Reza Curtmola
Reza Curtmola
Professor, Computer Science
4301 Guttenberg Information Technologies Center (GITC)
Education
Ph.D.; Johns Hopkins University; Computer Science; 2007
M.S.; Johns Hopkins University; Computer Science; 2003
B.S.; Politehnica University of Bucharest; Computer Science; 2001
M.S.; Johns Hopkins University; Computer Science; 2003
B.S.; Politehnica University of Bucharest; Computer Science; 2001
Experience
NJIT, Department of Computer Science
Professor, June 2019 -
Website
2025 Spring Courses
CS 790A - DOCT DISSERTATION & RES
CS 700B - MASTER'S PROJECT
CS 701B - MASTER'S THESIS
CS 726 - INDEPENDENT STUDY II
CS 488 - INDEPENDENT STUDY IN CS
CS 725 - INDEPENDENT STUDY I
CS 792 - PRE-DOCTORAL RESEARCH
CS 700B - MASTER'S PROJECT
CS 701B - MASTER'S THESIS
CS 726 - INDEPENDENT STUDY II
CS 488 - INDEPENDENT STUDY IN CS
CS 725 - INDEPENDENT STUDY I
CS 792 - PRE-DOCTORAL RESEARCH
Past Courses
CS 408: CRYPTOGRAPHY & INTERNET SECRTY
CS 645: SECURITY & PRIVACY IN COMP SYS
CS 646: NETWORK PROTOCOLS SECURITY
CS 696: NETWORK MGMT & SECURITY
CS 698: ST:
CS 698: ST: NETWORK PROTOCOLS SECURITY
CS 698: ST:DATA SECURITY
CS 708: DATA SECURITY AND PRIVACY
CS 791: DOCTORAL SEMINAR
CS 791: GRADUATE SEMINAR
CS 645: SECURITY & PRIVACY IN COMP SYS
CS 646: NETWORK PROTOCOLS SECURITY
CS 696: NETWORK MGMT & SECURITY
CS 698: ST:
CS 698: ST: NETWORK PROTOCOLS SECURITY
CS 698: ST:DATA SECURITY
CS 708: DATA SECURITY AND PRIVACY
CS 791: DOCTORAL SEMINAR
CS 791: GRADUATE SEMINAR
Journal Article
Hammad Afzali, Santiago Torres-Arias, Reza Curtmola, Justin Cappos. 2023. “ Towards verifiable web-based code review systems.” Journal of Computer Security / IOS Press, pp. 32 pages.
Anrin Chakraborti, Reza Curtmola, Jonathan Katz, Jason Nieh, Ahmad-Reza Sadeghi, Radu Sion, Yinqian Zhang. 2022. “Cloud Computing Security: Foundations and Research Directions.” Foundations and Trends in Privacy and Security, vol. 3, no. 2, pp. 115.
Abeer Hakeem, Reza Curtmola, Xiaoning Ding, Borcea. 2021. “DFPS: A Distributed Mobile System for Free Parking Assignment.” IEEE Transactions on Mobile Computing.
Hammad Afzali, Santiago Torres-Arias, Reza Curtmola, Justin Cappos. 2020. “Towards Adding Verifiability to Web-based Git Repositories.” Journal of Computer Security / IOS Press, vol. 28, no. 4, pp. 32 pages.
Chang Guo, Demin Li, Guanglin Zhang, Xiaoning Ding, Reza Curtmola, Cristian M. Borcea. 2020. “ Dynamic Interior Point Method for Vehicular Traffic Optimization.” IEEE Transactions on Vehicular Technology, vol. 69, no. 5, pp. 4855 - 4868.
Anrin Chakraborti, Reza Curtmola, Jonathan Katz, Jason Nieh, Ahmad-Reza Sadeghi, Radu Sion, Yinqian Zhang. 2022. “Cloud Computing Security: Foundations and Research Directions.” Foundations and Trends in Privacy and Security, vol. 3, no. 2, pp. 115.
Abeer Hakeem, Reza Curtmola, Xiaoning Ding, Borcea. 2021. “DFPS: A Distributed Mobile System for Free Parking Assignment.” IEEE Transactions on Mobile Computing.
Hammad Afzali, Santiago Torres-Arias, Reza Curtmola, Justin Cappos. 2020. “Towards Adding Verifiability to Web-based Git Repositories.” Journal of Computer Security / IOS Press, vol. 28, no. 4, pp. 32 pages.
