default search action
Reza Curtmola
Person information
- affiliation: New Jersey Institute of Technology, Newark, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j21]Hammad Afzali, Santiago Torres-Arias, Reza Curtmola, Justin Cappos:
Towards verifiable web-based code review systems. J. Comput. Secur. 31(2): 153-184 (2023) - 2022
- [j20]Anrin Chakraborti, Reza Curtmola, Jonathan Katz, Jason Nieh, Ahmad-Reza Sadeghi, Radu Sion, Yinqian Zhang:
Cloud Computing Security: Foundations and Research Directions. Found. Trends Priv. Secur. 3(2): 103-213 (2022) - [j19]Abeer Hakeem, Reza Curtmola, Xiaoning Ding, Cristian Borcea:
DFPS: A Distributed Mobile System for Free Parking Assignment. IEEE Trans. Mob. Comput. 21(12): 4279-4295 (2022) - [c44]Sangat Vaidya, Santiago Torres-Arias, Justin Cappos, Reza Curtmola:
Bootstrapping Trust in Community Repository Projects. SecureComm 2022: 450-469 - [c43]Mojtaba Zaheri, Yossi Oren, Reza Curtmola:
Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses. USENIX Security Symposium 2022: 1505-1523 - 2021
- [c42]Mojtaba Zaheri, Reza Curtmola:
Leakuidator: Leaky Resource Attacks and Countermeasures. SecureComm (2) 2021: 143-163 - 2020
- [j18]Hammad Afzali, Santiago Torres-Arias, Reza Curtmola, Justin Cappos:
Towards adding verifiability to web-based Git repositories. J. Comput. Secur. 28(4): 405-436 (2020) - [j17]Nafize Rabbani Paiker, Jianchen Shan, Cristian Borcea, Narain Gehani, Reza Curtmola, Xiaoning Ding:
Design and Implementation of an Overlay File System for Cloud-Assisted Mobile Apps. IEEE Trans. Cloud Comput. 8(1): 97-111 (2020) - [j16]Chang Guo, Demin Li, Guanglin Zhang, Xiaoning Ding, Reza Curtmola, Cristian Borcea:
Dynamic Interior Point Method for Vehicular Traffic Optimization. IEEE Trans. Veh. Technol. 69(5): 4855-4868 (2020)
2010 – 2019
- 2019
- [j15]Hillol Debnath, Mohammad A. Khan, Nafize R. Paiker, Xiaoning Ding, Narain Gehani, Reza Curtmola, Cristian Borcea:
The Moitree middleware for distributed mobile-cloud computing. J. Syst. Softw. 157 (2019) - [c41]Iraklis Leontiadis, Reza Curtmola:
Auditable Compressed Storage. ISC 2019: 67-86 - [c40]Abeer Hakeem, Narain Gehani, Xiaoning Ding, Reza Curtmola, Cristian Borcea:
Multi-destination vehicular route planning with parking and traffic constraints. MobiQuitous 2019: 298-307 - [c39]Sangat Vaidya, Santiago Torres-Arias, Reza Curtmola, Justin Cappos:
Commit Signatures for Centralized Version Control Systems. SEC 2019: 359-373 - [c38]Santiago Torres-Arias, Hammad Afzali, Trishank Karthik Kuppusamy, Reza Curtmola, Justin Cappos:
in-toto: Providing farm-to-table guarantees for bits and bytes. USENIX Security Symposium 2019: 1393-1410 - [i3]Iraklis Leontiadis, Reza Curtmola:
Auditable Compressed Storage. IACR Cryptol. ePrint Arch. 2019: 1143 (2019) - 2018
- [c37]Hammad Afzali, Santiago Torres-Arias, Reza Curtmola, Justin Cappos:
le-git-imate: Towards Verifiable Web-based Git Repositories. AsiaCCS 2018: 469-482 - [c36]Nafize R. Paiker, Xiaoning Ding, Reza Curtmola, Cristian Borcea:
Context-Aware File Discovery System for Distributed Mobile-Cloud Apps. CloudCom 2018: 198-203 - [c35]Iraklis Leontiadis, Reza Curtmola:
Secure Storage with Replication and Transparent Deduplication. CODASPY 2018: 13-23 - [c34]Hillol Debnath, Giacomo Gezzi, Antonio Corradi, Narain Gehani, Xiaoning Ding, Reza Curtmola, Cristian Borcea:
Collaborative Offloading for Distributed Mobile-Cloud Apps. MobileCloud 2018: 87-94 - [c33]Hillol Debnath, Narain Gehani, Xiaoning Ding, Reza Curtmola, Cristian Borcea:
Sentio: Distributed Sensor Virtualization for Mobile Apps. PerCom 2018: 1-9 - 2017
- [j14]Bo Chen, Reza Curtmola:
Remote data integrity checking with server-side repair. J. Comput. Secur. 25(6): 537-584 (2017) - [c32]Abeer Hakeem, Narain Gehani, Reza Curtmola, Xiaoning Ding, Cristian Borcea:
Cooperative system for free parking assignment. VNC 2017: 319-326 - 2016
- [j13]Manoop Talasila, Reza Curtmola, Cristian Borcea:
Crowdsensing in the Wild with Aliens and Micropayments. IEEE Pervasive Comput. 15(1): 68-77 (2016) - [c31]Sheetal Rajgure, Vincent Oria, Krithika Raghavan, Hardik Dasadia, Sai Shashank Devannagari, Reza Curtmola, James Geller, Pierre Gouton, Edina Renfro-Michel, Soon Ae Chun:
UCS: Ultimate course search. CBMI 2016: 1-3 - [c30]Sheetal Rajgure, Krithika Raghavan, Vincent Oria, Reza Curtmola, Edina Renfro-Michel, Pierre Gouton:
Indexing multimedia learning materials in ultimate course search. CBMI 2016: 1-6 - [c29]Abeer Hakeem, Narain Gehani, Xiaoning Ding, Reza Curtmola, Cristian Borcea:
On-The-Fly Curbside Parking Assignment. MobiCASE 2016: 1-10 - [c28]Mohammad A. Khan, Hillol Debnath, Nafize R. Paiker, Narain Gehani, Xiaoning Ding, Reza Curtmola, Cristian Borcea:
Moitree: A Middleware for Cloud-Assisted Mobile Distributed Apps. MobileCloud 2016: 21-30 - [c27]Jianchen Shan, Nafize R. Paiker, Xiaoning Ding, Narain H. Gehani, Reza Curtmola, Cristian Borcea:
An Overlay File System for cloud-assisted mobile applications. MSST 2016: 1-14 - [c26]Nora Almalki, Reza Curtmola, Xiaoning Ding, Narain H. Gehani, Cristian Borcea:
P2F2: Privacy-preserving face finder. Sarnoff Symposium 2016: 214-219 - [c25]Santiago Torres-Arias, Anil Kumar Ammula, Reza Curtmola, Justin Cappos:
On Omitting Commits and Committing Omissions: Preventing Git Metadata Tampering That (Re)introduces Software Vulnerabilities. USENIX Security Symposium 2016: 379-395 - 2015
- [j12]Manoop Talasila, Reza Curtmola, Cristian Borcea:
Collaborative Bluetooth-based location authentication on smart phones. Pervasive Mob. Comput. 17: 43-62 (2015) - [c24]Bo Chen, Anil Kumar Ammula, Reza Curtmola:
Towards Server-side Repair for Erasure Coding-based Distributed Storage Systems. CODASPY 2015: 281-288 - [c23]Cristian Borcea, Xiaoning Ding, Narain Gehani, Reza Curtmola, Mohammad A. Khan, Hillol Debnath:
Avatar: Mobile Distributed Computing in the Cloud. MobileCloud 2015: 151-156 - 2014
- [c22]Manoop Talasila, Reza Curtmola, Cristian Borcea:
Alien vs. Mobile user game: Fast and efficient area coverage in crowdsensing. MobiCASE 2014: 65-74 - [c21]Bo Chen, Reza Curtmola:
Auditable Version Control Systems. NDSS 2014 - 2013
- [j11]Giuseppe Cardone, Luca Foschini, Paolo Bellavista, Antonio Corradi, Cristian Borcea, Manoop Talasila, Reza Curtmola:
Fostering participaction in smart cities: a geo-social crowdsensing platform. IEEE Commun. Mag. 51(6) (2013) - [j10]Manoop Talasila, Reza Curtmola, Cristian Borcea:
ILR: Improving Location Reliability in Mobile Crowd Sensing. Int. J. Bus. Data Commun. Netw. 9(4): 65-85 (2013) - [c20]Bo Chen, Reza Curtmola:
Towards self-repairing replication-based storage systems using untrusted clouds. CODASPY 2013: 377-388 - [c19]Manoop Talasila, Reza Curtmola, Cristian Borcea:
Improving location reliability in crowd sensed data with minimal efforts. WMNC 2013: 1-8 - 2012
- [j9]Jing Dong, Reza Curtmola, Cristina Nita-Rotaru, David K. Y. Yau:
Pollution Attacks and Defenses in Wireless Interflow Network Coding Systems. IEEE Trans. Dependable Secur. Comput. 9(5): 741-755 (2012) - [c18]Bo Chen, Reza Curtmola:
Robust dynamic remote data checking for public clouds. CCS 2012: 1043-1045 - [c17]Bo Chen, Reza Curtmola:
Robust Dynamic Provable Data Possession. ICDCS Workshops 2012: 515-525 - [c16]Andrew Newell, Reza Curtmola, Cristina Nita-Rotaru:
Entropy attacks and countermeasures in wireless network coding. WISEC 2012: 185-196 - 2011
- [j8]Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky:
Searchable symmetric encryption: Improved definitions and efficient constructions. J. Comput. Secur. 19(5): 895-934 (2011) - [j7]Jing Dong, Reza Curtmola, Cristina Nita-Rotaru:
Practical defenses against pollution attacks in wireless network coding. ACM Trans. Inf. Syst. Secur. 14(1): 7:1-7:31 (2011) - [j6]Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Osama Khan, Lea Kissner, Zachary N. J. Peterson, Dawn Song:
Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. 14(1): 12:1-12:34 (2011) - [j5]Jing Dong, Reza Curtmola, Cristina Nita-Rotaru:
Secure High-Throughput Multicast Routing in Wireless Mesh Networks. IEEE Trans. Mob. Comput. 10(5): 653-668 (2011) - [r4]Cristina Nita-Rotaru, Reza Curtmola:
Secure Network Coding for Wireless Mesh Networks. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1123-1126 - [r3]Cristina Nita-Rotaru, Jing Dong, Reza Curtmola:
