Reza Curtmola
Reza Curtmola
Professor, Computer Science
4301 Guttenberg Information Technologies Center (GITC)
Education
Ph.D.; Johns Hopkins University; Computer Science; 2007
M.S.; Johns Hopkins University; Computer Science; 2003
B.S.; Politehnica University of Bucharest; Computer Science; 2001
M.S.; Johns Hopkins University; Computer Science; 2003
B.S.; Politehnica University of Bucharest; Computer Science; 2001
Experience
NJIT, Department of Computer Science
Professor, June 2019 -
Website
2024 Fall Courses
CS 645 - SECURITY & PRIVACY IN COMP SYS
CS 790A - DOCT DISSERTATION & RES
CS 700B - MASTER'S PROJECT
CS 701B - MASTER'S THESIS
CS 726 - INDEPENDENT STUDY II
CS 488 - INDEPENDENT STUDY IN CS
CS 725 - INDEPENDENT STUDY I
CS 791 - DOCTORAL SEMINAR
CS 792 - PRE-DOCTORAL RESEARCH
CS 790A - DOCT DISSERTATION & RES
CS 700B - MASTER'S PROJECT
CS 701B - MASTER'S THESIS
CS 726 - INDEPENDENT STUDY II
CS 488 - INDEPENDENT STUDY IN CS
CS 725 - INDEPENDENT STUDY I
CS 791 - DOCTORAL SEMINAR
CS 792 - PRE-DOCTORAL RESEARCH
Past Courses
CS 408: CRYPTOGRAPHY & INTERNET SECRTY
CS 645: SECURITY & PRIVACY IN COMP SYS
CS 646: NETWORK PROTOCOLS SECURITY
CS 696: NETWORK MGMT & SECURITY
CS 698: ST:
CS 698: ST: NETWORK PROTOCOLS SECURITY
CS 698: ST:DATA SECURITY
CS 708: DATA SECURITY AND PRIVACY
CS 791: DOCTORAL SEMINAR
CS 791: GRADUATE SEMINAR
CS 645: SECURITY & PRIVACY IN COMP SYS
CS 646: NETWORK PROTOCOLS SECURITY
CS 696: NETWORK MGMT & SECURITY
CS 698: ST:
CS 698: ST: NETWORK PROTOCOLS SECURITY
CS 698: ST:DATA SECURITY
CS 708: DATA SECURITY AND PRIVACY
CS 791: DOCTORAL SEMINAR
CS 791: GRADUATE SEMINAR
Journal Article
Afzali, Hammad, & Torres-Arias, Santiago, & Curtmola, Reza, & Cappos, Justin (2023). Towards verifiable web-based code review systems. Journal of Computer Security / IOS Press, 32 pages.
Chakraborti, Anrin, & Curtmola, Reza, & Katz, Jonathan, & Nieh, Jason, & Sadeghi, Ahmad-Reza, & Sion, Radu, & Zhang, Yinqian (2022). Cloud Computing Security: Foundations and Research Directions. Foundations and Trends in Privacy and Security, 3(2), 115.
Hakeem, Abeer, & Curtmola, Reza, & Ding, Xiaoning, & Borcea, (2021). DFPS: A Distributed Mobile System for Free Parking Assignment. IEEE Transactions on Mobile Computing,
Afzali, Hammad, & Torres-Arias, Santiago, & Curtmola, Reza, & Cappos, Justin (2020). Towards Adding Verifiability to Web-based Git Repositories. Journal of Computer Security / IOS Press, 28(4), 32 pages.
Guo, Chang, & Li, Demin, & Zhang, Guanglin, & Ding, Xiaoning, & Curtmola, Reza, & Borcea, Cristian M. (2020). Dynamic Interior Point Method for Vehicular Traffic Optimization. IEEE Transactions on Vehicular Technology, 69(5), 4855 - 4868.
Chakraborti, Anrin, & Curtmola, Reza, & Katz, Jonathan, & Nieh, Jason, & Sadeghi, Ahmad-Reza, & Sion, Radu, & Zhang, Yinqian (2022). Cloud Computing Security: Foundations and Research Directions. Foundations and Trends in Privacy and Security, 3(2), 115.
Hakeem, Abeer, & Curtmola, Reza, & Ding, Xiaoning, & Borcea, (2021). DFPS: A Distributed Mobile System for Free Parking Assignment. IEEE Transactions on Mobile Computing,
Afzali, Hammad, & Torres-Arias, Santiago, & Curtmola, Reza, & Cappos, Justin (2020). Towards Adding Verifiability to Web-based Git Repositories. Journal of Computer Security / IOS Press, 28(4), 32 pages.
