Cristina Nita-Rotaru

Professor of Computer Science
College of Computer and Information Science
Northeastern University

email: c.nitarotaru@neu.edu
office: West Village H 258
[ github | nds2 | sec | sysnet ]

``There is only one success - to be able to spend your life in your own way.'' Christopher Morley

Cristina Nita-Rotaru

Publications


[Journals]   [Conferences]   [Education and Distance Learning]   [Posters]   [Technical Reports]  

Journals

Toward a Taxonomy and Attacker Model for Secure Routing Protocols. M. Hollick, C. Nita-Rotaru, P. Papadimitratos, A. Perrig, Stefan Schmid. In ACM SIGCOMM Computer Communication Review, Volume 47 Issue 1, January 2017.
Adversarial Testing of Wireless Routing Implementations. E. Hoque, H. Lee, R. Potharaju, C. Killian. and C. Nita-Rotaru. In IEEE/ACM Transactions on Networking, vol. 24, issue 6, 2016.
Gatling: Automatic Performance Attack Discovery in Large-Scale Distributed Systems. H. Lee, J. Seibert, D. Fistrovic, C. Killian, and C. Nita-Rotaru. ACM Transactions on Systems and Information Security, issue 4, vol. 17. April 2015.
Security of Electrostatic Field Persistent Routing: Attacks and Defense Mechanisms. O. C. Ghica, C. Nita-Rotaru, G. Trajcevsky, and P. Scheuermann. Elsevier Journal of Ad Hoc Networks, vol. 36, part 1, Jan. 2016.
Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes. A. Newell, D. Obenshain, T. Tantillo, C. Nita-Rotaru, and Y. Amir. IEEE Transactions on Dependable and Secure Systems, vol. 12, issue 6, Nov-Dec. 2015.
Closing the Pandora's Box: Defenses for Thwarting Epidemic Outbreaks in Mobile Adhoc Networks. R. Potharaju, E. Hoque, C. Nita-Rotaru, S. S. Venkatesh, and S. Sarkar. Elsevier Journal of Ad Hoc Networks, vol. 24, Jan. 2015.
Node-Capture Resilient Key Establishment in Sensor Networks: Design Space and New Protocols. A. Newell, H. Yao, A. Ryker, T. Ho, and C. Nita-Rotaru. ACM Computing Surveys, vol. 47, issue 2, December 2014.
Generating Summary Risk Scores for Mobile Applications. H. Peng, C. Gates, B. Sarma, N. Li, A. Qi, R. Potharaju, C. Nita-Rotaru and I. Molloy. IEEE Transactions on Dependable and Secure Systems, vol. 11, issue 3, May-June 2014.
Newton: Securing Virtual Coordinates by Enforcing Physical Laws. J. Seibert, S. Becker, C. Nita-Rotaru and R. State. IEEE/ACM Transactions on Networking, vol. 22, issue 3, June 2014. [PDF]
EFW: A Cross-Layer Metric for Reliable Routing in Wireless Mesh Networks with Selfish Participants. S. Paris, A. Capone, F. Martignon, and C. Nita-Rotaru. IEEE/ACM Transactions on Networking, vol. 21, issue 3, June 2013. [PDF]
On the Practicality of Cryptographic Defenses against Pollution Attacks in Wireless Network Coding. Andrew Newell, Jing Dong, and Cristina Nita-Rotaru. ACM Computing Surveys, vol. 45, issue 3, June 2013. [PDF]
Pollution Attacks and Defense in Inter-flow Network Coding Systems. J. Dong, R. Curtmola, C. Nita-Rotaru, and D. Yau. In IEEE Transactions on Dependable and Secure Systems, vol. 9 , issue 5, 2012. [PDF]
The Internet-wide Impact of P2P Traffic Localization on ISP Profitability. J. Seibert, R. Torres, M. Maffiano, M. Mella, C. Nita-Rotaru, and S. Rao. In IEEE/ACM Transactions on Networking, Dec. 2012. [PDF]
A Design for Securing Data Delivery in Mesh-Based Peer-to-Peer Streaming. J. Seibert, X. Sun, C. Nita-Rotaru, and S. Rao. Computer Networks, vol. 55, no. 12, August 2011. [PDF]
Practical Defenses Against Pollution Attacks in Wireless Network Coding. J. Dong, R. Curtmola, and C. Nita-Rotaru. In ACM Transactions on Systems and Information Security, vol. 14 no. 1, May 2011. [PDF]
