The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Cristina Nita-Rotaru: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Cristina Nita-Rotaru, Ninghui Li
    A Framework for Role-Based Access Control in Group Communication Systems. [Citation Graph (0, 0)][DBLP]
    ISCA PDCS, 2004, pp:522-529 [Conf]
  2. Giuseppe Ateniese, Cristina Nita-Rotaru
    Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:182-199 [Conf]
  3. Yair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton, Gene Tsudik
    Scaling Secure Group Communication Systems: Beyond Peer-to-Peer. [Citation Graph (0, 0)][DBLP]
    DISCEX (1), 2003, pp:226-237 [Conf]
  4. Yair Amir, Claudiu Danilov, Jonathan Kirsch, John Lane, Danny Dolev, Cristina Nita-Rotaru, Josh Olsen, David Zage
    Scaling Byzantine Fault-Tolerant Replication toWide Area Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:105-114 [Conf]
  5. Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene Tsudik
    On the Performance of Group Key Agreement Protocols. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2002, pp:463-464 [Conf]
  6. Yair Amir, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Yongdae Kim, Gene Tsudik
    Exploring Robustness in Group Key Agreement. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2001, pp:399-408 [Conf]
  7. Jonathan Robert Stanton, Yair Amir, Damian Hasse, Giuseppe Ateniese, Yongdae Kim, Cristina Nita-Rotaru, Theo Schlossnagle, John L. Schultz, Gene Tsudik
    Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2000, pp:330-343 [Conf]
  8. Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, Cristina Nita-Rotaru
    ViWiD : Visible Watermarking Based Defense Against Phishing. [Citation Graph (0, 0)][DBLP]
    IWDW, 2005, pp:470-483 [Conf]
  9. Mohamed H. Ali, Walid G. Aref, Cristina Nita-Rotaru
    SPASS: scalable and energy-efficient data acquisition in sensor databases. [Citation Graph (0, 0)][DBLP]
    MobiDE, 2005, pp:81-88 [Conf]
  10. Yair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton
    Framework for Authentication and Access Control of Client-Server Group Communication Systems. [Citation Graph (0, 0)][DBLP]
    Networked Group Communication, 2001, pp:128-140 [Conf]
  11. Cristina Nita-Rotaru, Melissa Dark, Voicu Popescu
    A multi-expertise application-driven class. [Citation Graph (0, 0)][DBLP]
    SIGCSE, 2007, pp:119-123 [Conf]
  12. Xiaoxin Wu, Cristina Nita-Rotaru
    Po^2V Network Layer Position Verification in Multi-HopWireless Networks. [Citation Graph (0, 0)][DBLP]
    WOWMOM, 2006, pp:150-158 [Conf]
  13. Ioannis Ioannidis, Bogdan Carbunar, Cristina Nita-Rotaru
    High Throughput Routing in Hybrid Cellular and Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    WOWMOM, 2005, pp:171-176 [Conf]
  14. Bogdan Carbunar, Ioannis Ioannidis, Cristina Nita-Rotaru
    JANUS: towards robust and malicious resilient routing in hybrid wireless networks. [Citation Graph (0, 0)][DBLP]
    Workshop on Wireless Security, 2004, pp:11-20 [Conf]
  15. Yair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton, Gene Tsudik
    Secure Spread: An Integrated Architecture for Secure Group Communication. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:3, pp:248-261 [Journal]
  16. Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene Tsudik
    On the performance of group key agreement protocols. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:3, pp:457-488 [Journal]
  17. Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Gene Tsudik
    Secure Group Communication Using Robust Contributory Key Agreement. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2004, v:15, n:5, pp:468-480 [Journal]
  18. Ruben Torres, Xin Sun, Aaron Walters, Cristina Nita-Rotaru, Sanjay G. Rao
    Enabling Confidentiality of Data Delivery in an Overlay Broadcasting System. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 2007, pp:607-615 [Conf]

  19. On the accuracy of decentralized virtual coordinate systems in adversarial networks. [Citation Graph (, )][DBLP]


  20. Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks. [Citation Graph (, )][DBLP]


  21. Experimental comparison of peer-to-peer streaming overlays: An application perspective. [Citation Graph (, )][DBLP]


  22. Secure group communication in wireless mesh networks. [Citation Graph (, )][DBLP]


  23. An on-demand secure routing protocol resilient to byzantine failures. [Citation Graph (, )][DBLP]


  24. Mitigating attacks against virtual coordinate based routing in wireless sensor networks. [Citation Graph (, )][DBLP]


  25. Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks. [Citation Graph (, )][DBLP]


  26. On the Pitfalls of High-Throughput Multicast Metrics in Adversarial Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  27. BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks. [Citation Graph (, )][DBLP]


  28. Secure group communication in wireless mesh networks. [Citation Graph (, )][DBLP]


  29. UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks. [Citation Graph (, )][DBLP]


  30. Virtual Classroom Extension for Effective Distance Education. [Citation Graph (, )][DBLP]


  31. Secure network coding for wireless mesh networks: Threats, challenges, and directions. [Citation Graph (, )][DBLP]


  32. A survey of attack and defense techniques for reputation systems. [Citation Graph (, )][DBLP]


Search in 0.022secs, Finished in 0.024secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002