Guo, Chang, & Li, Demin, & Zhang, Guanglin, & Ding, Xiaoning, & Curtmola, Reza, & Borcea, Cristian M. (2020). Dynamic Interior Point Method for Vehicular Traffic Optimization. IEEE Transactions on Vehicular Technology, 69(5), 4855 - 4868.
SHOW MORE
Paiker, Nafize, & Shan, Jianchen, & Borcea, Cristian M., & Gehani, Narain, & Curtmola, Reza, & Ding, Xiaoning (2020). Design and Implementation of an Overlay File System for Cloud-Assisted Mobile Apps. IEEE Transactions on Cloud Computing, 14 pages.
Debnath, Hillol, & Khan, Mohammad A, & Paiker, Nafize, & Ding, Xiaoning, & Gehani, Narain, & Curtmola, Reza, & Borcea, Cristian M. (2019). The Moitree Middleware for Distributed Mobile-Cloud Computing. Elsevier Journal of Systems and Software, 157,
Chen, Bo, & Curtmola, Reza (2017). Remote data integrity checking with server-side repair. IOSPress Journal of Computer Security, 25(6), 47 pages.
Talasila, Manoop, & Curtmola, Reza, & Borcea, Cristian M. (2016). Crowdsensing in the Wild with Aliens and Micro-payments. IEEE Pervasive Computing, 15(1), 7 pages.
Talasila, Manoop, & Curtmola, Reza, & Borcea, Cristian M. (2015). Collaborative Bluetooth-based Location Authentication on Smart Phones. Elsevier Pervasive and Mobile Computing, 17, 43-62.
Talasila, Manoop, & Curtmola, Reza, & Borcea, Cristian M. (2013). ILR: Improving Location Reliability in Mobile Crowd Sensing. International Journal of Business Data Communications and Networking, 9(4), 65 - 85.
Cardone, Giuseppe, & Foschini, Luca, & Borcea, Cristian M., & Bellavista, Paolo, & Corradi, Antonio, & Talasila, Manoop, & Curtmola, Reza (2013). Fostering ParticipAction in Smart Cities: a Geo-Social CrowdSensing Platform. IEEE Communications Magazine, 51(6), 8.
Dong, Jing, & Curtmola, Reza, & Nita-Rotaru, Cristina, & Yau, David (2012). Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems. Transactions on Dependable and Secure Computing / IEEE Computer Society, 9(5), 15 pages.
Curtmola, Reza, & Garay, Juan, & Kamara, Seny, & Ostrovsky, Rafail (2011). Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. Journal of Computer Security / IOS Press, 19(5), 40 pages.
Dong, Jing, & Curtmola, Reza, & Nita-Rotaru, Cristina (2011). Secure High-Throughput Multicast Routing in Wireless Mesh Networks. Transactions on Mobile Computing / IEEE Computer Society, 10(5), 16 pages.
Ateniese, Giuseppe, & Burns, Randal, & Curtmola, Reza, & Herring, Joseph, & Khan, Osama, & Kissner, Lea, & Peterson, Zachary, & Song, Dawn (2011). Remote Data Checking Using Provable Data Possession. Transactions on Information and System Security / ACM, 14(1), 34 pages.
Dong, Jing, & Curtmola, Reza, & Nita-Rotaru, Cristina (2011). Practical Defenses Against Pollution Attacks in Wireless Network Coding. Transactions on Information and System Security / ACM, 14(1), 31 pages.
Dong, Jing, & Curtmola, Reza, & Nita-Rotaru, Cristina (2009). Secure Network Coding for Wireless Mesh Networks: Threats, Challenges, and Directions. Computer Communications / Elsevier, 32(17), 1790-1801.
Curtmola, Reza, & Nita-Rotaru, Cristina (2009). BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks. Transactions on Mobile Computing / IEEE Computer Society, 8(4), 445-459.
Debnath, Hillol, & Khan, Mohammad A, & Paiker, Nafize, & Ding, Xiaoning, & Gehani, Narain, & Curtmola, Reza, & Borcea, Cristian M. (2019). The Moitree Middleware for Distributed Mobile-Cloud Computing. Elsevier Journal of Systems and Software, 157,
Chen, Bo, & Curtmola, Reza (2017). Remote data integrity checking with server-side repair. IOSPress Journal of Computer Security, 25(6), 47 pages.
