. Rep. Version …, 2004 | 124 | 2004 |
Secure network coding for wireless mesh networks: Threats, challenges, and directions J Dong, R Curtmola, C Nita-Rotaru Computer Communications 32 (17), 1790-1801, 2009 | 109 | 2009 |
On the survivability of routing protocols in ad hoc wireless networks B Awerbuch, R Curtmola, D Holmer, H Rubens, C Nita-Rotaru First International Conference on Security and Privacy for Emerging Areas in …, 2005 | 98 | 2005 |
BSMR: Byzantine-resilient secure multicast routing in multihop wireless networks R Curtmola, C Nita-Rotaru IEEE Transactions on Mobile Computing 8 (4), 445-459, 2008 | 94 | 2008 |
Link: Location verification through immediate neighbors knowledge M Talasila, R Curtmola, C Borcea Mobile and Ubiquitous Systems: Computing, Networking, and Services: 7th …, 2012 | 77 | 2012 |
Robust dynamic provable data possession B Chen, R Curtmola 2012 32nd International Conference on Distributed Computing Systems …, 2012 | 74 | 2012 |
Improving location reliability in crowd sensed data with minimal efforts M Talasila, R Curtmola, C Borcea 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC), 1-8, 2013 | 66 | 2013 |
Medical information privacy assurance: Cryptographic and system aspects G Ateniese, R Curtmola, B De Medeiros, D Davis Security in Communication Networks: Third International Conference, SCN 2002 …, 2003 | 61 | 2003 |
Avatar: Mobile distributed computing in the cloud C Borcea, X Ding, N Gehani, R Curtmola, MA Khan, H Debnath 2015 3rd IEEE International Conference on Mobile Cloud Computing, Services …, 2015 | 54 | 2015 |
Toward secure network coding in wireless networks: Threats and challenges J Dong, R Curtmola, R Sethi, C Nita-Rotaru 2008 4th workshop on secure network protocols, 33-38, 2008 | 53 | 2008 |
Secure high-throughput multicast routing in wireless mesh networks J Dong, R Curtmola, C Nita-Rotaru IEEE Transactions on mobile computing 10 (5), 653-668, 2010 | 50 | 2010 |