Chang Guo, Demin Li, Guanglin Zhang, Xiaoning Ding, Reza Curtmola, Cristian M. Borcea. 2020. “ Dynamic Interior Point Method for Vehicular Traffic Optimization.” IEEE Transactions on Vehicular Technology, vol. 69, no. 5, pp. 4855 - 4868.
SHOW MORE
Nafize Paiker, Jianchen Shan, Cristian M. Borcea, Narain Gehani, Reza Curtmola, Xiaoning Ding. 2020. “Design and Implementation of an Overlay File System for Cloud-Assisted Mobile Apps.” IEEE Transactions on Cloud Computing, pp. 14 pages.
Hillol Debnath, Mohammad A Khan, Nafize Paiker, Xiaoning Ding, Narain Gehani, Reza Curtmola, Cristian M. Borcea. 2019. “The Moitree Middleware for Distributed Mobile-Cloud Computing.” Elsevier Journal of Systems and Software, vol. 157.
Bo Chen, Reza Curtmola. 2017. “Remote data integrity checking with server-side repair.” IOSPress Journal of Computer Security, vol. 25, no. 6, pp. 47 pages.
Manoop Talasila, Reza Curtmola, Cristian M. Borcea. 2016. “Crowdsensing in the Wild with Aliens and Micro-payments.” IEEE Pervasive Computing, vol. 15, no. 1, pp. 7 pages.
Manoop Talasila, Reza Curtmola, Cristian M. Borcea. 2015. “Collaborative Bluetooth-based Location Authentication on Smart Phones.” Elsevier Pervasive and Mobile Computing, vol. 17, pp. 43-62.
Manoop Talasila, Reza Curtmola, Cristian M. Borcea. 2013. “ILR: Improving Location Reliability in Mobile Crowd Sensing.” International Journal of Business Data Communications and Networking, vol. 9, no. 4, pp. 65 - 85.
Giuseppe Cardone, Luca Foschini, Cristian M. Borcea, Paolo Bellavista, Antonio Corradi, Manoop Talasila, Reza Curtmola. 2013. “Fostering ParticipAction in Smart Cities: a Geo-Social CrowdSensing Platform.” IEEE Communications Magazine, vol. 51, no. 6, pp. 8.
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru, David Yau. 2012. “Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems.” Transactions on Dependable and Secure Computing / IEEE Computer Society, vol. 9, no. 5, pp. 15 pages.
Reza Curtmola, Juan Garay, Seny Kamara, Rafail Ostrovsky. 2011. “Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions.” Journal of Computer Security / IOS Press, vol. 19, no. 5, pp. 40 pages.
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru. 2011. “Secure High-Throughput Multicast Routing in Wireless Mesh Networks.” Transactions on Mobile Computing / IEEE Computer Society, vol. 10, no. 5, pp. 16 pages.
Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Osama Khan, Lea Kissner, Zachary Peterson, Dawn Song. 2011. “Remote Data Checking Using Provable Data Possession.” Transactions on Information and System Security / ACM, vol. 14, no. 1, pp. 34 pages.
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru. 2011. “Practical Defenses Against Pollution Attacks in Wireless Network Coding.” Transactions on Information and System Security / ACM, vol. 14, no. 1, pp. 31 pages.
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru. 2009. “ Secure Network Coding for Wireless Mesh Networks: Threats, Challenges, and Directions.” Computer Communications / Elsevier, vol. 32, no. 17, pp. 1790-1801.
Reza Curtmola, Cristina Nita-Rotaru. 2009. “BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks.” Transactions on Mobile Computing / IEEE Computer Society, vol. 8, no. 4, pp. 445-459.
Hillol Debnath, Mohammad A Khan, Nafize Paiker, Xiaoning Ding, Narain Gehani, Reza Curtmola, Cristian M. Borcea. 2019. “The Moitree Middleware for Distributed Mobile-Cloud Computing.” Elsevier Journal of Systems and Software, vol. 157.
Bo Chen, Reza Curtmola. 2017. “Remote data integrity checking with server-side repair.” IOSPress Journal of Computer Security, vol. 25, no. 6, pp. 47 pages.
Manoop Talasila, Reza Curtmola, Cristian M. Borcea. 2016. “Crowdsensing in the Wild with Aliens and Micro-payments.” IEEE Pervasive Computing, vol. 15, no. 1, pp. 7 pages.
Manoop Talasila, Reza Curtmola, Cristian M. Borcea. 2015. “Collaborative Bluetooth-based Location Authentication on Smart Phones.” Elsevier Pervasive and Mobile Computing, vol. 17, pp. 43-62.