Secure High-Throughput Multicast Routing in Wireless Mesh Networks. J. Dong, R. Curtmola, and C. Nita-Rotaru. In ACM Transactions on Mobile Computing, vol. 10 no. 5, May 2011. [PDF]
On the Accuracy of Virtual Coordinate Systems in Adversarial Networks. D. Zage and C. Nita-Rotaru. In ACM Transactions on Systems and Information Security, vol. 13, issue 4, December 2010. [PDF]
Mitigating Attacks against Virtual Coordinate System Based Routing in Wireless Sensor Networks. J. Dong, E. Ackermann, B. Bhavar, and C. Nita-Rotaru. In Transactions on Sensor Networks, vol 6., issue 4, 2010. [PDF]
Secure Network Coding for Wireless Mesh Networks: Threats, Challenges, and Directions. J. Dong, R. Curtmola, and C. Nita-Rotaru. In Computer Communications (Elsevier), vol.32. no. 17, November 2009. [PDF]
UNMASK: Utilizing Neighbor Monitoring for Attack Mitigation in Multihop Wireless Sensor Networks. I. Khalil, S. Bagchi, C. Nita-Rotaru, and N. B Schroff. In Journal of Ad Hoc and Sensor Networks}, pp. 148 -- 164, vol. 8, issue 2, March 2010. [PDF]
Secure Group Communication in Wireless Mesh Networks. J. Dong, K. E. Ackermann, C. Nita-Rotaru. In Ad Hoc Networks Journal (Elsevier), Special Issue: Privacy and Security in Wireless Sensor and Ad Hoc Networks, vol. 7, no. 8, November 2009. [PDF]
BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks. R. Curtmola and C. Nita-Rotaru. In IEEE Transactions on Mobile Computing (TMC), vol. 8, no. 4, April 2009. [PDF]
STEWARD: Scaling Byzantine Fault-Tolerant Replication to Wide Area Networks. Y. Amir, C. Danilov, D. Dolev, J. Kirsch, J. Lane, C. Nita-Rotaru, J. Olsen, and D. Zage. In IEEE Transactions on Dependable and Secure Computing, vol. 7, no.1, Jan. 2010. [PDF]
A Survey of Attack and Defense Techniques for Reputation Systems K. Hoffman, D. Zage and C. Nita-Rotaru. In ACM Computing Surveys, vol. 42, no. 1, March 2010. [PDF].
A Framework for Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks. A. Walters, D. Zage and C. Nita-Rotaru. In IEEE/ACM Transactions on Networking, vol. 16, no. 6, Dec. 2008. [PDF].
Virtual Classroom Extension for Effective Distance Education. C. Jia, R. Dondera, V. Popescu, C. Nita-Rotaru, M. Dark, and C. S. York. In IEEE Computer Graphics and Applications, Jan./Feb. 2008. [PDF]
JANUS: A Framework for Scalable and Secure Routing in Hybrid Wireless Networks. B. Carbunar, I. Ioannidis and C. Nita-Rotaru. In IEEE Transactions on Dependable and Secure Systems (TDSC), vol. 6, no.4, 2009. [PDF].
Enabling Confidentiality of Data Delivery in an Overlay Broadcasting System. R. Torres X. Sun, A. Walters, C. Nita-Rotaru and S. Rao. In Special Issue of IEEE JSAC on Advances in Peer-to-Peer Streaming Systems, vol. 25, no. 9, December 2007. [PDF].
ODSBR: An On-Demand Secure Byzantine Resilient Routing Protocol for Wireless Ad Hoc Networks. Baruch Awerbuch, Reza Curtmola, David Holmer, Cristina Nita-Rotaru and Herbert Rubens. In ACM Transactions on Information Systems Security (TISSEC), vol. 10. no.4, January 2008. [PDF].
Secure Spread: An Integrated Architecture for Secure Group Communication Yair Amir, Cristina Nita-Rotaru , Jonathan Stanton and Gene Tzudik. In IEEE Transactions on Dependable and Secure Computing (TDSC), vol. 2, no. 3, August 2005.[PDF].
On the Performance of Group Key Agreement Protocols. Yair Amir,Yongdae Kim,Cristina Nita-Rotaru, and Gene Tsudik. ACM Transactions on Information Systems Security (TISSEC), vol. 7, no. 3, August 2004. [PDF].
Secure Group Communication Using Robust Contributory Key Agreement. Yair Amir, Yongdae Kim,Cristina Nita-Rotaru,John Schultz, Jonathan Stanton, and Gene Tsudik. IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. 15, no. 5, pp. 468-480, May 2004. [PDF].

