The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Nelly Fazio: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yevgeniy Dodis, Nelly Fazio
    Public Key Broadcast Encryption for Stateless Receivers. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2002, pp:61-80 [Conf]
  2. Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya
    ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:354-363 [Conf]
  3. Yevgeniy Dodis, Nelly Fazio
    Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:100-115 [Conf]
  4. Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung
    Scalable public-key tracing and revoking. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:190-199 [Conf]
  5. Ivan Damgård, Nelly Fazio, Antonio Nicolosi
    Non-interactive Zero-Knowledge from Homomorphic Encryption. [Citation Graph (0, 0)][DBLP]
    TCC, 2006, pp:41-59 [Conf]
  6. Yevgeniy Dodis, Nelly Fazio, Aggelos Kiayias, Moti Yung
    Scalable public-key tracing and revoking. [Citation Graph (0, 0)][DBLP]
    Distributed Computing, 2005, v:17, n:4, pp:323-347 [Journal]
  7. Nelly Fazio, Antonio Nicolosi, Duong Hieu Phan
    Traitor Tracing with Optimal Transmission Rate. [Citation Graph (0, 0)][DBLP]
    ISC, 2007, pp:71-88 [Conf]

  8. Tutorial on content protection. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002