Publications, Technical Reports, Internet Drafts

See my Google Scholar profile for a complete collection of my publications.

Conference Proceedings

  1. Namespace Tunnels in Content-Centric Networks
    I. Oliviera-Nunes, G. Tsudik, and C. A. Wood
    PDF slides code

  2. Mitigating On-Path Adversaries in Content-Centric Networks
    C. Ghali, G. Tsudik, and C. A. Wood
    PDF slides code

  3. When Encryption is Not Enough -- Privacy Attacks in Content-Centric Networking
    C. Ghali, G. Tsudik, and C. A. Wood
    PDF slides code

  4. Closing the Floodgate with Stateless Content-Centric Networking Best Paper Award
    C. Ghali, G. Tsudik, E. Uzun, and C. A. Wood
    PDF slides code

  5. Protecting the Long Tail - Transparent Packet Security in Content-Centric Networks
    C. A. Wood
    PDF slides code

  6. Mobile Sessions in Content-Centric Networks
    M. Mosko, E. Uzun, and C. A. Wood
    PDF slides code

  7. Secure Off-Path Replication in Content-Centric Networks
    M. Mosko and C. A. Wood
    PDF slides

  8. (The Futility of) Data Privacy in Content-Centric Networking
    C. Ghali, G. Tsudik, and C. A. Wood
    PDF slides

  9. Network Names in Content-Centric Networking
    C. Ghali, G. Tsudik, and C. A. Wood
    PDF slides code

  10. Trust in Information-Centric Networking - From Theory to Practice
    C. Tschudin, E. Uzun, and C. A. Wood
    PDF slides code

  11. BEAD - Best Effort Autonomous Deletion in Content-Centric Networking
    C. Ghali, G. Tsudik, and C. A. Wood
    PDF slides code

  12. Practical Accounting in Content-Centric Networking
    C. Ghali, G. Tsudik, C. A. Wood, and E. Yeh
    PDF slides

  13. AC3N - Anonymous communication in Content-Centric Networking
    G. Tsudik, E. Uzun, and C. A. Wood
    PDF slides

  14. Secure Fragmentation for Content-Centric Networking
    M. Mosko and C. A. Wood
    PDF

  15. Interest-Based Access Control for Information Centric Networks
    C. Ghali, M. A. Schlosberg, G. Tsudik, and C. A. Wood
    PDF slides

  16. Secure Fragmentation for Content-Centric Networks Best Paper Award
    C. Ghali, A. Narayanan, D. Oran, G. Tsudik, and C. A. Wood
    PDF slides

  17. An Encryption-Based Access Control Framework for Content-Centric Networking
    J. Kurihara, C. A. Wood, and E. Uzun
    PDF slides

  18. Mission Control - A Performance Metric and Analysis of Control Logic for Pipelined Architectures on FPGAs
    S. Skalicky, S. Lopez, M. Lukowiak, and C. A. Wood
    PDF slides

  19. Flexible End-to-End Content Security in CCN
    C. A. Wood and E. Uzun
    PDF slides

  20. High Level Synthesis - Where Are We? A Case Study on Matrix Multiplication
    S. Skalicky, C. A. Wood, M. Lukowiak, and M. Ryan
    PDF slides

  21. Developing an Applied, Security-Oriented Computing Curriculum
    M. Lukowiak, A. Meneely, S. Radziszowski, J. Vallino, and C. Wood

  22. Chaos-Based Symmetric Key Cryptosystems
    C. A. Wood
    slides

  23. Keyloggers in Cybersecurity Education
    C. A. Wood and R. K. Raj
    PDF slides

Journal Articles

  1. Privacy-Aware Caching in Information-Centric Networking
    G. Acs, M. Conti, P. Gasti, C. Ghali, G. Tsudik, and C. A. Wood
    PDF

  2. Can We Make a Cake and Eat It Too? A Discussion of ICN Security and Privacy
    E. Ngai, B. Ohlman, G. Tsudik, E. Uzun, M. Wahlisch, and C. A. Wood
    PDF

  3. Stochastic Analysis and Modeling of a Tree-Based Group Key Distribution Method in Tactical Wireless Networks
    P. Bajorski, A. Kaminsky, M. Kurdziel, M. Lukowiak, S. Radziszowski, and C. Wood

  4. A Complete L(2,1) Span Characterization for Small Trees
    C. A. Wood and J. Jacob
    PDF

  5. Cybersecurity Education - Bridging the Gap between Hardware and Software Domains
    M. Lukowiak, S. Radziszowski, J. Vallino, and C. Wood

