|
Search the dblp DataBase
Nelly Fazio:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Yevgeniy Dodis, Nelly Fazio
Public Key Broadcast Encryption for Stateless Receivers. [Citation Graph (0, 0)][DBLP] Digital Rights Management Workshop, 2002, pp:61-80 [Conf]
- Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:354-363 [Conf]
- Yevgeniy Dodis, Nelly Fazio
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. [Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2003, pp:100-115 [Conf]
- Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung
Scalable public-key tracing and revoking. [Citation Graph (0, 0)][DBLP] PODC, 2003, pp:190-199 [Conf]
- Ivan Damgård, Nelly Fazio, Antonio Nicolosi
Non-interactive Zero-Knowledge from Homomorphic Encryption. [Citation Graph (0, 0)][DBLP] TCC, 2006, pp:41-59 [Conf]
- Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung
Scalable public-key tracing and revoking. [Citation Graph (0, 0)][DBLP] Distributed Computing, 2005, v:17, n:4, pp:323-347 [Journal]
- Nelly Fazio, Antonio Nicolosi, Duong Hieu Phan
Traitor Tracing with Optimal Transmission Rate. [Citation Graph (0, 0)][DBLP] ISC, 2007, pp:71-88 [Conf]
Tutorial on content protection. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|