Talasila, Manoop, & Curtmola, Reza, & Borcea, Cristian M. (2016). Crowdsensing in the Wild with Aliens and Micro-payments. IEEE Pervasive Computing, 15(1), 7 pages.
Talasila, Manoop, & Curtmola, Reza, & Borcea, Cristian M. (2015). Collaborative Bluetooth-based Location Authentication on Smart Phones. Elsevier Pervasive and Mobile Computing, 17, 43-62.
Talasila, Manoop, & Curtmola, Reza, & Borcea, Cristian M. (2013). ILR: Improving Location Reliability in Mobile Crowd Sensing. International Journal of Business Data Communications and Networking, 9(4), 65 - 85.
Cardone, Giuseppe, & Foschini, Luca, & Borcea, Cristian M., & Bellavista, Paolo, & Corradi, Antonio, & Talasila, Manoop, & Curtmola, Reza (2013). Fostering ParticipAction in Smart Cities: a Geo-Social CrowdSensing Platform. IEEE Communications Magazine, 51(6), 8.
Dong, Jing, & Curtmola, Reza, & Nita-Rotaru, Cristina, & Yau, David (2012). Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems. Transactions on Dependable and Secure Computing / IEEE Computer Society, 9(5), 15 pages.
Curtmola, Reza, & Garay, Juan, & Kamara, Seny, & Ostrovsky, Rafail (2011). Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions. Journal of Computer Security / IOS Press, 19(5), 40 pages.
Dong, Jing, & Curtmola, Reza, & Nita-Rotaru, Cristina (2011). Secure High-Throughput Multicast Routing in Wireless Mesh Networks. Transactions on Mobile Computing / IEEE Computer Society, 10(5), 16 pages.
Ateniese, Giuseppe, & Burns, Randal, & Curtmola, Reza, & Herring, Joseph, & Khan, Osama, & Kissner, Lea, & Peterson, Zachary, & Song, Dawn (2011). Remote Data Checking Using Provable Data Possession. Transactions on Information and System Security / ACM, 14(1), 34 pages.
Dong, Jing, & Curtmola, Reza, & Nita-Rotaru, Cristina (2011). Practical Defenses Against Pollution Attacks in Wireless Network Coding. Transactions on Information and System Security / ACM, 14(1), 31 pages.
Dong, Jing, & Curtmola, Reza, & Nita-Rotaru, Cristina (2009). Secure Network Coding for Wireless Mesh Networks: Threats, Challenges, and Directions. Computer Communications / Elsevier, 32(17), 1790-1801.
Curtmola, Reza, & Nita-Rotaru, Cristina (2009). BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks. Transactions on Mobile Computing / IEEE Computer Society, 8(4), 445-459.
COLLAPSE
Conference Proceeding
Bootstrapping Trust in Community Repository Projects
Proc. of The 18th EAI International Conference on Security and Privacy in Communication Networks (SecureComm '22), October (4th Quarter/Autumn) 2022
Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses
Proc. of the 31st USENIX Security Symposium (USENIX Security '22), August 2022
Leakuidator: Leaky resource attacks and countermeasures
Proc. of The 17th EAI International Conference on Security and Privacy in Communication Networks (SecureComm '21), September 2021
Multi-Destination Vehicular Route Planning with Parking and Traffic Constraints
Proc. of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (Mobiquitous '19), November 2019
Auditable Compressed Storage
Proc. of the 22nd Information Security Conference (ISC '19), September 2019
Proc. of The 18th EAI International Conference on Security and Privacy in Communication Networks (SecureComm '22), October (4th Quarter/Autumn) 2022
Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses
Proc. of the 31st USENIX Security Symposium (USENIX Security '22), August 2022
Leakuidator: Leaky resource attacks and countermeasures
Proc. of The 17th EAI International Conference on Security and Privacy in Communication Networks (SecureComm '21), September 2021
Multi-Destination Vehicular Route Planning with Parking and Traffic Constraints
Proc. of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (Mobiquitous '19), November 2019
Auditable Compressed Storage
Proc. of the 22nd Information Security Conference (ISC '19), September 2019
SHOW MORE
in-toto: Providing farm-to-table guarantees for bits and bytes
Proc. of The 28th USENIX Security Symposium (USENIX Security '19), August 2019
Commit Signatures for Centralized Version Control Systems
Proc. of The 34th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC '19), June 2019
Context-Aware File Discovery System for Distributed Mobile-Cloud Apps
10th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2018), December 2018