Manoop Talasila, Reza Curtmola, Cristian M. Borcea. 2013. “ILR: Improving Location Reliability in Mobile Crowd Sensing.” International Journal of Business Data Communications and Networking, vol. 9, no. 4, pp. 65 - 85.
Giuseppe Cardone, Luca Foschini, Cristian M. Borcea, Paolo Bellavista, Antonio Corradi, Manoop Talasila, Reza Curtmola. 2013. “Fostering ParticipAction in Smart Cities: a Geo-Social CrowdSensing Platform.” IEEE Communications Magazine, vol. 51, no. 6, pp. 8.
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru, David Yau. 2012. “Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems.” Transactions on Dependable and Secure Computing / IEEE Computer Society, vol. 9, no. 5, pp. 15 pages.
Reza Curtmola, Juan Garay, Seny Kamara, Rafail Ostrovsky. 2011. “Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions.” Journal of Computer Security / IOS Press, vol. 19, no. 5, pp. 40 pages.
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru. 2011. “Secure High-Throughput Multicast Routing in Wireless Mesh Networks.” Transactions on Mobile Computing / IEEE Computer Society, vol. 10, no. 5, pp. 16 pages.
Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Osama Khan, Lea Kissner, Zachary Peterson, Dawn Song. 2011. “Remote Data Checking Using Provable Data Possession.” Transactions on Information and System Security / ACM, vol. 14, no. 1, pp. 34 pages.
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru. 2011. “Practical Defenses Against Pollution Attacks in Wireless Network Coding.” Transactions on Information and System Security / ACM, vol. 14, no. 1, pp. 31 pages.
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru. 2009. “ Secure Network Coding for Wireless Mesh Networks: Threats, Challenges, and Directions.” Computer Communications / Elsevier, vol. 32, no. 17, pp. 1790-1801.
Reza Curtmola, Cristina Nita-Rotaru. 2009. “BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks.” Transactions on Mobile Computing / IEEE Computer Society, vol. 8, no. 4, pp. 445-459.
COLLAPSE
Conference Proceeding
“Bootstrapping Trust in Community Repository Projects”
Proc. of The 18th EAI International Conference on Security and Privacy in Communication Networks (SecureComm '22), October (4th Quarter/Autumn) 2022.
“Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses”
Proc. of the 31st USENIX Security Symposium (USENIX Security '22), August 2022.
“Leakuidator: Leaky resource attacks and countermeasures”
Proc. of The 17th EAI International Conference on Security and Privacy in Communication Networks (SecureComm '21), September 2021.
“Multi-Destination Vehicular Route Planning with Parking and Traffic Constraints”
Proc. of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (Mobiquitous '19), November 2019.
“Auditable Compressed Storage”
Proc. of the 22nd Information Security Conference (ISC '19), September 2019.
Proc. of The 18th EAI International Conference on Security and Privacy in Communication Networks (SecureComm '22), October (4th Quarter/Autumn) 2022.
“Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses”
Proc. of the 31st USENIX Security Symposium (USENIX Security '22), August 2022.
“Leakuidator: Leaky resource attacks and countermeasures”
Proc. of The 17th EAI International Conference on Security and Privacy in Communication Networks (SecureComm '21), September 2021.
“Multi-Destination Vehicular Route Planning with Parking and Traffic Constraints”
Proc. of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (Mobiquitous '19), November 2019.
“Auditable Compressed Storage”
Proc. of the 22nd Information Security Conference (ISC '19), September 2019.
SHOW MORE
“in-toto: Providing farm-to-table guarantees for bits and bytes”
Proc. of The 28th USENIX Security Symposium (USENIX Security '19), August 2019.
“Commit Signatures for Centralized Version Control Systems”
Proc. of The 34th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC '19), June 2019.
“Context-Aware File Discovery System for Distributed Mobile-Cloud Apps”
10th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2018), December 2018.
“le-git-imate: Towards Verifiable Web-based Git Repositories”
Proc. of The 13th ACM Asia Conference on Computer & Communications Security (AsiaCCS '18), June 2018.
“Collaborative Offloading for Distributed Mobile-Cloud Apps”
6th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud 2018), March 2018.
“Secure Storage with Replication and Transparent Deduplication”
Proc. of The 8th ACM Conference on Data and Application Security and Privacy (CODASPY '18), March 2018.
“Sentio: Distributed Sensor Virtualization for Mobile Apps”
IEEE International Conference on Pervasive Computing and Communication (PerCom) 2018, March 2018.
“Cooperative System for Free Parking Assignment”
The IEEE Vehicular Networking Conference (VNC), November 2017.
“FaceDate: A Mobile Cloud Computing App for People Matching”
The 7th EAI International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications (Mobilware), December 2016.
“On-The-Fly Curbside Parking Assignment”
The 8th EAI International Conference on Mobile Computing, Applications and Services (MobiCASE), December 2016.
“P2F2: Privacy-Preserving Face Finder”
The 37th IEEE Sarnoff Symposium, September 2016.
“On Omitting Commits and Committing Omissions: Preventing Git Metadata Tampering That (Re)introduces Software Vulnerabilities”
Proc. of The 25th USENIX Security Symposium, August 2016.
“UCS: Ultimate Course Search”
14th International Workshop on Content-Based Multimedia Indexing, June 2016.
“Indexing Multimedia Learning Materials in Ultimate Course Search”
Proc. of The 14th International Workshop on Content-Based Multimedia Indexing (CBMI '16), June 2016.
“An Overlay File System for Cloud-Assisted Mobile Applications”
The 32nd International Conference on Massive Storage Systems and Technology (MSST 2016), May 2016.
“Moitree: A Middleware for Cloud-Assisted Mobile Distributed Apps”
IEEE International Conference on Pervasive Computing and Communications (PerCom), 2016, March 2016.
“Avatar: Mobile Distributed Computing in the Cloud”
IEEE Mobile Cloud 2015: The 3rd IEEE International Conference on Mobile Cloud Computing, March 2015.
“Towards Server-side Repair for Erasure Coding-based Distributed Storage Systems”
Proc. of the Fifth ACM Conference on Data and Application Security and Privacy (CODASPY '15), March 2015.
“Alien vs. Mobile User: User Game: Fast and Efficient Area Coverage in Crowdsensing”
6th International Conference on Mobile Computing, Applications and Services (MobiCASE), November 2014.
“Cloud Computing for Education: A Professional Development Program for High School Teachers”
Proceedings of the 2014 American Society for Engineering Education Annual Conference, June 2014.
“Auditable Version Control Systems”
Proc. of the 21st Annual Network & Distributed System Security Symposium (NDSS '14), February 2014.
“Improving Location Reliability in Crowd Sensed Data with Minimal Efforts”
Proc. of the Sixth Joint IFIP/IEEE Wireless and Mobile Networking Conference, April (2nd Quarter/Spring) 2013.
“Towards Self-Repairing Replication-Based Storage Systems Using Untrusted Clouds”
Proc. of the Third ACM Conference on Data and Application Security and Privacy, February 2013.
“POSTER: Robust Dynamic Remote Data Checking for Public Clouds”
Proc. of the 19th ACM Conference on Computer and Communications Security (CCS ’12), October (4th Quarter/Autumn) 2012.
“Robust Dynamic Provable Data Possession”
Proc. of The Third IEEE International Workshop on Security and Privacy in Cloud Computing (SPCC ’12), June 2012.
“POSTER: Robust Dynamic Remote Data Checking for Public Clouds”
Proc. of the 35th IEEE Sarnoff Symposium, April (2nd Quarter/Spring) 2012.
“Entropy Attacks and Countermeasures in Wireless Network Coding”
Proc. of The Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ’12), April (2nd Quarter/Spring) 2012.
“LINK: Location verification through Immediate Neighbors Knowledge”
7th International ICST Conference on Mobile and Ubiquitous Systems, December 2010.
“Remote Data Checking for Network Coding-based Distributed Storage Systems”
Proceedings of the Second ACM Cloud Computing Security Workshop (CCSW '10) / ACM, October (4th Quarter/Autumn) 2010.
“Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems”
Proceedings of the Third IEEE Wireless Network Coding Workshop (WiNC '10) / IEEE, June 2010.
“Tradeoffs between Security and Communication Performance in Wireless Mesh Networks”
Proceedings of the First IEEE International Workshop on Data Security and PrivAcy in wireless Networks (D-SPAN '10) / IEEE, June 2010.
“Practical Defenses Against Pollution Attacks in Intra-Flow Network Coding for Wireless Mesh Networks”
Proceedings of the Second ACM Conference on Wireless Network Security (WiSec '09), March 2009.
“Toward Secure Network Coding in Wireless Networks: Threats and Challenges”
Proceedings of The Fourth IEEE Workshop On Secure Network Protocols (NPSec '08) / IEEE, November 2008.
“Robust Remote Data Checking”
Proceedings of Fourth ACM International Workshop on Storage Security and Survivability (StorageSS '08), October (4th Quarter/Autumn) 2008.
Proc. of The 28th USENIX Security Symposium (USENIX Security '19), August 2019.
“Commit Signatures for Centralized Version Control Systems”
Proc. of The 34th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC '19), June 2019.
“Context-Aware File Discovery System for Distributed Mobile-Cloud Apps”
10th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2018), December 2018.
“le-git-imate: Towards Verifiable Web-based Git Repositories”
Proc. of The 13th ACM Asia Conference on Computer & Communications Security (AsiaCCS '18), June 2018.
“Collaborative Offloading for Distributed Mobile-Cloud Apps”
6th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud 2018), March 2018.
“Secure Storage with Replication and Transparent Deduplication”
Proc. of The 8th ACM Conference on Data and Application Security and Privacy (CODASPY '18), March 2018.
“Sentio: Distributed Sensor Virtualization for Mobile Apps”
IEEE International Conference on Pervasive Computing and Communication (PerCom) 2018, March 2018.
“Cooperative System for Free Parking Assignment”
The IEEE Vehicular Networking Conference (VNC), November 2017.
“FaceDate: A Mobile Cloud Computing App for People Matching”
The 7th EAI International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Applications (Mobilware), December 2016.
“On-The-Fly Curbside Parking Assignment”
The 8th EAI International Conference on Mobile Computing, Applications and Services (MobiCASE), December 2016.
“P2F2: Privacy-Preserving Face Finder”
The 37th IEEE Sarnoff Symposium, September 2016.
“On Omitting Commits and Committing Omissions: Preventing Git Metadata Tampering That (Re)introduces Software Vulnerabilities”
Proc. of The 25th USENIX Security Symposium, August 2016.
“UCS: Ultimate Course Search”
14th International Workshop on Content-Based Multimedia Indexing, June 2016.
“Indexing Multimedia Learning Materials in Ultimate Course Search”
Proc. of The 14th International Workshop on Content-Based Multimedia Indexing (CBMI '16), June 2016.
“An Overlay File System for Cloud-Assisted Mobile Applications”
The 32nd International Conference on Massive Storage Systems and Technology (MSST 2016), May 2016.
“Moitree: A Middleware for Cloud-Assisted Mobile Distributed Apps”
IEEE International Conference on Pervasive Computing and Communications (PerCom), 2016, March 2016.
“Avatar: Mobile Distributed Computing in the Cloud”
IEEE Mobile Cloud 2015: The 3rd IEEE International Conference on Mobile Cloud Computing, March 2015.
“Towards Server-side Repair for Erasure Coding-based Distributed Storage Systems”
Proc. of the Fifth ACM Conference on Data and Application Security and Privacy (CODASPY '15), March 2015.
“Alien vs. Mobile User: User Game: Fast and Efficient Area Coverage in Crowdsensing”
6th International Conference on Mobile Computing, Applications and Services (MobiCASE), November 2014.
“Cloud Computing for Education: A Professional Development Program for High School Teachers”
Proceedings of the 2014 American Society for Engineering Education Annual Conference, June 2014.
“Auditable Version Control Systems”
Proc. of the 21st Annual Network & Distributed System Security Symposium (NDSS '14), February 2014.
“Improving Location Reliability in Crowd Sensed Data with Minimal Efforts”
Proc. of the Sixth Joint IFIP/IEEE Wireless and Mobile Networking Conference, April (2nd Quarter/Spring) 2013.
“Towards Self-Repairing Replication-Based Storage Systems Using Untrusted Clouds”
Proc. of the Third ACM Conference on Data and Application Security and Privacy, February 2013.
“POSTER: Robust Dynamic Remote Data Checking for Public Clouds”
Proc. of the 19th ACM Conference on Computer and Communications Security (CCS ’12), October (4th Quarter/Autumn) 2012.
“Robust Dynamic Provable Data Possession”
Proc. of The Third IEEE International Workshop on Security and Privacy in Cloud Computing (SPCC ’12), June 2012.
“POSTER: Robust Dynamic Remote Data Checking for Public Clouds”
Proc. of the 35th IEEE Sarnoff Symposium, April (2nd Quarter/Spring) 2012.
“Entropy Attacks and Countermeasures in Wireless Network Coding”
Proc. of The Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec ’12), April (2nd Quarter/Spring) 2012.