Posters

  1. A Network-Agnostic Data Framework and API for CCN
    G. Scott and C. A. Wood

  2. Secure Prefix Registration in CCN
    M. Mosko, G. Scott, I. Solis, and C. A. Wood

Theses

  1. Large Substitution Boxes with Efficient Combinational Implementations
    C. A. Wood
    PDF slides

Technical Reports

  1. Affine-Power S-Boxes over Galois Fields with Area-Optimized Logic Implementations
    C. Wood, M. Lukowiak, S. Radziszowski
    PDF

  2. Content-Centric Networking - Architectural Overview and Protocol Description
    M. Mosko, I. Solis, and C. A. Wood
    PDF

  3. Information-centric Networking Security (Dagstuhl Seminar 16251)
    E. Ngai, B. Ohlman, G. Tsudik, E. Uzun, and C. A. Wood
    PDF

  4. Living in a PIT-less World - A Case Against Stateful Forwarding in Content-Centric Networking
    C. Ghali, G. Tsudik, E. Uzun, C. A. Wood
    PDF

  5. Practical Accounting in Content-Centric Networking (extended version)
    C. Ghali, G. Tsudik, C. A. Wood, E. Yeh
    PDF

  6. Interest-Based Access Control for Content Centric Networks (extended version)
    C. Ghali, M. A. Schlosberg, G. Tsudik, C. A. Wood
    PDF

  7. Network-Agnostic Systems in a Networked World
    G. Scott and C. A. Wood
    PDF

  8. AC3N - An API and Service for Anonymous Communication in Content-Centric Networking (Extended Version)
    G. Tsudik, E. Uzun, and C. A. Wood
    PDF

  9. Secure Fragmentation for Content-Centric Networks (extended version)
    C. Ghali, A. Narayanan, D. Oran, G. Tsudik, C. A. Wood
    PDF

  10. Application-Layer Gateway for IP and Content Centric Network Interoperability
    G. Scott and C. A. Wood
    PDF

Internet Drafts

  1. Post Sockets, An Abstract Programming Interface for the Transport Layer
    B. Trammell, C. Perkins, M. Kuehlewind, T. Pauly, C. A. Wood
    HTML TXT

  2. Separating Crypto Negotiation and Communication
    M. Kuehlewind, T. Pauly, C. A. Wood
    HTML TXT

  3. A Survey of Transport Security Protocols
    T. Pauly and C. A. Wood
    HTML TXT

  4. CCNx Semantics
    M. Mosko, I. Solis, and C. A. Wood
    HTML TXT

  5. CCNx Messages in TLV Format
    M. Mosko, I. Solis, and C. A. Wood
    HTML TXT

  6. The CCNx URI Scheme
    M. Mosko and C. A. Wood
    HTML TXT

  7. CCNx Key Exchange Protocol Version 1.0
    M. Mosko, E. Uzun, and C. A. Wood
    HTML TXT

  8. Encrypted Sessions In CCNx (ESIC)
    M. Mosko and C. A. Wood
    HTML TXT

  9. File-Like ICN Collection (FLIC)
    C. Tschudin and C. A. Wood
    HTML TXT

  10. Content-Locked Encryption and Authentication of Nameless Objects
    C. A. Wood
    HTML TXT

Talks and Presentations

  1. "Transport Security and Crypto Separation," IETF TAPS WG, Prague, Czech Republic. July 18, 2017..

  2. "Adoption Challenges and Prospects of Information-Centric Fog Computing," Workshop on Information-Centric Fog Computing (ICFC) at IFIP Networking 2017.

  3. "Your Apps and Evolving Network Security Standards," WWDC 2017.

  4. "Security and Privacy Analysis of NSF Future Internet Architectures," ICNRG Interim Meeting, Chicago, USA. March 26, 2017.

  5. "Content-Centric Networking - Overview, Open Problems, Closed Future?," Gene Tsudik's Network and Distributed Systems Security course, UCI. February 21, 2017..

  6. "A Study of Privacy and Anonymity in the DNS," DNS OARC 25, Dallas, TX, USA. October 15, 2016..

  7. "Access Control in Information-Centric Networks," Invited Talk at SRI, Menlo Park, CA, USA. August 17, 2016..

  8. "File-Like ICN Collection (FLIC)," ICNRG Meeting, Berlin, Germany.