Conferences and Workshops

Taking a Long Look at QUIC: An Approach for Rigorous Evaluation of Rapidly Evolving Transport Protocols. Arash Molavi Kakhki, Samuel Jero, David Choffnes, Alan Mislove, Cristina Nita-Rotaru. IMC 2017, Nov. 2017. [PDF]
Chizpurfle: A Gray-Box Android Fuzzer for Vendor Service Customizations Antonio Ken Iannillo, Roberto Natella, Domenico Cotroneo, Cristina Nita-Rotaru. IEEE ISSRE 2017, September 2017.
BEADS: Automated Attack Discovery in OpenFlow-based SDN Systems. Samuel Jero, Xiangyu Bu, Hamed Okhravi, Cristina Nita-Rotaru, Richard Skowyra, Sonia Fahmy. RAID 2017, September 2017. [PDF]
Identifier Binding Attacks and Defenses in Software-Defined Networks. Samuel Jero, William Koch, Richard Skowyra, Hamed Okhravi, Cristina Nita-Rotaru, David Bigelow. USENIX Security 2017, August 2017. [PDF]
Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs. Endadul Hoque, Omar Chowdhury, Sze Yiu Chau, Cristina Nita-Rotaru, Ninghui Li. IEEE DSN 2017, June 2017.
SymCerts: Practical Symbolic Execution For Exposing Noncompliance in X.509 Certificate Validation Implementations. Sze Yiu Chau, Omar Chowdhury, Endadul Hoque, Huangyi Ge, Aniket Kate, Cristina Nita-Rotaru, Ninghui Li. IEEE Security and Privacy, May 2017.
Building Robust Distributed Systems and Network Protocols by Using Adversarial Testing and Behavioral Analysis. Endadul Hoque and Cristina Nita-Rotaru. IEEE Cybersecurity Development (SecDev), Nov. 2016.
Practical Intrusion-Tolerant Networks. D. Obenshain, T. Tantillo, A. Baby, J. Schultz, A. Newell, E.Hoque, Y. Amir and C. Nita-Rotaru. ICDCS 2016,
Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations. S. Jero, H. Lee, and C. Nita-Rotaru. In the 45th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), June 2015. Best paper award.
ConfSeer: Leveraging Customer Support Knowledge Bases for Automated Misconfiguration Detection. R. Potharaju, J. Chan, L. Hu, C. Nita-Rotaru, M. Wang, L. Zhang, N. Jain. VLDB 2015, Industrial Track.
How Secure and Quick is QUIC? Provable Security and Performance Analyses. R. Lychev, S. Jero, A. Boldyreva, and C. Nita-Rotaru. 36th IEEE Symposium on Security and Privacy (Oakland), May 2015. Awarded IETF/IRTF Applied Networking Research Prize, 2016.
On the Practicality of Integrity Attacks on Document-Level Sentiment Analysis. A. Newell, R. Potharaju. L. Xiang, and C. Nita-Rotaru. In the Seventh ACM Workshop on Artificial Intelligence and Security (AISec) with the 21st ACM Conference on Computer and Communications (CCS), Nov. 2014. H. Lee, J. Seibert, E. Hoque, C. Killian. and C. Nita-Rotaru. In ICDCS 2014.
Turret: A Platform for Automated Attack Finding in Unmodified Distributed System Implementations. H. Lee, J. Seibert, E. Hoque, C. Killian. and C. Nita-Rotaru. In ICDCS 2014.
Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes. A. Newell, D. Obenshain, T. Tantillo, C. Nita-Rotaru, and Y. Amir. DSN 2013, June 2013. [PDF]
Adversarial Testing of Wireless Routing Implementations. E. Hoque, H. Lee, R. Potharaju, C. Killian, and C. Nita-Rotaru. ACM WiSec 2013, Apr. 2013. [PDF]
Juggling the Jigsaw: Towards Automated Problem Inference from Network Trouble Tickets. R. Potharaju, N. Jain, and C. Nita-Rotaru. USENIX NSDI 2013, Apr. 2013. [PDF]
Using Probabilistic Generative Models For Ranking Risks of Android Apps. H. Peng, C. Gates, B. Sarma, N. Li, A. Qi, R. Potharaju, C. Nita-Rotaru and I. Molloy. ACM CCS 2012, Oct. 2012. [PDF]
Closing the Pandora's Box: Defenses for Thwarting Epidemic Outbreaks in Mobile Adhoc Networks. R. Potharaju, E. Hoque, C. Nita-Rotaru, S. S. Venkatesh, and S. Sarkar. IEEE MASS 2012, Oct. 2012. [PDF]
