Nelly Fazio, Ph.D.
Affiliations: | 2006 | New York University, New York, NY, United States |
Area:
Computer ScienceGoogle:
"Nelly Fazio"Parents
Sign in to add mentorYevgeniy Dodis | grad student | 2006 | NYU | |
(On cryptographic techniques for Digital Rights Management.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Fazio N, Nicolosi AR, Perera IM. (2014) Broadcast steganography Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8366: 64-84 |
Fazio N, Perera IM. (2012) Outsider-anonymous broadcast encryption with sublinear ciphertexts Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7293: 225-242 |
Catalano D, Fazio N, Gennaro R, et al. (2011) Public Key Cryptography - PKC 2011 Lecture Notes in Computer Science. 6571 |
Yao D, Fazio N, Dodis Y, et al. (2009) Forward-secure hierarchical IBE with applications to broadcast encryption Cryptology and Information Security Series. 2: 100-118 |
Atallah MJ, Blanton M, Fazio N, et al. (2009) Dynamic and efficient key management for access hierarchies Acm Transactions On Information and System Security. 12 |
Yao D, Dodis Y, Fazio N, et al. (2004) ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption Proceedings of the Acm Conference On Computer and Communications Security. 354-363 |
Dodis Y, Fazio N, Kiayias A, et al. (2003) Scalable Public-Key Tracing and Revoking Proceedings of the Annual Acm Symposium On Principles of Distributed Computing. 22: 190-199 |
Dodis Y, Fazio N. (2003) Public key broadcast encryption for stateless receivers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2696: 61-80 |
Dodis Y, Fazio N. (2003) Public key trace and revoke scheme secure against adaptive chosen ciphertext attack Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2567: 100-115 |