|
Search the dblp DataBase
Breno de Medeiros:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Mike Burmester, Tri Van Le, Breno de Medeiros
Towards Provable Security for Ubiquitous Applications. [Citation Graph (0, 0)][DBLP] ACISP, 2006, pp:295-312 [Conf]
- Giuseppe Ateniese, Breno de Medeiros
Efficient Group Signatures without Trapdoors. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2003, pp:246-268 [Conf]
- Giuseppe Ateniese, Jan Camenisch, Breno de Medeiros
Untraceable RFID tags via insubvertible encryption. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2005, pp:92-101 [Conf]
- Tri Van Le, Mike Burmester, Breno de Medeiros
Universally composable and forward-secure RFID authentication and authenticated key exchange. [Citation Graph (0, 0)][DBLP] ASIACCS, 2007, pp:242-252 [Conf]
- Giuseppe Ateniese, Daniel H. Chou, Breno de Medeiros, Gene Tsudik
Sanitizable Signatures. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:159-177 [Conf]
- Giuseppe Ateniese, Breno de Medeiros
Identity-Based Chameleon Hash and Applications. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2004, pp:164-180 [Conf]
- Seny Kamara, Breno de Medeiros, Susanne Wetzel
Secret locking: Exploring new approaches to biometric key encapsulation. [Citation Graph (0, 0)][DBLP] ICETE, 2005, pp:254-261 [Conf]
- Giuseppe Ateniese, Breno de Medeiros, Michael T. Goodrich
TRICERT: A Distributed Certified E-Mail Scheme. [Citation Graph (0, 0)][DBLP] NDSS, 2001, pp:- [Conf]
- Giuseppe Ateniese, Reza Curtmola, Breno de Medeiros, Darren Davis
Medical Information Privacy Assurance: Cryptographic and System Aspects. [Citation Graph (0, 0)][DBLP] SCN, 2002, pp:199-218 [Conf]
- Giuseppe Ateniese, Breno de Medeiros
On the Key Exposure Problem in Chameleon Hashes. [Citation Graph (0, 0)][DBLP] SCN, 2004, pp:165-179 [Conf]
- Giuseppe Ateniese, Breno de Medeiros
Anonymous E-prescriptions. [Citation Graph (0, 0)][DBLP] WPES, 2002, pp:19-31 [Conf]
The Security of EPC Gen2 Compliant RFID Protocols. [Citation Graph (, )][DBLP]
Secure EPC Gen2 Compliant Radio Frequency Identification. [Citation Graph (, )][DBLP]
Provably Secure Grouping-Proofs for RFID Tags. [Citation Graph (, )][DBLP]
Robust, anonymous RFID authentication with constant key-lookup. [Citation Graph (, )][DBLP]
E-Crime Investigative Technologies. [Citation Graph (, )][DBLP]
X-Online: An Online Interface for Digital Decryption Tools. [Citation Graph (, )][DBLP]
Password Cracking Using Probabilistic Context-Free Grammars. [Citation Graph (, )][DBLP]
Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer. [Citation Graph (, )][DBLP]
Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer. [Citation Graph (, )][DBLP]
Search in 0.100secs, Finished in 0.101secs
|