Access Control in Social Enterprise Applications: An Empirical Evaluation. R. Bhatti, C. Gaspard and C. Nita-Rotaru. In the Fifth International Workshop on Hot Topics in Peer-to-peer computing and Online Social Networking, in conjunction with ICDCS 2013, July 2013.
Securing Virtual Coordinates by Enforcing Physical Laws. J. Seibert, S. Becker, C. Nita-Rotaru, and R. State, IEEE ICDCS 2012. [PDF]
Android Permissions: A Perspective Combining Risks and Benefits. B. Sarma, C. Gates, N. Li, R. Potharaju, C. Nita-Rotaru, I. Molloy. ACM SACMAT 2012, June 2012. [PDF]
Entropy Attacks in Wireless Network Coding. A. Newell, R. Curtmola, and C. Nita-Rotaru. ACM Wireless Security Conference (WiSec) 2012, April 2012. [PDF]
Split Null Keys: A Null Space Based Defense for Pollution Attacks in Wireless Network Coding. A. Newell and C. Nita-Rotaru. IEEE SECON 2012, June 2012. [PDF]
On the Security of Persistent Electrostatic Field-based Routing in Wireless Sensor Networks. O. C. Ghica, C. Nita-Rotaru, G. Trajcevsky, and P. Scheuermann. Ninth European Dependable Computing Conference (EDCC) 2012, May 2012. [PDF]
Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques. R. Potharaju, A. Newell, C. Nita-Rotaru, X. Zhang. Proc. of International Symposium on Engineering Secure Software and Systems (ESoSS) 2012, Feb. 2012. [PDF]
Gatling: Automatic Attack Discovery in Large-Scale Distributed Systems. J. Seibert, HJ. Lee, C. Killian, and C. Nita-Rotaru. Proc. of NDSS 2012, Feb. 2012. [PDF]
Applying Game Theory to Analyze Attacks and Defenses in Virtual Coordinate Systems. S. Becker, J.Seibert, D. Zage, C. Nita-Rotaru, and R. State. Proc. of DSN 2011, June 2011. [PDF]
Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack. S. Becker, J. Seibert, C. Nita-Rotaru, and R. State. Proc. of RAID 2011, 20 pages, Sept. 2011. [PDF]
Removing the Blinders: Using Information to Mitigate Adversaries in Adaptive Overlays. David Zage, Charles Killian and Cristina Nita-Rotaru Proc. of the 5th International Conference on Network and System Security (NSS 2011), Sept. 2011. [PDF]
EFW: A Cross-Layer Metric for Reliable Routing in Wireless Mesh Networks with Selfish Participants. S. Paris, C. Nita-Rotaru, F. Martignon, and A. Capone. Proc. of IEEE Infocom Mini Conferences (INFOCOM-Mini), Shanghai, China, Apr. 2011. [PDF]
Omnify: Investigating the Visibility and Effectiveness of Copyright Monitors. R. Potharaju, J. Seibert, S. Fahmy, and C. Nita-Rotaru. Passive and Active Measurement Conference (PAM), 2011. [PDF]
Towards Securing Data Delivery in Peer-to-Peer Streaming. J. Seibert, X. Sun, C. Nita-Rotaru, and S. Rao. IEEE Conference on Communication Systems and Networks (COMSNETS), 2010. [PDF]
Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems Jing Dong, Reza Curtmola, Cristina Nita-Rotaru, and David Yau. In Workshop on Wireless Network Coding with SECON 2010.
SINE: Cache-Friendly Integrity for the Web. C. Gaspard, S. Goldberg, W. Itani, E. Bertino, and C. Nita-Rotaru. In Proceedings of 4th Workshop on Secure Network Protocols (NPSec) in conjunction with ICNP 2009, July 2009. [PDF]
Practical Defenses Against Pollution Attacks in Intra-Flow Network Coding for Wireless Mesh Networks. J. Dong, R. Curtmola, C. Nita-Rotaru. In the Second ACM Conference on Wireless Network Security (WiSec), Zurich, Switzerland, March 2009. [PDF]
Toward Secure Network Coding in Wireless Networks: Threats and Challenges. J. Dong, R. Curtmola, R. Sethi, and C. Nita-Rotaru. In Proceedings of 4th Workshop on Secure Network Protocols (NPSEC) in conjunction with IEEE ICNP, Orlando, Florida, Oct 2008. [PDF]
Mitigating Attacks against Virtual Coordinate System Based Routing in Wireless Sensor Networks. J. Dong, B. Bhavar, E. Ackermann, and C. Nita-Rotaru. In First ACM Conference on Wireless Network Security (WiSec), Alexandria, VA, March 2008. [PDF].
