2014
- O. Ohrimenko, M. T. Goodrich, R. Tamassia, E. Upfal, The Melbourne Shuffle: Improving Oblivious Storage in the Cloud. Automata, Languages, and Programming (ICALP), LNCS 8573,
pp. 556–567, July 2014
2013
- C. Papamanthou, E. Shi, R. Tamassia, K. Yi, Streaming Authenticated Data
Structures. Advances in Cryptography (EUROCRYPT '13), LNCS 7881,
pp. 353–370, May 2013.
- C. Papamanthou, E. Shi, R. Tamassia, Signatures of Correct Computation. In Proceedings of
Theory of Cryptography Conference (TCC '13), pp. 222–242, Tokyo,
Japan, March 2013.
- J. Brown, O. Ohrimenko, R. Tamassia, Haze: Privacy-Preserving Real-Time Traffic Statistics.
CoRR abs/1309.3515 (2013).
2012
- M. T. Goodrich, D. Nguyen, O. Ohrimenko, C. Papamanthou, R.
Tamassia, N. Triandopoulos, C. V. Lopes, Efficient Verification of Web-Content Searching
Through Authenticated Web Crawlers. Proceedings of the VLDB
Endowment, 5(10): pp. 920–931, June 2012.
- M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, R. Tamassia, Practical oblivious storage. In Proceedings of the 2nd
ACM Conference on Data and Application Security and Privacy (CODASPY '12),
pp. 13–24, San Antonio, TX, USA, February 2012.
- J. Kelley, R. Tamassia, N. Triandopoulos, Hardening
Access Control and Data Protection in GFS-like File Systems. In Proceedings of the 17th European
Symposium on Research in Computer Security (ESORICS '12), LNCS 7459, pp.
19–36, September 2012.
- M. T. Goodrich, O. Ohrimenko, R. Tamassia, Graph Drawing in the Cloud: Privately Visualizing Relational Data
Using Small Working Storage.. In Proceedings of 20th
International Symposium on Graph Drawing (GD '12), LNCS 7704, pp.
43–54, September 2012.
- M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, R. Tamassia, Privacy-Preserving Group Data Access via Stateless Oblivious RAM
Simulation. ACM-SIAM Symposium on Discrete Algorithms (SODA
2012), pp. 157–167, Kyoto, Japan, January 2012.
- O. Ohrimenko, H. Reynolds, R. Tamassia, Authenticating Email Search Results.
In Proceedings of 8th International Workshop on Security and Trust
Management (STM '12), LNCS 7783, pp. 225–240, September 2012.
2011
- M. T. Goodrich, R. Tamassia, N. Triandopoulos, Efficient Authenticated Data Structures for Graph Connectivity and
Geometric Search Problems. Algorithmica 60(3), pp. 505–552,
2011.
- M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, R. Tamassia, Oblivious RAM Simulation with Efficient Worst-Case Access
Overhead. In Proceedings 3rd ACM Cloud Computing Security
Workshop (CCSW '11), pp. 95–100, Chicago, IL, USA 2011.
- C. Papamanthou, R. Tamassia, N. Triandopoulos, Optimal Verification of Operations on Dynamic Sets.
Advances in Cryptology (CRYPTO '11), LNCS 6841, pp. 91–110, 2011.
2010
- A. Lysyanskaya, R. Tamassia, N. Triandopoulos, Authenticated error-correcting codes with
applications to multicast authentication. ACM Transactions on
Information and Systems Security, 13(2), 2010.
- R. Tammasia, D. Yao, W. H. Winsborough, Independently Verifiable Decentralized
Role-Based Delegation. IEEE Transactions on Systems, Man, and
Cybernetics, Part A 40(6): pp. 1206–1219, 2010.
- R. Tamassia, N. Triandopoulos, Certification and Authentication of Data Structures. In
Proceedings of the 4th Alberto Mendelzon International Workshop on
Foundations of Data Management, Buenos Aires, Argentina, May 2010.
- D. Eppstein, M. T. Goodrich, R. Tamassia, Privacy-Preserving Data-Oblivious Geometric Algorithms for
Geographic Data. In Proceedings of the 18th ACM SIGSPATIAL
International Conference on Advances in Geographic Information Systems (ACM
SIGSPATIAL GIS '10), pp. 13–22, San Jose, CA, USA, November 2010.
- C. Papamanthou, R. Tamassia, N. Traindopoulos, Optimal Authenticated Data Structures with
Multilinear Forms. In Proceedings Pairing-Based Cryptography
(Pairing '10), LNCS 6487, pp. 246–264, 2010.
2009
- D. Yao, R. Tamassia, Compact and Anonymous Role-based Authorization
Chain. ACM Transactions on Information and System Security,
12(3), January 2009.
- C. C. Erway, A. Küpçü, C. Papamanthou, R.
Tamassia, Dynamic provable data possession. In
Proceedings of the 16th ACM Conference on Computer and Communications
Security (CCS '09), pp. 213–222, Chicago, IL, USA, November 2009.
- M. T. Goodrich, J. Z. Sun, R. Tamassia, N. Triandopoulos, Reliable Resource Searching in P2P
Networks.. In Proceedings Security and Privacy in Communication
Networks 2009 (SecureComm '09), pp. 437–447, Athens Greece, September
2009.
- M. T. Goodrich, R. Tamassia, J. Hasic, Efficient Dynamic and Distributed RSA Accumulator. CoRR
abs/0995.1307 (2009).
- C. Papamanthou, R. Tamassia, N. Triandopoulos, Cryptographic Accumulators for Authenticated Hash
Tables. IACR Cryptology ePrint Archive 2009: 625(2009)
2008
- M. T. Goodrich, R. Tamassia, D. Yao, Notarized federated ID management and authenticaiton.
Journal of Computer Security, 16(4):399–418, September 2008.
- D. Yao, K. B. Frikken, M. J. Atallah and R. Tamassia, Private
Information: To Reveal or not to Reveal. ACM Transactions on
Information System Security, 12(1):1–27, October 2008.
- C. Papamanthou, R. Tamassia and N. Triandopoulos, Authenticated Hash Tables. In Proceedings of ACM
Conference on Computer and Communications Security (CCS '08), pp. 437–448,
Alexandria VA, USA, October 2008.
- M. T. Goodrich, C. Papamanthou, R. Tamassia and N.
Triandopoulos, Athos: Efficient Authentication of Outsourced File
Systems. In Proceedings of Information Security Conference (ISC),
pp. 80–96, Springer, LNCS 5222, Taipei, Taiwan, September 2008.
- M. T. Goodrich, R. Tamassia and N. Triandopoulos,
Super-Efficient Verification of Dynamic Outsourced
Databases. In Proceedings of RSA Conference -
Cryptographers' Track (CT-RSA '08), pp. 407-424, Springer,
LNCS 4964, San Francisco CA, April 2008.
- R. Tamassia, B. Palazzi, C. Papamanthou, Graph Drawing for Security
Visualization. In Proceedings of 16th International Symposium on
Graph Drawing (GD '08), LNCS 5417, pp. 2–13, 2008.
- A. Heitzmann, B. Palazzi, C. Papamanthou, R. Tamassia, Efficient Integrity Checking of Untrusted
Network Storage. In Proceedings of 4th ACM International Workshop
on Storage Security and Survivability (StorageSS '08), ACM, Conference on
Computer and Communications Security, pp. 43–54, 2008.
- A. Heitzman, B. Palazzi, C. Papamanthou, R. Tamassia, Effective Visualization of File System Access
Control. In Proceedings of 5th International Workshop on
Visualization for Cyber Security, pp. 18–25, 2008.
2007
- R. Tamassia and N. Triandopoulos, Certification and
Authentication of Data Structures, 2007.
Manuscript.
- I. F. Cruz, R. Tamassia and D. Yao, Privacy-Preserving Schema Matching Using Mutual Information
(Extended Abstract), In Proceedings of the 21th Annual IFIP WG 11.3 Working
Conference on Data and Applications Security (DBSec '07). Redondo Beach, CA.
July 2007.
- D. Yao, R. Tamassia and S. Proctor, Private
Distributed Scalar Product Protocol With Application To Privacy-Preserving
Computation of Trust, In Proceedings of Joint Trust and PST
Conferences on Privacy, Trust Management and Security (IFIPTM '07). Moncton,
New Brunswick, Canada. July 2007.
- R. Tamassia and N. Triandopoulos, Efficient Content Authentication in Peer-to-Peer
Networks, In Proceedings of 5th International Conference on Applied
Cryptography and Network Security (ACNS '07), p. 354 -- 372, Springer, LNCS
4521, Zhuhai, China. June 2007.
- M. T. Goodrich, C. Papamanthou, and R. Tamassia, On the Cost of Persistence and Authentication
in Skip Lists, In Proceedings of the 7th International Workshop on
Experimental Algorithms (WEA '07). Rome, Italy. June 2007.
- D. Yao, Y. Koglin, E. Bertino and R. Tamassia, Decentralized authorization and data security in web content
delivery, In Proceedings of the 22nd Annual ACM Symposium on
Applied Computing (SAC '07). Seoul, Korea. March 2007.
2006
- M. T. Goodrich, R. Tamassia, and D. Yao, Notarized Federated Identity Management
for Web Service, In Proceedings of the 20th Annual IFIP WG
11.3 Working Conference on Data and Applications Security (DBSec '06).
Sophia Antipolis, France. July 2006. Full version.
- R. Tamassia and D. Yao, Cascaded Authorization with Anonymous-Signer
Aggregate Signatures, In Proceedings of the Seventh Annual IEEE
Systems, Man and Cybernetics Information Assurance Workshop (IAW '06).
United States Military Academy, West Point, New York. June 2006. Full version.
2004
- R. Tamassia and N. Triandopoulos, Efficient Content Authentication over
Distributed Hash Tables, Technical Report, Brown University,
November 2005.
- R. Tamassia and N. Triandopoulos, Computational Bounds on Hierarchical Data
Processing with Applications to Information Security, In
Proceedings of International Colloquium on Automata, Languages and
Programming (ICALP 2005) -- Security and Cryptography Foundations (Track C),
p. 153--165, Springer, LNCS 3580, July 2005.
2004
- A. Lysyanskaya, R. Tamassia and N. Triandopoulos, Multicast Authentication in Fully
Adversarial Networks, In Proceedings of IEEE Symposium on Security
and Privacy (SSP 2004), p. 241--255, Oakland, May 2004. Full version.
2003
- R. Tamassia and N. Triandopoulos, On the Cost of Authenticated Data
Structures, Technical Report, Brown University, 2003.
- M. T. Goodrich, M. Shin, R. Tamassia, W. H. Winsborough, Authenticated dictionaries for fresh attribute
credentials, Proc. Trust Management Conference, pages 332--347,
Springer, LNCS 2692, 2003.
- M. T. Goodrich, R. Tamassia, N. Triandopoulos and R. Cohen,
Authenticated Data Structures for Graph
and Geometric Searching, In Proceedings of RSA Conference -
Cryptographers' Track (CT-RSA '03), pages 295--313, Springer, LNCS 2612,
2003.
2002
- D. J. Polivy and R. Tamassia, Authenticating Distributed Data using Web
Services and XML Signatures, Proc. ACM Workshop on XML Security,
ACM Press, 2002.
- M. T. Goodrich, and R. Tamassia and J. Hasic, An Efficient Dynamic and Distributed Cryptographic
Accumulator, Proc. Information Security Conference (ISC 2002) Lecture
Notes in Computer Science, vol. 2433, Springer-Verlag, pp. 372-388,
2002.
2001
- R. Tamassia, Efficient
Low-Cost Authentication of Distributed Data and Transactions,
Conduit, vol. 10, no. 2, Department of Computer Science, Brown University,
2001.
- A. Anagnostopoulos, M. T. Goodrich, and R. Tamassia, Persistent Authenticated Dictionaries and Their
Applications, Proc. Information Security Conference (ISC 2001), Lecture Notes in Computer
Science, vol.
2200, Springer-Verlag, pp. 379-393, 2001.
- M. T. Goodrich, R. Tamassia, and A. Schwerin, Implementation of an Authenticated Dictionary
with Skip Lists and Commutative Hashing, Proc. DARPA Information
Survivability Conference and Exposition (DISCEX '01), IEEE Press, vol. 2,
pp. 68-82, 2001.
|
Faculty
Graduate Students
Undergraduate Students
Alumni
Collaborators
|