Nelly Fazio, Ph.D. - Publications
Affiliations: | 2006 | New York University, New York, NY, United States |
Area:
Computer ScienceYear | Citation | Score | |||
---|---|---|---|---|---|
2014 | Fazio N, Nicolosi AR, Perera IM. Broadcast steganography Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8366: 64-84. DOI: 10.1007/978-3-319-04852-9_4 | 0.352 | |||
2012 | Fazio N, Perera IM. Outsider-anonymous broadcast encryption with sublinear ciphertexts Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7293: 225-242. DOI: 10.1007/978-3-642-30057-8_14 | 0.444 | |||
2011 | Catalano D, Fazio N, Gennaro R, Nicolosi A. Public Key Cryptography - PKC 2011 Lecture Notes in Computer Science. 6571. DOI: 10.1007/978-3-642-19379-8 | 0.417 | |||
2009 | Yao D, Fazio N, Dodis Y, Lysyanskaya A. Forward-secure hierarchical IBE with applications to broadcast encryption Cryptology and Information Security Series. 2: 100-118. DOI: 10.3233/978-1-58603-947-9-100 | 0.657 | |||
2009 | Atallah MJ, Blanton M, Fazio N, Frikken KB. Dynamic and efficient key management for access hierarchies Acm Transactions On Information and System Security. 12. DOI: 10.1145/1455526.1455531 | 0.49 | |||
2004 | Yao D, Dodis Y, Fazio N, Lysyanskaya A. ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption Proceedings of the Acm Conference On Computer and Communications Security. 354-363. | 0.655 | |||
2003 | Dodis Y, Fazio N, Kiayias A, Yung M. Scalable Public-Key Tracing and Revoking Proceedings of the Annual Acm Symposium On Principles of Distributed Computing. 22: 190-199. DOI: 10.1007/S00446-004-0120-5 | 0.599 | |||
2003 | Dodis Y, Fazio N. Public key broadcast encryption for stateless receivers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2696: 61-80. | 0.584 | |||
2003 | Dodis Y, Fazio N. Public key trace and revoke scheme secure against adaptive chosen ciphertext attack Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2567: 100-115. | 0.65 | |||
Show low-probability matches. |