“LINK: Location verification through Immediate Neighbors Knowledge”
7th International ICST Conference on Mobile and Ubiquitous Systems, December 2010.
“Remote Data Checking for Network Coding-based Distributed Storage Systems”
Proceedings of the Second ACM Cloud Computing Security Workshop (CCSW '10) / ACM, October (4th Quarter/Autumn) 2010.
“Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems”
Proceedings of the Third IEEE Wireless Network Coding Workshop (WiNC '10) / IEEE, June 2010.
“Tradeoffs between Security and Communication Performance in Wireless Mesh Networks”
Proceedings of the First IEEE International Workshop on Data Security and PrivAcy in wireless Networks (D-SPAN '10) / IEEE, June 2010.
“Practical Defenses Against Pollution Attacks in Intra-Flow Network Coding for Wireless Mesh Networks”
Proceedings of the Second ACM Conference on Wireless Network Security (WiSec '09), March 2009.
“Toward Secure Network Coding in Wireless Networks: Threats and Challenges”
Proceedings of The Fourth IEEE Workshop On Secure Network Protocols (NPSec '08) / IEEE, November 2008.
“Robust Remote Data Checking”
Proceedings of Fourth ACM International Workshop on Storage Security and Survivability (StorageSS '08), October (4th Quarter/Autumn) 2008.
COLLAPSE
Chapter
Bo Chen, Reza Curtmola, Jun Dai. 2017. “Auditable Version Control Systems in Untrusted Public Clouds.” In Ivan Mistrik, Rami Bahsoon, Nour Ali, Maritta Heisel, and Bruce Maxim (Eds.), pp. 353-366. Elsevier - Morgan Kaufmann, 2017.
Reza Curtmola, Bo Chen. 2016. “Availability, Recovery, and Auditing across Data Centers chapter in "Cloud Computing Security: Foundations and Challenges".” In John Vacca (Eds.), pp. 21 pages. CRC Press, 2016.
Reza Curtmola, Bo Chen. 2016. “Integrity Assurance for Data Outsourcing chapter in "Cloud Computing Security: Foundations and Challenges".” In John Vacca (Eds.), pp. 12 pages. CRC Press, 2016.
Manoop Talasila, Reza Curtmola, Cristian M. Borcea. 2015. “Mobile Crowd Sensing chapter in Handbook of Sensor Networking: Advanced Technologies and Applications.” In John Vacca (Eds.), pp. 23. CRC Press, 2015.
Reza Curtmola, Bo Chen. 2016. “Availability, Recovery, and Auditing across Data Centers chapter in "Cloud Computing Security: Foundations and Challenges".” In John Vacca (Eds.), pp. 21 pages. CRC Press, 2016.
Reza Curtmola, Bo Chen. 2016. “Integrity Assurance for Data Outsourcing chapter in "Cloud Computing Security: Foundations and Challenges".” In John Vacca (Eds.), pp. 12 pages. CRC Press, 2016.
Manoop Talasila, Reza Curtmola, Cristian M. Borcea. 2015. “Mobile Crowd Sensing chapter in Handbook of Sensor Networking: Advanced Technologies and Applications.” In John Vacca (Eds.), pp. 23. CRC Press, 2015.
Book
Cristian M. Borcea, Manoop Talasila, Reza Curtmola. 2016. “Mobile Crowdsensing.” 183 pages pp. Chapman and Hall/CRC, 2016. ISBN 1498738443.
Radu Sion, Reza Curtmola, Sven Dietrich, A Kiayias, J. M Miret, K Sako, F Sebe. 2010. “Workshops of the 2010 Financial Cryptography and Data Security Conference (Editors).” 257 p. pp. Lecture Notes in Computer Science / Springer, 2010. ISBN 978-3-642-14991-7.
Radu Sion, Reza Curtmola, Sven Dietrich, A Kiayias, J. M Miret, K Sako, F Sebe. 2010. “Workshops of the 2010 Financial Cryptography and Data Security Conference (Editors).” 257 p. pp. Lecture Notes in Computer Science / Springer, 2010. ISBN 978-3-642-14991-7.
Other
“POSTER: Remote Data Integrity Checking for Cloud Storage”
National Science Foundation: SaTC PI Meeting, January (1st Quarter/Winter) 2015.
“POSTER: Auditable Version Control Systems”
Stony Brook: National Security Institute (opening event), September 2014.
National Science Foundation: SaTC PI Meeting, January (1st Quarter/Winter) 2015.
“POSTER: Auditable Version Control Systems”
Stony Brook: National Security Institute (opening event), September 2014.