le-git-imate: Towards Verifiable Web-based Git Repositories
Proc. of The 13th ACM Asia Conference on Computer & Communications Security (AsiaCCS '18), June 2018
Collaborative Offloading for Distributed Mobile-Cloud Apps
6th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud 2018), March 2018
Secure Storage with Replication and Transparent Deduplication
Proc. of The 8th ACM Conference on Data and Application Security and Privacy (CODASPY '18), March 2018
Sentio: Distributed Sensor Virtualization for Mobile Apps
IEEE International Conference on Pervasive Computing and Communication (PerCom) 2018, March 2018
Cooperative System for Free Parking Assignment
The IEEE Vehicular Networking Conference (VNC), November 2017
FaceDate: A Mobile Cloud Computing App for People Matching
The 7th EAI International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications (Mobilware), December 2016
On-The-Fly Curbside Parking Assignment
The 8th EAI International Conference on Mobile Computing, Applications and Services (MobiCASE), December 2016
P2F2: Privacy-Preserving Face Finder
The 37th IEEE Sarnoff Symposium, September 2016
On Omitting Commits and Committing Omissions: Preventing Git Metadata Tampering That (Re)introduces Software Vulnerabilities
Proc. of The 25th USENIX Security Symposium, August 2016
UCS: Ultimate Course Search
14th International Workshop on Content-Based Multimedia Indexing, June 2016
Indexing Multimedia Learning Materials in Ultimate Course Search
Proc. of The 14th International Workshop on Content-Based Multimedia Indexing (CBMI '16), June 2016
An Overlay File System for Cloud-Assisted Mobile Applications
The 32nd International Conference on Massive Storage Systems and Technology (MSST 2016), May 2016
Moitree: A Middleware for Cloud-Assisted Mobile Distributed Apps
IEEE International Conference on Pervasive Computing and Communications (PerCom), 2016, March 2016
Avatar: Mobile Distributed Computing in the Cloud
IEEE Mobile Cloud 2015: The 3rd IEEE International Conference on Mobile Cloud Computing, March 2015
Towards Server-side Repair for Erasure Coding-based Distributed Storage Systems
Proc. of the Fifth ACM Conference on Data and Application Security and Privacy (CODASPY '15), March 2015
Alien vs. Mobile User: User Game: Fast and Efficient Area Coverage in Crowdsensing
6th International Conference on Mobile Computing, Applications and Services (MobiCASE), November 2014
Cloud Computing for Education: A Professional Development Program for High School Teachers
Proceedings of the 2014 American Society for Engineering Education Annual Conference, June 2014
Auditable Version Control Systems
Proc. of the 21st Annual Network & Distributed System Security Symposium (NDSS '14), February 2014
Improving Location Reliability in Crowd Sensed Data with Minimal Efforts
Proc. of the Sixth Joint IFIP/IEEE Wireless and Mobile Networking Conference, April (2nd Quarter/Spring) 2013
Towards Self-Repairing Replication-Based Storage Systems Using Untrusted Clouds
Proc. of the Third ACM Conference on Data and Application Security and Privacy, February 2013
POSTER: Robust Dynamic Remote Data Checking for Public Clouds
Proc. of the 19th ACM Conference on Computer and Communications Security (CCS ’12), October (4th Quarter/Autumn) 2012
Robust Dynamic Provable Data Possession
Proc. of The Third IEEE International Workshop on Security and Privacy in Cloud Computing (SPCC ’12), June 2012
POSTER: Robust Dynamic Remote Data Checking for Public Clouds
Proc. of the 35th IEEE Sarnoff Symposium, April (2nd Quarter/Spring) 2012
Entropy Attacks and Countermeasures in Wireless Network Coding
Proc. of The Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ’12), April (2nd Quarter/Spring) 2012
LINK: Location verification through Immediate Neighbors Knowledge
7th International ICST Conference on Mobile and Ubiquitous Systems, December 2010
Remote Data Checking for Network Coding-based Distributed Storage Systems
Proceedings of the Second ACM Cloud Computing Security Workshop (CCSW '10) / ACM, October (4th Quarter/Autumn) 2010
Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems
Proceedings of the Third IEEE Wireless Network Coding Workshop (WiNC '10) / IEEE, June 2010
Tradeoffs between Security and Communication Performance in Wireless Mesh Networks
