Nelly Fazio, Ph.D. - Publications

Affiliations: 
2006 New York University, New York, NY, United States 
Area:
Computer Science

9 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2014 Fazio N, Nicolosi AR, Perera IM. Broadcast steganography Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8366: 64-84. DOI: 10.1007/978-3-319-04852-9_4  0.352
2012 Fazio N, Perera IM. Outsider-anonymous broadcast encryption with sublinear ciphertexts Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7293: 225-242. DOI: 10.1007/978-3-642-30057-8_14  0.444
2011 Catalano D, Fazio N, Gennaro R, Nicolosi A. Public Key Cryptography - PKC 2011 Lecture Notes in Computer Science. 6571. DOI: 10.1007/978-3-642-19379-8  0.417
2009 Yao D, Fazio N, Dodis Y, Lysyanskaya A. Forward-secure hierarchical IBE with applications to broadcast encryption Cryptology and Information Security Series. 2: 100-118. DOI: 10.3233/978-1-58603-947-9-100  0.657
2009 Atallah MJ, Blanton M, Fazio N, Frikken KB. Dynamic and efficient key management for access hierarchies Acm Transactions On Information and System Security. 12. DOI: 10.1145/1455526.1455531  0.49
2004 Yao D, Dodis Y, Fazio N, Lysyanskaya A. ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption Proceedings of the Acm Conference On Computer and Communications Security. 354-363.  0.655
2003 Dodis Y, Fazio N, Kiayias A, Yung M. Scalable Public-Key Tracing and Revoking Proceedings of the Annual Acm Symposium On Principles of Distributed Computing. 22: 190-199. DOI: 10.1007/S00446-004-0120-5  0.599
2003 Dodis Y, Fazio N. Public key broadcast encryption for stateless receivers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2696: 61-80.  0.584
2003 Dodis Y, Fazio N. Public key trace and revoke scheme secure against adaptive chosen ciphertext attack Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2567: 100-115.  0.65
Show low-probability matches.