On the Pitfalls of Using High-Throughput Metrics in Adversarial Wireless Mesh Networks, J. Dong, R. Curtmola and C. Nita-Rotaru. In the Fifth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2008), San Francisco CA, June 2008. [PDF].
Experimental Comparison of Peer-to-Peer Streaming Overlays: An Application perspective. J. Seibert, D. Zage, S. Fahmy and C. Nita-Rotaru. In Proceedings of IEEE LCN 2008, Montreal, CA, Oct., 2008. [PDF].
Secure Group Communication in Wireless Mesh Networks. In Ninth IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WOWMOM), Newport Beach, CA, June, 2008. J. Dong, K. Ackermann, and Cristina Nita-Rotaru. [PDF].
On the Accuracy of Decentralized Network Coordinate Systems in Adversarial Networks. D. Zage and C. Nita-Rotaru. In the 14th ACM CCS, Alexandria, VA, USA, October 29 - November 2, 2007. [PDF].
BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks. R. Curtmola and C. Nita-Rotaru. In SECON 2007, June 2007, San Diego, CA. [PDF]
Enabling Confidentiality of Data Delivery in an Overlay Broadcasting System. R. Torres X. Sun, A. Walters, C. Nita-Rotaru and S. Rao. In INFOCOM 2007, Anchorage, Alaska. [PDF]
Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks. AAron Walters, David Zage and Cristina Nita-Rotaru, The 14th IEEE International Conference on Network Protocols November (ICNP) 12-15, 2006 Santa Barbara, California. [PDF].
Steward: Scaling Byzantine Fault-Tolerant Systems to Wide Area Networks. Yair Amir, Claudiu Danilov, Danny Dolev, Jonathan Kirsch, John Lane, Cristina Nita-Rotaru, Josh Olsen, David Zage, In The International Conference on Dependable Systems and Networks (DSN-2006), Philadelphia, PA, June 2006. [PDF]. Also Technical Report CSD TR 05-029. [PDF] .
A Byzantine Resilient Distributed Position Service. Josh Olsen, David Zage and Cristina Nita-Rotaru. Extended Abstract. In The International Conference on Dependable Systems and Networks (DSN-2006), Philadelphia, PA, June 2006.
Po2V: Network Layer Position Verification in Multi-Hop Wireless Networks. In IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WOWMOM), Niagara Falls, NY June, 2006. Xiaoxin Wu and Cristina Nita-Rotaru.
On the Survivability of Routing Protocols in Ad Hoc Wireless Networks. In IEEE Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm) 2005, Sept. 2005. B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru and H. Rubens. [PDF]
DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks. In IEEE Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm) 2005, Sept. 2005. I. Khalil, S. Bagchi and C. Nita-Rotaru. [PDF]
On the Security of Distributed Position Services. In IEEE Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm) 2005, Sept. 2005. X. Wu and C. Nita-Rotaru, [PDF].
WiViD: Visible Watermak Based Defense Against Phishing. In International Workshop of Digital Watermarking (IWDW), Sept. 2005. A. Shamara, M. Topkara, M. Atallah and C. Nita-Rotaru. [PDF].
SPASS: Scalable and Energy-Efficient Data Acquisition in Sensor Databases. In 4th International ACM Workshop on Data Engineering for Wireless and Mobile Access (MobiDe 2005) in conjunction with ACM SIGMOD/PODS. Baltimore, June 2005. M.H. Ali, Walid G. Aref and C. Nita-Rotaru. [PDF].
Scalable Routing in Hybrid Cellular and Ad-Hoc Networks. In IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, Taormina / Giardini Naxos, Italy June, 2005. Ioannis Ioannidis, Bogdan Carbunar, Cristina Nita-Rotaru. [PDF] [Extended Technical Report CSD TR# 05-006]
