The SCEAS System
Navigation Menu

Search the dblp DataBase


Gene Itkis: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Gene Itkis, Robert McNerney, Scott Russell
    Intrusion-Resilient Secure Channels. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:238-253 [Conf]
  2. Gene Itkis, Peng Xie
    Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:151-168 [Conf]
  3. Gene Itkis
    Cryptographic tamper evidence. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:355-364 [Conf]
  4. Gene Itkis, Leonid Reyzin
    Forward-Secure Signatures with Optimal Signing and Verifying. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2001, pp:332-354 [Conf]
  5. Gene Itkis, Leonid Reyzin
    SiBIR: Signer-Base Intrusion-Resilient Signatures. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:499-514 [Conf]
  6. Shimon Even, Gene Itkis, Sergio Rajsbaum
    On Mixed Connectivity Certificates (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ESA, 1995, pp:1-16 [Conf]
  7. Gene Itkis, Leonid A. Levin
    Power of Fast VLSI Models Is Insensitive to Wires' Thinness [Citation Graph (0, 0)][DBLP]
    FOCS, 1989, pp:402-407 [Conf]
  8. Gene Itkis, Leonid A. Levin
    Fast and Lean Self-Stabilizing Asynchronous Protocols [Citation Graph (0, 0)][DBLP]
    FOCS, 1994, pp:226-239 [Conf]
  9. Ran Canetti, Juan A. Garay, Gene Itkis, Daniele Micciancio, Moni Naor, Benny Pinkas
    Multicast Security: A Taxonomy and Some Efficient Constructions. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1999, pp:708-716 [Conf]
  10. Gene Itkis
    Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal Assumptions. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:102-118 [Conf]
  11. Gene Itkis, Leonid A. Levin
    Flat Holonomies on Automata Networks. [Citation Graph (0, 0)][DBLP]
    STACS, 2006, pp:23-49 [Conf]
  12. Nenad Dedic, Gene Itkis, Leonid Reyzin, Scott Russell
    Upper and Lower Bounds on Black-Box Steganography. [Citation Graph (0, 0)][DBLP]
    TCC, 2005, pp:227-244 [Conf]
  13. Gene Itkis, Chengdian Lin, Janos Simon
    Deterministic, Constant Space, Self-Stabilizing Leader Election on Uniform Rings. [Citation Graph (0, 0)][DBLP]
    WDAG, 1995, pp:288-302 [Conf]
  14. John W. Byers, Jeffrey Considine, Gene Itkis, Mei Chin Cheng, Alex Yeung
    Securing bulk content almost for free. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:3, pp:280-290 [Journal]
  15. Shimon Even, Gene Itkis, Sergio Rajsbaum
    On Mixed Connectivity Certificates. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1998, v:203, n:2, pp:253-269 [Journal]

  16. Flat Holonomies on Automata Networks [Citation Graph (, )][DBLP]

  17. Upper and Lower Bounds on Black-Box Steganography [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002