Follow
Reza Curtmola
Reza Curtmola
Professor of Computer Science, New Jersey Institute of Technology (NJIT)
Verified email at njit.edu - Homepage
Title
Cited by
Cited by
Year
Provable data possession at untrusted stores
G Ateniese, R Burns, R Curtmola, J Herring, L Kissner, Z Peterson, ...
Proceedings of the 14th ACM conference on Computer and communications …, 2007
40992007
Searchable symmetric encryption: improved definitions and efficient constructions
R Curtmola, J Garay, S Kamara, R Ostrovsky
Proceedings of the 13th ACM conference on Computer and communications …, 2006
34722006
MR-PDP: Multiple-replica provable data possession
R Curtmola, O Khan, R Burns, G Ateniese
2008 the 28th international conference on distributed computing systems, 411-420, 2008
7652008
Remote data checking using provable data possession
G Ateniese, R Burns, R Curtmola, J Herring, O Khan, L Kissner, ...
ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-34, 2011
5502011
Fostering participaction in smart cities: a geo-social crowdsensing platform
G Cardone, L Foschini, P Bellavista, A Corradi, C Borcea, M Talasila, ...
IEEE Communications Magazine 51 (6), 112-119, 2013
4032013
Remote data checking for network coding-based distributed storage systems
B Chen, R Curtmola, G Ateniese, R Burns
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 31-42, 2010
3152010
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
B Awerbuch, R Curtmola, D Holmer, C Nita-Rotaru, H Rubens
ACM Transactions on Information and System Security (TISSEC) 10 (4), 1-35, 2008
2622008
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
J Dong, R Curtmola, C Nita-Rotaru
Proceedings of the second ACM conference on Wireless network security, 111-122, 2009
1612009
Robust remote data checking
R Curtmola, O Khan, R Burns
Proceedings of the 4th ACM international workshop on Storage security and …, 2008
1582008
Mitigating byzantine attacks in ad hoc wireless networks
B Awerbuch, R Curtmola, D Holmer, C Nita-Rotaru, H Rubens
Department of Computer Science, Johns Hopkins University, Tech. Rep. Version …, 2004
1272004
Secure network coding for wireless mesh networks: Threats, challenges, and directions
J Dong, R Curtmola, C Nita-Rotaru
Computer Communications 32 (17), 1790-1801, 2009
1102009
On the survivability of routing protocols in ad hoc wireless networks
B Awerbuch, R Curtmola, D Holmer, H Rubens, C Nita-Rotaru
First International Conference on Security and Privacy for Emerging Areas in …, 2005
992005
BSMR: Byzantine-resilient secure multicast routing in multihop wireless networks
R Curtmola, C Nita-Rotaru
IEEE Transactions on Mobile Computing 8 (4), 445-459, 2008
962008
Link: Location verification through immediate neighbors knowledge
M Talasila, R Curtmola, C Borcea
Mobile and Ubiquitous Systems: Computing, Networking, and Services: 7th …, 2012
792012
Robust dynamic provable data possession
B Chen, R Curtmola
2012 32nd International Conference on Distributed Computing Systems …, 2012
742012
Improving location reliability in crowd sensed data with minimal efforts
M Talasila, R Curtmola, C Borcea
6th Joint IFIP Wireless and Mobile Networking Conference (WMNC), 1-8, 2013
662013
Medical information privacy assurance: Cryptographic and system aspects
G Ateniese, R Curtmola, B De Medeiros, D Davis
Security in Communication Networks: Third International Conference, SCN 2002 …, 2003
612003
Avatar: Mobile distributed computing in the cloud
C Borcea, X Ding, N Gehani, R Curtmola, MA Khan, H Debnath
2015 3rd IEEE International Conference on Mobile Cloud Computing, Services …, 2015
542015
Toward secure network coding in wireless networks: Threats and challenges
J Dong, R Curtmola, R Sethi, C Nita-Rotaru
2008 4th workshop on secure network protocols, 33-38, 2008
532008
Secure high-throughput multicast routing in wireless mesh networks
J Dong, R Curtmola, C Nita-Rotaru
IEEE Transactions on mobile computing 10 (5), 653-668, 2010
522010
The system can't perform the operation now. Try again later.
Articles 1–20