Nelly Fazio, Ph.D.

Affiliations: 
2006 New York University, New York, NY, United States 
Area:
Computer Science
Google:
"Nelly Fazio"

Parents

Sign in to add mentor
Yevgeniy Dodis grad student 2006 NYU
 (On cryptographic techniques for Digital Rights Management.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Fazio N, Nicolosi AR, Perera IM. (2014) Broadcast steganography Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8366: 64-84
Fazio N, Perera IM. (2012) Outsider-anonymous broadcast encryption with sublinear ciphertexts Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7293: 225-242
Catalano D, Fazio N, Gennaro R, et al. (2011) Public Key Cryptography - PKC 2011 Lecture Notes in Computer Science. 6571
Yao D, Fazio N, Dodis Y, et al. (2009) Forward-secure hierarchical IBE with applications to broadcast encryption Cryptology and Information Security Series. 2: 100-118
Atallah MJ, Blanton M, Fazio N, et al. (2009) Dynamic and efficient key management for access hierarchies Acm Transactions On Information and System Security. 12
Yao D, Dodis Y, Fazio N, et al. (2004) ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption Proceedings of the Acm Conference On Computer and Communications Security. 354-363
Dodis Y, Fazio N, Kiayias A, et al. (2003) Scalable Public-Key Tracing and Revoking Proceedings of the Annual Acm Symposium On Principles of Distributed Computing. 22: 190-199
Dodis Y, Fazio N. (2003) Public key broadcast encryption for stateless receivers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2696: 61-80
Dodis Y, Fazio N. (2003) Public key trace and revoke scheme secure against adaptive chosen ciphertext attack Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2567: 100-115
See more...