|
Search the dblp DataBase
Reza Curtmola:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Reza Curtmola, Aniello Del Sorbo, Giuseppe Ateniese
On the Performance and Analysis of DNS Security Extensions. [Citation Graph (0, 0)][DBLP] CANS, 2005, pp:288-303 [Conf]
- Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky
Searchable symmetric encryption: improved definitions and efficient constructions. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2006, pp:79-88 [Conf]
- Baruch Awerbuch, Robert G. Cole, Reza Curtmola, David Holmer, Herbert Rubens
Dynamics of Learning Algorithms for the On-Demand Secure Byzantine Routing Protocol. [Citation Graph (0, 0)][DBLP] ESAS, 2006, pp:98-112 [Conf]
- Giuseppe Ateniese, Reza Curtmola, Breno de Medeiros, Darren Davis
Medical Information Privacy Assurance: Cryptographic and System Aspects. [Citation Graph (0, 0)][DBLP] SCN, 2002, pp:199-218 [Conf]
- Reza Curtmola, Seny Kamara
A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2007, v:171, n:1, pp:57-69 [Journal]
Provable data possession at untrusted stores. [Citation Graph (, )][DBLP]
MR-PDP: Multiple-Replica Provable Data Possession. [Citation Graph (, )][DBLP]
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks. [Citation Graph (, )][DBLP]
Robust remote data checking. [Citation Graph (, )][DBLP]
On the Pitfalls of High-Throughput Multicast Metrics in Adversarial Wireless Mesh Networks. [Citation Graph (, )][DBLP]
BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks. [Citation Graph (, )][DBLP]
Secure network coding for wireless mesh networks: Threats, challenges, and directions. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|