Proceedings of the First IEEE International Workshop on Data Security and PrivAcy in wireless Networks (D-SPAN '10) / IEEE, June 2010
Practical Defenses Against Pollution Attacks in Intra-Flow Network Coding for Wireless Mesh Networks
Proceedings of the Second ACM Conference on Wireless Network Security (WiSec '09), March 2009
Toward Secure Network Coding in Wireless Networks: Threats and Challenges
Proceedings of The Fourth IEEE Workshop On Secure Network Protocols (NPSec '08) / IEEE, November 2008
Robust Remote Data Checking
Proceedings of Fourth ACM International Workshop on Storage Security and Survivability (StorageSS '08), October (4th Quarter/Autumn) 2008
Proc. of The 28th USENIX Security Symposium (USENIX Security '19), August 2019
Commit Signatures for Centralized Version Control Systems
Proc. of The 34th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC '19), June 2019
Context-Aware File Discovery System for Distributed Mobile-Cloud Apps
10th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2018), December 2018
le-git-imate: Towards Verifiable Web-based Git Repositories
Proc. of The 13th ACM Asia Conference on Computer & Communications Security (AsiaCCS '18), June 2018
Collaborative Offloading for Distributed Mobile-Cloud Apps
6th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud 2018), March 2018
Secure Storage with Replication and Transparent Deduplication
Proc. of The 8th ACM Conference on Data and Application Security and Privacy (CODASPY '18), March 2018
Sentio: Distributed Sensor Virtualization for Mobile Apps
IEEE International Conference on Pervasive Computing and Communication (PerCom) 2018, March 2018
Cooperative System for Free Parking Assignment
The IEEE Vehicular Networking Conference (VNC), November 2017
FaceDate: A Mobile Cloud Computing App for People Matching
The 7th EAI International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications (Mobilware), December 2016
On-The-Fly Curbside Parking Assignment
The 8th EAI International Conference on Mobile Computing, Applications and Services (MobiCASE), December 2016
P2F2: Privacy-Preserving Face Finder
The 37th IEEE Sarnoff Symposium, September 2016
On Omitting Commits and Committing Omissions: Preventing Git Metadata Tampering That (Re)introduces Software Vulnerabilities
Proc. of The 25th USENIX Security Symposium, August 2016
UCS: Ultimate Course Search
14th International Workshop on Content-Based Multimedia Indexing, June 2016
Indexing Multimedia Learning Materials in Ultimate Course Search
Proc. of The 14th International Workshop on Content-Based Multimedia Indexing (CBMI '16), June 2016
An Overlay File System for Cloud-Assisted Mobile Applications
The 32nd International Conference on Massive Storage Systems and Technology (MSST 2016), May 2016
Moitree: A Middleware for Cloud-Assisted Mobile Distributed Apps
IEEE International Conference on Pervasive Computing and Communications (PerCom), 2016, March 2016
Avatar: Mobile Distributed Computing in the Cloud
IEEE Mobile Cloud 2015: The 3rd IEEE International Conference on Mobile Cloud Computing, March 2015
Towards Server-side Repair for Erasure Coding-based Distributed Storage Systems
Proc. of the Fifth ACM Conference on Data and Application Security and Privacy (CODASPY '15), March 2015
Alien vs. Mobile User: User Game: Fast and Efficient Area Coverage in Crowdsensing
6th International Conference on Mobile Computing, Applications and Services (MobiCASE), November 2014
Cloud Computing for Education: A Professional Development Program for High School Teachers
Proceedings of the 2014 American Society for Engineering Education Annual Conference, June 2014
Auditable Version Control Systems
Proc. of the 21st Annual Network & Distributed System Security Symposium (NDSS '14), February 2014
Improving Location Reliability in Crowd Sensed Data with Minimal Efforts
Proc. of the Sixth Joint IFIP/IEEE Wireless and Mobile Networking Conference, April (2nd Quarter/Spring) 2013
Towards Self-Repairing Replication-Based Storage Systems Using Untrusted Clouds
Proc. of the Third ACM Conference on Data and Application Security and Privacy, February 2013
POSTER: Robust Dynamic Remote Data Checking for Public Clouds
Proc. of the 19th ACM Conference on Computer and Communications Security (CCS ’12), October (4th Quarter/Autumn) 2012
Robust Dynamic Provable Data Possession
Proc. of The Third IEEE International Workshop on Security and Privacy in Cloud Computing (SPCC ’12), June 2012
POSTER: Robust Dynamic Remote Data Checking for Public Clouds
Proc. of the 35th IEEE Sarnoff Symposium, April (2nd Quarter/Spring) 2012
Entropy Attacks and Countermeasures in Wireless Network Coding
Proc. of The Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ’12), April (2nd Quarter/Spring) 2012
LINK: Location verification through Immediate Neighbors Knowledge
7th International ICST Conference on Mobile and Ubiquitous Systems, December 2010
Remote Data Checking for Network Coding-based Distributed Storage Systems
Proceedings of the Second ACM Cloud Computing Security Workshop (CCSW '10) / ACM, October (4th Quarter/Autumn) 2010
Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems
Proceedings of the Third IEEE Wireless Network Coding Workshop (WiNC '10) / IEEE, June 2010
Tradeoffs between Security and Communication Performance in Wireless Mesh Networks
Proceedings of the First IEEE International Workshop on Data Security and PrivAcy in wireless Networks (D-SPAN '10) / IEEE, June 2010
Practical Defenses Against Pollution Attacks in Intra-Flow Network Coding for Wireless Mesh Networks
Proceedings of the Second ACM Conference on Wireless Network Security (WiSec '09), March 2009
Toward Secure Network Coding in Wireless Networks: Threats and Challenges
Proceedings of The Fourth IEEE Workshop On Secure Network Protocols (NPSec '08) / IEEE, November 2008
Robust Remote Data Checking
Proceedings of Fourth ACM International Workshop on Storage Security and Survivability (StorageSS '08), October (4th Quarter/Autumn) 2008
COLLAPSE
Chapter
Chen, Bo, & Curtmola, Reza, & Dai, Jun (2017). Auditable Version Control Systems in Untrusted Public Clouds, Ivan Mistrik, Rami Bahsoon, Nour Ali, Maritta Heisel, and Bruce Maxim (Eds.), Elsevier - Morgan Kaufmann. (pp. 353-366). Elsevier - Morgan Kaufmann
Curtmola, Reza, & Chen, Bo (2016). Availability, Recovery, and Auditing across Data Centers chapter in "Cloud Computing Security: Foundations and Challenges", John Vacca (Ed.), CRC Press. (pp. 21 pages). CRC Press
Curtmola, Reza, & Chen, Bo (2016). Integrity Assurance for Data Outsourcing chapter in "Cloud Computing Security: Foundations and Challenges", John Vacca (Ed.), CRC Press. (pp. 12 pages). CRC Press
Talasila, Manoop, & Curtmola, Reza, & Borcea, Cristian M. (2015). Mobile Crowd Sensing chapter in Handbook of Sensor Networking: Advanced Technologies and Applications, John Vacca (Ed.), CRC Press. (pp. 23). CRC Press
Curtmola, Reza, & Chen, Bo (2016). Availability, Recovery, and Auditing across Data Centers chapter in "Cloud Computing Security: Foundations and Challenges", John Vacca (Ed.), CRC Press. (pp. 21 pages). CRC Press
Curtmola, Reza, & Chen, Bo (2016). Integrity Assurance for Data Outsourcing chapter in "Cloud Computing Security: Foundations and Challenges", John Vacca (Ed.), CRC Press. (pp. 12 pages). CRC Press
Talasila, Manoop, & Curtmola, Reza, & Borcea, Cristian M. (2015). Mobile Crowd Sensing chapter in Handbook of Sensor Networking: Advanced Technologies and Applications, John Vacca (Ed.), CRC Press. (pp. 23). CRC Press
Book
Borcea, Cristian M., & Talasila, Manoop, & Curtmola, Reza (2016). Mobile Crowdsensing. Chapman and Hall/CRC
Sion, Radu, & Curtmola, Reza, & Dietrich, Sven, & Kiayias, A, & Miret, J. M, & Sako, K, & Sebe, F (2010). Workshops of the 2010 Financial Cryptography and Data Security Conference (Editors). Lecture Notes in Computer Science / Springer
Sion, Radu, & Curtmola, Reza, & Dietrich, Sven, & Kiayias, A, & Miret, J. M, & Sako, K, & Sebe, F (2010). Workshops of the 2010 Financial Cryptography and Data Security Conference (Editors). Lecture Notes in Computer Science / Springer
Other
POSTER: Remote Data Integrity Checking for Cloud Storage
National Science Foundation: SaTC PI Meeting, January (1st Quarter/Winter) 2015
POSTER: Auditable Version Control Systems
Stony Brook: National Security Institute (opening event), September 2014
National Science Foundation: SaTC PI Meeting, January (1st Quarter/Winter) 2015
POSTER: Auditable Version Control Systems
Stony Brook: National Security Institute (opening event), September 2014