Secure Multi-Hop Infrastructure Access. In Wireless and Mobile Security Workshop, NDSS'05 Catamaran Resort Hotel San Diego, California, Feb. 2005. Baruch Awerbuch, Reza Curtmola, David Holmer, Cristina Nita-Rotaru and Herbert Rubens.
Synchronization Attacks Against 802.11. In Wireless and Mobile Security Workshop, NDSS'05 Catamaran Resort Hotel San Diego, California, Feb. 2005. Gunjan Khanna, Ammar Masood and Cristina Nita-Rotaru.
JANUS: Towards Robust and Malicious Resilient Routing in Hybrid Wireless Networks. In Workshop in Wireless Security WiSe 2004, In conjunction with MOBICOM 2004, Philadelphia, PA, Sept. 2004 Bogdan Carbunar, Ioanis Ioannidis and Cristina Nita-Rotaru. [PDF]
A Framework for Role-Based Access Control in Group Communication Systems. In 2004 International Workshop on Security in Parallel and Distributed Systems In conjunction with the 17th International Conference on Parallel and Distributed Computing Systems PDCS-2004 San Francisco , CA, September 15-17, 2004 Cristina Nita-Rotaru and Ninghui Li. [PDF], [Extended Technical Report CERIAS TR #2003-31] .
Coping with the Insider Threat in Scalable Distributed Information Systems Service. In FuDiCo II: (S.O.S.)Survivability: Obstacles and Solutions, 2nd International Workshop on Future Directions in Distributed Computing , University of Bologna Residential Center Bertinoro(Forli), Italy, June 23-25 2004. Yair Amir and Cristina Nita-Rotaru. [PDF].
Scaling Secure Group Communication Systems: Beyond Peer-to-Peer In the Proceedings of DISCEX3, Washington DC, April 22-24, 2003. Obsoletes Technical Report CNDS-2002-3, October 2002. Yair Amir, Cristina Nita-Rotaru, Jonathan Stanton, and Gene Tsudik. [PDF].
On the Performance of Group Key Agreement Protocols. Published in the Proceedings of the 22nd IEEE International Conference on Distributed Computing Systems, Vienna, Austria, July 2-5, 2002, short paper. Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, and Gene Tsudik. [PDF].
Stateless-Recipient Certified E-mail System based on Verifiable Encryption. Published in the Proceedings of RSA 2002 , McEnery Convention Center, San Jose, CA, USA, February 18-22, 2002. Giuseppe Ateniese and Cristina Nita-Rotaru. [PDF].
Exploring Robustness in Group Key Agreement. Published in the Proceedings of the 21th IEEE International Conference on Distributed Computing Systems, Phoenix, Arizona, April 16-19, 2001, pp 399-408. Nominated for Best Paper Award. Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, John Schultz, Jonathan Stanton, and Gene Tsudik. [PDF]. [Extended Technical Report CNDS #2000-4].
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments Published in the Proceedings of the 20th IEEE International Conference on Distributed Computing Systems, Taipei, Taiwan, April 10-13, 2000, pp 330-343. Yair Amir,Giuseppe Ateniese, Damian Hasse, Yongdae Kim,Cristina Nita-Rotaru, Theo Schlossnagle, John Schultz, Jonathan Stanton, and Gene Tsudik. [PDF].
An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. In ACM Workshop on Wireless Security (WiSe), Atlanta, Georgia, September 28 2002. Baruch Awerbuch, Dave Holmer,Cristina Nita-Rotaru, and Herbert Rubens. [PDF].
High Performance, Secure, Robust and Transparent Messaging Service. In FuDiCo 2002: International Workshop on Future Directions in Distributed Computing , Bertinoro(Forli), Italy, June 3-7 2002. Yair Amir, Claudiu Danilov, and Cristina Nita-Rotaru. [PS].
Framework for Authentication and Access Control of Client-Server Group Communication Systems Published in the Proceedings of the Third International Workshop on Networked Group Communication, London, UK November 7-9 2001. Yair Amir, Cristina Nita-Rotaru,and Jonathan Stanton. [PS], [Extended Technical Report CNDS #2001-2].

Education

A Multi-Expertise Application-Driven Class. In the 38th ACM Technical Symposium on Computer Science Education SIGCSE 2007, C. Nita-Rotaru, M. Dark and V. Popescu.
Evaluating Interactivity and Presence in an Online Distance Learning System. In Frontiers in Education (FIE) 2007, M. Dark, C. York, V. Popescu and C. Nita-Rotaru.
A Pilot Study on the Design Effectiveness of a New Distance Learning System. In American Educational Research Association(AERA) 2008, Advanced Technologies for Learning (ATL) SIG. M. Dark, C. York, D. Yang, V. Popescu and C. Nita-Rotaru.

Posters

Pandora: A Platform for Worm Simulations in Wireless Networks In MOBICOM 2010, Poster, in ACM Mobile Computing and Communications Review,Chicago, IL, Sept 2008. R. Potharaju and C. Nita-Rotaru.
A Cross-Layer Reliability Metric for Wireless Mesh Networks with Selfish Participants. In MOBICOM 2010, Poster, in ACM Mobile Computing and Communications Review, Chicago, IL, Sept 2008. S. Paris, C. Nita-Rotaru, A. Capone, F. Martignon.
iBFriendU: Leveraging 3-Cliques to Enhance Infiltration Attacks in Online Social Networks In ACM CCS 2010, Poster, Chicago, IL, Oct. 2008. R. Potharaju and C. Nita-Rotaru.
STAMP: Toward Reclaiming Email Address Privacy. In NSDI 2008, Poster, San Francisco, CA, April 2008. K. E. Ackerman, C. Gaspard, R. Kompella and C. Nita-Rotaru.
Attacks Against Virtual Coordinate System Based Routing in Wireless Sensor Networks. In INFOCOM 2007, Poster, Anchorage, AK, May 2007. J. Dong, B. Bavar and C. Nita-Rotaru.
Secure Multicast Routing in Wireless Networks, In MOBICOM 2006, Poster, Los Angeles, CA, September 2006. R. Curtmola and Cristina Nita-Rotaru.
Analysis of Malicious Abstract Faults in Adaptive Measurement-Based Overlay Networks, In SOSP 2005, Poster, Brighton, UK, October 2005. A. Walters and C. Nita-Rotaru.
Network Layer Position Verification In MobiHoc 2005, Poster , Urbana-Champaign, IL, May 2005. X. Wu and C. Nita-Rotaru.

Technical Reports

Enhancing Distributed Systems with Mechanisms to Cope with Malicious Clients. Yair Amir, Claudiu Danilov, John Lane, Michal Miskin-Amir, Cristina Nita-Rotaru [PDF] .
DAISY: Increasing Scalability and Robustness of Anonymity Systems Chi-Bun Chan and Cristina Nita-Rotaru. Technical Report CSD TR #04-018. Oct. 2004. [PDF] .
Robust Security Mechanisms for Data Streams Systems Mohamed Ali, Mohamed ElTabakh, and Cristina Nita-Rotaru. Technical Report CSD TR #04-019, May 2004. [PDF] .


Send your comments and questions to Cristina Nita-Rotaru