  9. "CCNx Testrig," ICNRG Interim Meeting, Berlin, Germany.

  10. "Secure Transport Offload with Encrypted PEPs," ICNRG Interim Meeting, Berlin, Germany.

  11. "Group Key Encryption," ICNRG Interim Meeting, Berlin, Germany.

  12. "CDN Architecture Pain Points and ICN Cures?," ICNRG Interim Meeting, Berlin, Germany.

  13. "Forward Secrecy in ICN?," Dagstuhl Seminar 16251, Schloss Dagstuhl, Wadern, Germany.

  14. "Cryptographic Algorithms and Security Protocols for ICN," Dagstuhl Seminar 16251, Schloss Dagstuhl, Wadern, Germany.

  15. "Let's Check Let's Encrypt - A Tool for Code-Driven Threat Modeling," BSidesROC, Rochester, NY, USA.

  16. "Session-Based Content Distribution with CCNx-KE," ICNRG Interim Meeting, Buenos Aires, Argentina.

  17. "CCNx-KE vs (D)TLS," ICNRG Interim Meeting, Buenos Aires, Argentina.

  18. "Private Communication in ICN," ICNRG Interim Meeting, Buenos Aires, Argentina.

  19. "TLV Encryption and Packet Encapsulation," ICNRG Interim Meeting, Paris, France.

  20. "CCNx Key Exchange - Updates," ICNRG Interim Meeting, Paris, France.

  21. "FLIC Manifests," ICNRG Interim Meeting, Paris, France.

  22. "CCNx Key Exchange," IETF 94 ICNRG Meeting, Yokohama, Japan.

  23. "Static Manifest Requirements," IETF 94 ICNRG Meeting, Yokohama, Japan.

  24. "CCNx over UDP," IETF ICNRG Interim Meeting, San Francisco, CA.

  25. "Manifests," IETF ICNRG Interim Meeting, San Francisco, CA.

  26. "Efficient Security Bindings for Information Centric Networks," CCNxCon 2015, Palo Alto Research Center, Palo Alto, CA. May 20, 2015.

  27. "Handling Trust Enforcement," CCNxCon 2015, Palo Alto Research Center, Palo Alto, CA. May 20, 2015.

  28. "Digital Signatures and Implicit Certificates," Dr. Stanislaw Radziszowski's (CS@RIT), Crypto II course, May 5, 2015.

  29. "On the L(2, 1) Labeling of Trees," Joint Mathematics Meetings, Baltimore, MD. January 15-18, 2014..

  30. "Secure Content Dissemination in Content Centric Networking," CCNxCon 2013, Palo Alto Research Center, Palo Alto, CA. September 5, 2013..

  31. "Cryptographic S-boxes," Dr. Stanislaw Radziszowski's (CS@RIT) Crypto II course, April 8, 2013.

  32. "Characterization Results for the L(2,1)-Labeling Problem on Trees," AMS Sectional Meeting, RIT, Rochester, NY. September 22, 2012..

  33. "Chaos-Based Symmetric Key Cryptosystems," RIT Graduate Research Symposium, RIT, Rochester, NY. July 22, 2011..

  34. "Layered Driver Rootkit Detection on Microsoft Windows PCs," RIT Undergraduate Research Symposium, RIT, Rochester, NY. August 24, 2009..

Patents

  1. "Flexible command and control in content centric networks," G. Scott, C. Wood, EP Patent App. EP20,160,174,077.

  2. "Transport stack name scheme and identity management," G. Scott, C. Wood, US Patent App. 14/746,490.

  3. "A network-layer application-specific trust model," E. Uzun, C. A. Wood, M. Mosko, EP Patent App. EP20,160,150,357.

  4. "Content negotiation in a content centric network," I. Solis, G. Scott, C. A. Wood, EP Patent App. EP20,160,180,664.

  5. "Network named fragments in a content centric network," M. Mosko, C. A. Wood, EP Patent App. EP20,160,186,454.

  6. "Access control framework for information centric networking," E. Uzun, J. Kurihara, C. A. Wood, US Patent 9,552,493.

  7. "Order encoded manifests in a content centric network," M. Mosko, I. Solis, G. Scott, C. A. Wood, US Patent App. 14/595,102.

  8. "Electronic Key Management Using PKI to Support Group Key Establishment in the Tactical Environment," P. Bajorski, A. Kaminsky, M. Kurdziel, M. Lukowiak, S. P. Radziszowski, and C. Wood, WO Patent App. PCT/US2014/015,023..