Secure Routing in Wireless Mesh Networks. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1126-1130 - [r2]Cristina Nita-Rotaru, Reza Curtmola, Jing Dong:
Security of Group Communication in Wireless Mesh Networks. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1159-1163 - [r1]Reza Curtmola, Jing Dong, Cristina Nita-Rotaru:
Security of Wireless Mesh Networks (General Overview). Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1163-1167 - 2010
- [c15]Bo Chen, Reza Curtmola, Giuseppe Ateniese, Randal C. Burns:
Remote data checking for network coding-based distributed storage systems. CCSW 2010: 31-42 - [c14]Manoop Talasila, Reza Curtmola, Cristian Borcea:
LINK: Location Verification through Immediate Neighbors Knowledge. MobiQuitous 2010: 210-223 - [c13]Reza Curtmola, Jing Dong, Cristina Nita-Rotaru:
Tradeoffs between security and communication performance in wireless mesh networks. WOWMOM 2010: 1-6 - [e1]Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, Francesc Sebé:
Financial Cryptography and Data Security, FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6054, Springer 2010, ISBN 978-3-642-14991-7 [contents]
2000 – 2009
- 2009
- [j4]Jing Dong, Reza Curtmola, Cristina Nita-Rotaru:
Secure network coding for wireless mesh networks: Threats, challenges, and directions. Comput. Commun. 32(17): 1790-1801 (2009) - [j3]Reza Curtmola, Cristina Nita-Rotaru:
BSMR: Byzantine-Resilient Secure Multicast Routing in Multihop Wireless Networks. IEEE Trans. Mob. Comput. 8(4): 445-459 (2009) - [c12]Jing Dong, Reza Curtmola, Cristina Nita-Rotaru:
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks. WISEC 2009: 111-122 - 2008
- [j2]Baruch Awerbuch, Reza Curtmola, David Holmer, Cristina Nita-Rotaru, Herbert Rubens:
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks. ACM Trans. Inf. Syst. Secur. 10(4): 6:1-6:35 (2008) - [c11]Reza Curtmola, Osama Khan, Randal C. Burns, Giuseppe Ateniese:
MR-PDP: Multiple-Replica Provable Data Possession. ICDCS 2008: 411-420 - [c10]Jing Dong, Reza Curtmola, Cristina Nita-Rotaru:
On the Pitfalls of High-Throughput Multicast Metrics in Adversarial Wireless Mesh Networks. SECON 2008: 224-232 - [c9]Reza Curtmola, Osama Khan, Randal C. Burns:
Robust remote data checking. StorageSS 2008: 63-68 - 2007
- [j1]Reza Curtmola, Cristina Nita-Rotaru:
Secure multicast routing in wireless networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 11(2): 55-56 (2007) - [c8]Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, Dawn Xiaodong Song:
Provable data possession at untrusted stores. CCS 2007: 598-609 - [c7]Reza Curtmola, Cristina Nita-Rotaru:
BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks. SECON 2007: 263-272 - [i2]Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, Dawn Song:
Provable Data Possession at Untrusted Stores. IACR Cryptol. ePrint Arch. 2007: 202 (2007) - 2006
- [c6]Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky:
Searchable symmetric encryption: improved definitions and efficient constructions. CCS 2006: 79-88 - [c5]Baruch Awerbuch, Robert G. Cole, Reza Curtmola, David Holmer, Herbert Rubens:
Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol. ESAS 2006: 98-112 - [c4]Reza Curtmola, Seny Kamara:
A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks. WCAN@ICALP 2006: 57-69 - [i1]Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky:
Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. IACR Cryptol. ePrint Arch. 2006: 210 (2006) - 2005
- [c3]Reza Curtmola, Aniello Del Sorbo, Giuseppe Ateniese:
On the Performance and Analysis of DNS Security Extensions. CANS 2005: 288-303 - [c2]Baruch Awerbuch, Reza Curtmola, David Holmer, Herbert Rubens, Cristina Nita-Rotaru:
On the Survivability of Routing Protocols in Ad Hoc Wireless Networks. SecureComm 2005: 327-338 - 2002
- [c1]Giuseppe Ateniese, Reza Curtmola, Breno de Medeiros, Darren Davis:
Medical Information Privacy Assurance: Cryptographic and System Aspects. SCN 2002: 199-218
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 21:40 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint