Theses

Ensuring Specification Compliance, Robustness, and Security of Wireless Network Protocols. Endadul Hoque. Ph.D. Thesis, Dec 2015. [PDF].
Automated Performance Attack Discovery in Distributed System Implementations Hyojeong Lee. Ph.D. Thesis, Sep 2014. [PDF].
Achieving Resilient Networks with Diversity and Network Coding. Andrew Newell. Ph.D. Thesis, Aug 2014. [PDF].
Data-Driven Approaches to Improve Dependability of Cloud Services. Rahul Potharaju. Ph.D. Thesis, May 2014. [PDF].
Security and Economic Implications of Localizing Traffic in Overlay Networks Jeff Seibert. Ph.D. Thesis, May 2012. [PDF].
A Platform for Creating Efficient, Robust, and Resilient Peer-to-peer Systems. David Zage. Ph.D. Thesis, May 2010. [PDF].
Secure and Robust Communication in Wireless Mesh Networks. Jing Dong. Ph.D. Thesis, Dec. 2009. [PDF].
New Designs for Improving the Efficiency and Resilience of Natural Language Watermarking, Ph.D. Thesis, Department of Computer Science, Purdue University, August 2007. Mercan Topkara. [PDF].
Mitigating Attacks Against Adaptation Mechanisms in Overlay Networks, Master Thesis, Department of Computer Science, Purdue University, May 2006. AAron Walters. [PDF].


Journals

Toward a Taxonomy and Attacker Model for Secure Routing Protocols. M. Hollick, C. Nita-Rotaru, P. Papadimitratos, A. Perrig, Stefan Schmid. In ACM SIGCOMM Computer Communication Review, Volume 47 Issue 1, January 2017. [PDF]
Adversarial Testing of Wireless Routing Implementations. E. Hoque, H. Lee, R. Potharaju, C. Killian. and C. Nita-Rotaru. In IEEE/ACM Transactions on Networking, vol. 24, issue 6, 2016. [PDF]
Gatling: Automatic Performance Attack Discovery in Large-Scale Distributed Systems. H. Lee, J. Seibert, D. Fistrovic, C. Killian, and C. Nita-Rotaru. ACM Transactions on Systems and Information Security, issue 4, vol. 17. April 2015. [PDF]
Security of Electrostatic Field Persistent Routing: Attacks and Defense Mechanisms. O. C. Ghica, C. Nita-Rotaru, G. Trajcevsky, and P. Scheuermann. Elsevier Journal of Ad Hoc Networks, vol. 36, part 1, Jan. 2016.
Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes. A. Newell, D. Obenshain, T. Tantillo, C. Nita-Rotaru, and Y. Amir. IEEE Transactions on Dependable and Secure Systems, vol. 12, issue 6, Nov-Dec. 2015.
Closing the Pandora's Box: Defenses for Thwarting Epidemic Outbreaks in Mobile Adhoc Networks. R. Potharaju, E. Hoque, C. Nita-Rotaru, S. S. Venkatesh, and S. Sarkar. Elsevier Journal of Ad Hoc Networks, vol. 24, Jan. 2015.
Node-Capture Resilient Key Establishment in Sensor Networks: Design Space and New Protocols. A. Newell, H. Yao, A. Ryker, T. Ho, and C. Nita-Rotaru. ACM Computing Surveys, vol. 47, issue 2, December 2014.
Generating Summary Risk Scores for Mobile Applications. H. Peng, C. Gates, B. Sarma, N. Li, A. Qi, R. Potharaju, C. Nita-Rotaru and I. Molloy. [PDF]
Newton: Securing Virtual Coordinates by Enforcing Physical Laws. J. Seibert, S. Becker, C. Nita-Rotaru and R. State. IEEE/ACM Transactions on Networking, vol. 22, issue 3, June 2014. [PDF]
EFW: A Cross-Layer Metric for Reliable Routing in Wireless Mesh Networks with Selfish Participants. S. Paris, A. Capone, F. Martignon, and C. Nita-Rotaru. IEEE/ACM Transactions on Networking, vol. 21, issue 3, June 2013. [PDF]
On the Practicality of Cryptographic Defenses against Pollution Attacks in Wireless Network Coding. Andrew Newell, Jing Dong, and Cristina Nita-Rotaru. ACM Computing Surveys, vol. 45, issue 3, June 2013. [PDF]
Pollution Attacks and Defense in Inter-flow Network Coding Systems. J. Dong, R. Curtmola, C. Nita-Rotaru, and D. Yau. In IEEE Transactions on Dependable and Secure Systems, vol. 9 , issue 5, 2012. [PDF]
The Internet-wide Impact of P2P Traffic Localization on ISP Profitability. J. Seibert, R. Torres, M. Maffiano, M. Mella, C. Nita-Rotaru, and S. Rao. In IEEE/ACM Transactions on Networking, Dec. 2012. [PDF]
A Design for Securing Data Delivery in Mesh-Based Peer-to-Peer Streaming. J. Seibert, X. Sun, C. Nita-Rotaru, and S. Rao. Computer Networks, vol. 55, no. 12, August 2011. [PDF]
Practical Defenses Against Pollution Attacks in Wireless Network Coding. J. Dong, R. Curtmola, and C. Nita-Rotaru. In ACM Transactions on Systems and Information Security, vol. 14 no. 1, May 2011. [PDF]
Secure High-Throughput Multicast Routing in Wireless Mesh Networks. J. Dong, R. Curtmola, and C. Nita-Rotaru. In ACM Transactions on Mobile Computing, vol. 10 no. 5, May 2011. [PDF]
Robust Decentralized Virtual Coordinate Systems in Adversarial Environments. D. Zage and C. Nita-Rotaru. In ACM Transactions on Systems and Information Security, vol. 13, issue 4, December 2010. [PDF]
Mitigating Attacks against Virtual Coordinate System Based Routing in Wireless Sensor Networks. J. Dong, E. Ackermann, B. Bhavar, and C. Nita-Rotaru. In Transactions on Sensor Networks, vol 6., issue 4, 2010. [PDF]
Secure Network Coding for Wireless Mesh Networks: Threats, Challenges, and Directions. J. Dong, R. Curtmola, and C. Nita-Rotaru. In Computer Communications (Elsevier), vol.32. no. 17, November 2009. [PDF]
UNMASK: Utilizing Neighbor Monitoring for Attack Mitigation in Multihop Wireless Sensor Networks. I. Khalil, S. Bagchi, C. Nita-Rotaru, and N. B Schroff. In Journal of Ad Hoc and Sensor Networks}, pp. 148 -- 164, vol. 8, issue 2, March 2010. [PDF]
Secure Group Communication in Wireless Mesh Networks. J. Dong, K. E. Ackermann, C. Nita-Rotaru. In Ad Hoc Networks Journal (Elsevier), Special Issue: Privacy and Security in Wireless Sensor and Ad Hoc Networks, vol. 7, no. 8, November 2009. [PDF]
BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks. R. Curtmola and C. Nita-Rotaru. In IEEE Transactions on Mobile Computing (TMC), vol. 8, no. 4, April 2009. [PDF]
STEWARD: Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks. Y. Amir, C. Danilov, D. Dolev, J. Kirsch, J. Lane, C. Nita-Rotaru, J. Olsen, and D. Zage. In IEEE Transactions on Dependable and Secure Computing, vol. 7, no.1, Jan. 2010. [PDF]
A Survey of Attack and Defense Techniques for Reputation Systems K. Hoffman, D. Zage and C. Nita-Rotaru. In ACM Computing Surveys, vol. 42, no. 1, March 2010. [PDF].
A Framework for Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks. A. Walters, D. Zage and C. Nita-Rotaru. In IEEE/ACM Transactions on Networking, vol. 16, no. 6, Dec. 2008. [PDF].
Virtual Classroom Extension for Effective Distance Education. C. Jia, R. Dondera, V. Popescu, C. Nita-Rotaru, M. Dark, and C. S. York. In IEEE Computer Graphics and Applications, Jan./Feb. 2008. [PDF]
JANUS: A Framework for Scalable and Secure Routing in Hybrid Wireless Networks. B. Carbunar, I. Ioannidis and C. Nita-Rotaru. In IEEE Transactions on Dependable and Secure Systems (TDSC), vol. 6, no.4, 2009. [PDF].
Enabling Confidentiality of Data Delivery in an Overlay Broadcasting System. R. Torres X. Sun, A. Walters, C. Nita-Rotaru and S. Rao. In Special Issue of IEEE JSAC on Advances in Peer-to-Peer Streaming Systems, vol. 25, no. 9, December 2007. [PDF].
ODSBR: An On-Demand Secure Byzantine Resilient Routing Protocol for Wireless Ad Hoc Networks. Baruch Awerbuch, Reza Curtmola, David Holmer, Cristina Nita-Rotaru and Herbert Rubens. In ACM Transactions on Information Systems Security (TISSEC), vol. 10. no.4, January 2008. [PDF].
Secure Spread: An Integrated Architecture for Secure Group Communication Yair Amir, Cristina Nita-Rotaru , Jonathan Stanton and Gene Tzudik. In IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 2, no. 3, August 2005.[PDF].
On the Performance of Group Key Agreement Protocols. Yair Amir,Yongdae Kim,Cristina Nita-Rotaru, and Gene Tsudik. ACM Transactions on Information Systems Security (TISSEC), vol. 7, no. 3, August 2004. [PDF].
Secure Group Communication Using Robust Contributory Key Agreement. Yair Amir, Yongdae Kim,Cristina Nita-Rotaru,John Schultz, Jonathan Stanton, and Gene Tsudik. IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 15, no. 5, pp. 468-480, May 2004. [PDF].
Secure Group Communication Using Robust Contributory Key Agreement. IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 15, no. 5, pp. 468-480, May 2004. Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, John Schultz, Jonathan Stanton, and Gene Tsudik. [PDF].
On the Performance of Group Key Agreement Protocols. ACM Transactions on Information Systems Security (TISSEC), vol. 7, no. 3, August 2004. Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, and Gene Tsudik. [PDF].
Secure Spread: An Integrated Architecture for Secure Group Communication Yair Amir, Cristina Nita-Rotaru , Jonathan Stanton and Gene Tzudik. In IEEE Transactions on Dependable and Secure Computing, vol. 2, no. 3, August 2005.[PDF]. Also Technical Report June 2004.


Conferences and Workshops

Taking a Long Look at QUIC: An Approach for Rigorous Evaluation of Rapidly Evolving Transport Protocols. Arash Molavi Kakhki, Samuel Jero, David Choffnes, Alan Mislove, Cristina Nita-Rotaru. IMC 2017, Nov. 2017. [PDF]
Chizpurfle: A Gray-Box Android Fuzzer for Vendor Service Customizations Antonio Ken Iannillo, Roberto Natella, Domenico Cotroneo, Cristina Nita-Rotaru. IEEE ISSRE 2017, September 2017.
BEADS: Automated Attack Discovery in OpenFlow-based SDN Systems. Samuel Jero, Xiangyu Bu, Hamed Okhravi, Cristina Nita-Rotaru, Richard Skowyra, Sonia Fahmy. RAID 2017, September 2017. [PDF]
Identifier Binding Attacks and Defenses in Software-Defined Networks. Samuel Jero, William Koch, Richard Skowyra, Hamed Okhravi, Cristina Nita-Rotaru, David Bigelow. USENIX Security 2017, August 2017. [PDF]
Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs. Endadul Hoque, Omar Chowdhury, Sze Yiu Chau, Cristina Nita-Rotaru, Ninghui Li. DSN 2017, June 2017. [PDF]
SymCerts: Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation Implementations. Sze Yiu Chau, Omar Chowdhury, Endadul Hoque, Huangyi Ge, Aniket Kate, Cristina Nita-Rotaru, Ninghui Li. IEEE Security and Privacy, May 2017. [PDF]
Building Robust Distributed Systems and Network Protocols by Using Adversarial Testing and Behavioral Analysis. Endadul Hoque and Cristina Nita-Rotaru. IEEE Cybersecurity Development (SecDev), Nov. 2016. [PDF]
Practical Intrusion-Tolerant Networks. D. Obenshain, T. Tantillo, A. Baby, J. Schultz, A. Newell, E.Hoque, Y. Amir and C. Nita-Rotaru. ICDCS 2016, [PDF]
Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations. S. Jero, H. Lee, and C. Nita-Rotaru. In the 45th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), June 2015. Best paper award. [PDF] [BIBTEX]
ConfSeer: Leveraging Customer Support Knowledge Bases for Automated Misconfiguration Detection. R. Potharaju, J. Chan, L. Hu, C. Nita-Rotaru, M. Wang, L. Zhang, N. Jain. VLDB 2015, Industrial Track.
How Secure and Quick is QUIC? Provable Security and Performance Analyses. R. Lychev, S. Jero, A. Boldyreva, and C. Nita-Rotaru. 36th IEEE Symposium on Security and Privacy (Oakland), May 2015. Awarded IETF/IRTF Applied Networking Research Prize, 2016. [PDF]
On the Practicality of Integrity Attacks on Document-Level Sentiment Analysis. A. Newell, R. Potharaju. L. Xiang, and C. Nita-Rotaru. In the 7th ACM Workshop on Artificial Intelligence and Security (AISec) with the 21st ACM CCS, Nov. 2014. [PDF]
Turret: A Platform for Automated Attack Finding in Unmodified Distributed System Implementations Hyojeong Lee, Jeff Seibert, Md. Endadul Hoque, Charles Killian, and Cristina Nita-Rotaru. 34th International Conference on Distributed Computing Systems (ICDCS), Jun. 2014. [PDF] [BIBTEX]
Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes. Andrew Newell, Daniel Obenshain, Tom Tantillo, Cristina Nita-Rotuaru, and Yair Amir. In Proc. of The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013. [PDF] [BIBTEX] [Technical report]
Adversarial Testing of Wireless Routing Implementations Md. Endadul Hoque, Hyojeong Lee, Rahul Potharaju, Charles Killian, and Cristina Nita-Rotaru. 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), Apr. 2013 [PDF][BIBTEX]
Gatling: Automatic Attack Discovery in Large-Scale Distributed Systems Hyojeong Lee, Jeff Seibert, Charles Killian, and Cristina Nita-Rotaru. In Proc. of 19th Annual Network & Distributed System Security Symposium (NDSS), Feb. 2012. [PDF][BIBTEX]
Closing the Pandora's Box: Defenses for Thwarting Epidemic Outbreaks in Mobile Adhoc Networks. R. Potharaju, E. Hoque, C. Nita-Rotaru, S. S. Venkatesh, and S. Sarkar. In Proceedings of the 9th IEEE International Conference on Mobile Ad hoc and Sensor Systems (MASS 2012), Oct. 2012. [PDF][BIBTEX]
Using Probabilistic Generative Models For Ranking Risks of Android Apps. H. Peng, C. Gates, B. Sarma, N. Li, A. Qi, R. Potharaju, C. Nita-Rotaru and I. Molloy. In Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS 2012), pp 241-252, Oct. 2012. [PDF][BIBTEX]
Android Permissions: A Perspective Combining Risks and Benefits. Bhaskar Sarma, Ninghui Li, Chris Gates, Rahul Potharaju, Cristina Nita-Rotaru and Ian Molloy. In Proceedings of The ACM Symposium on Access Control Models and Technologies (SACMAT), 2012. [PDF] [BIBTEX]
Intrusion-Tolerant Cloud Monitoring and Control. Daniel Obenshain, Tom Tantillo, Andrew Newell, Cristina Nita-Rotaru and Yair Amir. In Proc. of Large-Scale Distributed Systems and Middleware (LADIS), 2012. [BIBTEX]
Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques. Rahul Potharaju, Andrew Newell, Cristina Nita-Rotaru, and Xiangyu Zhang. In Proceedings of International Symposium on Engineering Secure Software and Systems (ESSoS), 2012. [PDF][BIBTEX]
Applying Game Theory to Analyze Attacks and Defenses in Virtual Coordinate Systems. S. Becker, J. Seibert, D. Zage, C. Nita-Rotaru, and R. State. In International Conference on Dependable Systems and Networks (DSN), 2011.
Omnify: Investigating the Visibility and Effectiveness of Copyright Monitors. R. Potharaju, J. Seibert, S. Fahmy, and C. Nita-Rotaru. In Passive and Active Measurement Conference (PAM), 2011. [PDF]
Towards Securing Data Delivery in Peer-to-Peer Streaming. J. Seibert, X. Sun, C. Nita-Rotaru, and S. Rao. IEEE Conference on Communication Systems and Networks (COMSNETS), 2010. [PDF]
Practical Defenses Against Pollution Attacks in Intra-Flow Network Coding for Wireless Mesh Networks. J. Dong, R. Curtmola, C. Nita-Rotaru. In the Second ACM Conference on Wireless Network Security (WiSec), Zurich, Switzerland, March 2009.
Experimental Comparison of Peer-to-Peer Streaming Overlays: An Application perspective. J. Seibert, D. Zage, S. Fahmy and C. Nita-Rotaru. The 33rd IEEE Conference on Local Computer Networks (LCN), Montreal, Quebec, Canada, October 14 - 17, 2008. [PDF]
Toward Secure Network Coding in Wireless Networks: Threats and Challenges. J. Dong, R. Curtmola, R. Sethi, and C. Nita-Rotaru. In Proceedings of 4th Workshop on Secure Network Protocols (NPSEC) in conjunction with IEEE ICNP, Orlando, Florida, Oct 2008.
Mitigating Attacks against Virtual Coordinate System Based Routing in Wireless Sensor Networks. J. Dong, B. Bhavar, E. Ackermann and C. Nita-Rotaru. In First ACM Conference on Wireless Network Security (WiSec), Alexandria, VA, March 2008.
On the Pitfalls of Using High-Throughput Metrics in Adversarial Wireless Mesh Networks, J. Dong, R. Curtmola and C. Nita-Rotaru. In the Fifth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2008), San Francisco CA, June 2008.
Secure Group Communication in Wireless Mesh Networks. In Ninth IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WOWMOM), Newport Beach, CA, June, 2008. J. Dong, K. Ackermann, and Cristina Nita-Rotaru.
On the Accuracy of Decentralized Network Coordinate Systems in Adversarial Networks. D. Zage and C. Nita-Rotaru. In the 14th ACM CCS, Alexandria, VA, USA, October 29 - November 2, 2007. [PDF].
BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks. R. Curtmola and C. Nita-Rotaru. In SECON 2007, June 2007, San Diego, CA. [ PDF ]
Enabling Confidentiality of Data Delivery in an Overlay Broadcasting System. R. Torres X. Sun, A. Walters, C. Nita-Rotaru and S. Rao. In INFOCOM 2007, Anchorage, Alaska. [PDF]
Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks. AAron Walters, David Zage and Cristina Nita-Rotaru, The 14th IEEE International Conference on Network Protocols November (ICNP) 12-15, 2006 Santa Barbara, California. [PDF]
Steward: Scaling Byzantine Fault-Tolerant Systems to Wide Area Networks. Yair Amir, Claudiu Danilov, Danny Dolev, Jonathan Kirsch, John Lane, Cristina Nita-Rotaru, Josh Olsen, David Zage, In The International Conference on Dependable Systems and Networks (DSN-2006), Philadelphia, PA, June 2006. [PDF]. Also Technical Report CSD TR 05-029. [PDF] .
A Byzantine Resilient Distributed Position Service. Josh Olsen, David Zage and Cristina Nita-Rotaru. Extended Abstract. In The International Conference on Dependable Systems and Networks (DSN-2006), Philadelphia, PA, June 2006.
Po2V: Network Layer Position Verification in Multi-Hop Wireless Networks. In IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WOWMOM), Niagara Falls, NY June, 2006. Xiaoxin Wu and Cristina Nita-Rotaru.
On the Survivability of Routing Protocols in Ad Hoc Wireless Networks. In IEEE Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm) 2005, Sept. 2005. B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru and H. Rubens. [PDF].
DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks. In IEEE Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm) 2005, Sept. 2005. I. Khalil, S. Bagchi and C. Nita-Rotaru. [PDF].
On the Security of Distributed Position Services. In IEEE Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm) 2005, Sept. 2005. X. Wu and C. Nita-Rotaru. [PDF].
WiViD: Visible Watermak Based Defense Against Phishing. In International Workshop of Digital Watermarking (IWDW), Sept. 2005. A. Shamara, M. Topkara, M. Atallah and C. Nita-Rotaru. [PDF].
Network Layer Position Verification In MobiHoc 2005, Poster , Urbana-Champaign, IL, May 2005. Xiaoxin Wu and Cristina Nita-Rotaru.
SPASS: Scalable and Energy-Efficient Data Acquisition in Sensor Databases. In 4th International ACM Workshop on Data Engineering for Wireless and Mobile Access (MobiDe 2005) in conjunction with ACM SIGMOD/PODS. Baltimore, June 2005. M.H. Ali, Walid G. Aref and C. Nita-Rotaru. [PDF].
Scalable Routing in Hybrid Cellular and Ad-Hoc Networks. In IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, Taormina / Giardini Naxos, Italy June, 2005. Ioannis Ioannidis, Bogdan Carbunar, Cristina Nita-Rotaru. [PDF] [Extended Technical Report CSD TR# 05-006]
Secure Multi-Hop Infrastructure Access. In Wireless and Mobile Security Workshop, NDSS'05 Catamaran Resort HotelSan Diego, California, Feb. 2005. Baruch Awerbuch, Reza Curtmola, David Holmer, Cristina Nita-Rotaru and Herbert Rubens.
Synchronization Attacks Against 802.11. In Wireless and Mobile Security Workshop, NDSS'05 Catamaran Resort HotelSan Diego, California, Feb. 2005. Gunjan Khanna, Ammar Masood and Cristina Nita-Rotaru.
JANUS: Towards Robust and Malicious Resilient Routing in Hybrid Wireless Networks In Workshop in Wireless Security WiSe 2004, In conjunction with MOBICOM 2004, Philadelphia, PA, 2004 Bogdan Carbunar, Ioanis Ioannidis and Cristina Nita-Rotaru. [PDF] .
A Framework for Role-Based Access Control in Group Communication Systems. In 2004 International Workshop on Security in Parallel and Distributed Systems In conjunction with the 17th International Conference on Parallel and Distributed Computing Systems PDCS-2004 San Francisco , CA, September 15-17, 2004 Cristina Nita-Rotaru and Ninghui Li. [PDF], [Extended Technical Report CERIAS TR #2003-31] .
Coping with the Insider Threat in Scalable Distributed Information Systems Service. In FuDiCo II: (S.O.S.)Survivability: Obstacles and Solutions, 2nd International Workshop on Future Directions in Distributed Computing , University of Bologna Residential Center Bertinoro(Forli), Italy, June 23-25 2004. Yair Amir and Cristina Nita-Rotaru. [PDF].
Scaling Secure Group Communication Systems: Beyond Peer-to-Peer In the Proceedings of DISCEX3, Washington DC, April 22-24, 2003. Yair Amir, Cristina Nita-Rotaru, Jonathan Stanton, Gene Tsudik. [PDF], [BIB].
On the Performance of Group Key Agreement Protocols. Published in the Proceedings of the 22nd IEEE International Conference on Distributed Computing Systems, Vienna, Austria, July 2-5, 2002, short paper. YairAmir, Yongdae Kim, Cristina Nita-Rotaru, and Gene Tsudik. [PDF], [BIB].
Stateless-Recipient Certified E-mail System based on Verifiable Encryption. Published in the Proceedings of RSA 2002 , McEnery Convention Center, San Jose, CA, USA, February 18-22, 2002. Giuseppe Ateniese and Cristina Nita-Rotaru.
[PDF], [BIB].
Exploring Robustness in Group Key Agreement. Published in the Proceedings of the 21th IEEE International Conference on Distributed Computing Systems, Phoenix, Arizona, April 16-19, 2001, pp 399-408. Nominated for Best Paper Award. Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, John Schultz, Jonathan Stanton, and Gene Tsudik. [PDF], [BIB], [Extended Technical Report CNDS #2000-4].
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments Published in the Proceedings of the 20th IEEE International Conference on Distributed Computing Systems, Taipei, Taiwan, April 10-13, 2000, pp 330-343. Yair Amir,Giuseppe Ateniese, Damian Hasse, Yongdae Kim,Cristina Nita-Rotaru, Theo Schlossnagle, John Schultz, Jonathan Stanton, and Gene Tsudik. [PDF], [BIB].
An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. In ACM Workshop on Wireless Security (WiSe), Atlanta, Georgia, September 28 2002. Baruch Awerbuch, Dave Holmer,Cristina Nita-Rotaru, and Herbert Rubens. [PDF], [BIB].
High Performance, Secure, Robust and Transparent Messaging Service. In FuDiCo 2002: International Workshop on Future Directions in Distributed Computing , Bertinoro(Forli), Italy, June 3-7 2002. Yair Amir, Claudiu Danilov, and Cristina Nita-Rotaru. [PS].
Framework for Authentication and Access Control of Client-Server Group Communication Systems Published in the Proceedings of the Third International Workshop on Networked Group Communication, London, UK November 7-9 2001. Yair Amir, Cristina Nita-Rotaru,and Jonathan Stanton. [PS], [BIB], [Extended Technical Report CNDS #2001-2].


Technical Reports

Survey of Attack and Defense Techniques for Reputation Systems K. Hoffman, D. Zage and C. Nita-Rotaru. Technical report CSD TR #07-013, May 2007. [PDF].
Enhancing Distributed Systems with Mechanisms to Cope with Malicious Clients. Yair Amir, Claudiu Danilov, John Lane, Michal Miskin-Amir, Cristina Nita-Rotaru [PDF] .
DAISY: Increasing Scalability and Robustness of Anonymity Systems Chi-Bun Chan and Cristina Nita-Rotaru. Technical Report CSD TR #04-018. Oct. 2004. [PDF] .
Robust Security Mechanisms for Data Streams Systems Mohamed Ali, Mohamed ElTabakh, and Cristina Nita-Rotaru. Technical Report CSD TR #04-019, May 2004. [PDF] .