The SCEAS System
Navigation Menu

Search the dblp DataBase


Breno de Medeiros: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Mike Burmester, Tri Van Le, Breno de Medeiros
    Towards Provable Security for Ubiquitous Applications. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:295-312 [Conf]
  2. Giuseppe Ateniese, Breno de Medeiros
    Efficient Group Signatures without Trapdoors. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:246-268 [Conf]
  3. Giuseppe Ateniese, Jan Camenisch, Breno de Medeiros
    Untraceable RFID tags via insubvertible encryption. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:92-101 [Conf]
  4. Tri Van Le, Mike Burmester, Breno de Medeiros
    Universally composable and forward-secure RFID authentication and authenticated key exchange. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:242-252 [Conf]
  5. Giuseppe Ateniese, Daniel H. Chou, Breno de Medeiros, Gene Tsudik
    Sanitizable Signatures. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:159-177 [Conf]
  6. Giuseppe Ateniese, Breno de Medeiros
    Identity-Based Chameleon Hash and Applications. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:164-180 [Conf]
  7. Seny Kamara, Breno de Medeiros, Susanne Wetzel
    Secret locking: Exploring new approaches to biometric key encapsulation. [Citation Graph (0, 0)][DBLP]
    ICETE, 2005, pp:254-261 [Conf]
  8. Giuseppe Ateniese, Breno de Medeiros, Michael T. Goodrich
    TRICERT: A Distributed Certified E-Mail Scheme. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  9. Giuseppe Ateniese, Reza Curtmola, Breno de Medeiros, Darren Davis
    Medical Information Privacy Assurance: Cryptographic and System Aspects. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:199-218 [Conf]
  10. Giuseppe Ateniese, Breno de Medeiros
    On the Key Exposure Problem in Chameleon Hashes. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:165-179 [Conf]
  11. Giuseppe Ateniese, Breno de Medeiros
    Anonymous E-prescriptions. [Citation Graph (0, 0)][DBLP]
    WPES, 2002, pp:19-31 [Conf]

  12. The Security of EPC Gen2 Compliant RFID Protocols. [Citation Graph (, )][DBLP]

  13. Secure EPC Gen2 Compliant Radio Frequency Identification. [Citation Graph (, )][DBLP]

  14. Provably Secure Grouping-Proofs for RFID Tags. [Citation Graph (, )][DBLP]

  15. Robust, anonymous RFID authentication with constant key-lookup. [Citation Graph (, )][DBLP]

  16. E-Crime Investigative Technologies. [Citation Graph (, )][DBLP]

  17. X-Online: An Online Interface for Digital Decryption Tools. [Citation Graph (, )][DBLP]

  18. Password Cracking Using Probabilistic Context-Free Grammars. [Citation Graph (, )][DBLP]

  19. Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer. [Citation Graph (, )][DBLP]

  20. Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer. [Citation Graph (, )][DBLP]

Search in 0.005secs, Finished in 0.007secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002