The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Scott Yilek: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Thomas Ristenpart, Scott Yilek
    The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2007, pp:228-245 [Conf]
  2. Dan Frankowski, Shyong K. Lam, Shilad Sen, F. Maxwell Harper, Scott Yilek, Michael Cassano, John Riedl
    Recommenders everywhere: : the WikiLens community-maintained recommender system. [Citation Graph (0, 0)][DBLP]
    Int. Sym. Wikis, 2007, pp:47-60 [Conf]

  3. Hedged Public-Key Encryption: How to Protect against Bad Randomness. [Citation Graph (, )][DBLP]


  4. Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine. [Citation Graph (, )][DBLP]


  5. Possibility and Impossibility Results for Encryption and Commitment Secure under Selective Opening. [Citation Graph (, )][DBLP]


  6. When private keys are public: results from the 2008 Debian OpenSSL vulnerability. [Citation Graph (, )][DBLP]


  7. Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions. [Citation Graph (, )][DBLP]


  8. The Round-Complexity of Black-Box Zero-Knowledge: A Combinatorial Characterization. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.001secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002