|
Search the dblp DataBase
Cristina Nita-Rotaru:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Cristina Nita-Rotaru, Ninghui Li
A Framework for Role-Based Access Control in Group Communication Systems. [Citation Graph (0, 0)][DBLP] ISCA PDCS, 2004, pp:522-529 [Conf]
- Giuseppe Ateniese, Cristina Nita-Rotaru
Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption. [Citation Graph (0, 0)][DBLP] CT-RSA, 2002, pp:182-199 [Conf]
- Yair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton, Gene Tsudik
Scaling Secure Group Communication Systems: Beyond Peer-to-Peer. [Citation Graph (0, 0)][DBLP] DISCEX (1), 2003, pp:226-237 [Conf]
- Yair Amir, Claudiu Danilov, Jonathan Kirsch, John Lane, Danny Dolev, Cristina Nita-Rotaru, Josh Olsen, David Zage
Scaling Byzantine Fault-Tolerant Replication toWide Area Networks. [Citation Graph (0, 0)][DBLP] DSN, 2006, pp:105-114 [Conf]
- Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene Tsudik
On the Performance of Group Key Agreement Protocols. [Citation Graph (0, 0)][DBLP] ICDCS, 2002, pp:463-464 [Conf]
- Yair Amir, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Yongdae Kim, Gene Tsudik
Exploring Robustness in Group Key Agreement. [Citation Graph (0, 0)][DBLP] ICDCS, 2001, pp:399-408 [Conf]
- Jonathan Robert Stanton, Yair Amir, Damian Hasse, Giuseppe Ateniese, Yongdae Kim, Cristina Nita-Rotaru, Theo Schlossnagle, John L. Schultz, Gene Tsudik
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments. [Citation Graph (0, 0)][DBLP] ICDCS, 2000, pp:330-343 [Conf]
- Mercan Topkara, Ashish Kamra, Mikhail J. Atallah, Cristina Nita-Rotaru
ViWiD : Visible Watermarking Based Defense Against Phishing. [Citation Graph (0, 0)][DBLP] IWDW, 2005, pp:470-483 [Conf]
- Mohamed H. Ali, Walid G. Aref, Cristina Nita-Rotaru
SPASS: scalable and energy-efficient data acquisition in sensor databases. [Citation Graph (0, 0)][DBLP] MobiDE, 2005, pp:81-88 [Conf]
- Yair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton
Framework for Authentication and Access Control of Client-Server Group Communication Systems. [Citation Graph (0, 0)][DBLP] Networked Group Communication, 2001, pp:128-140 [Conf]
- Cristina Nita-Rotaru, Melissa Dark, Voicu Popescu
A multi-expertise application-driven class. [Citation Graph (0, 0)][DBLP] SIGCSE, 2007, pp:119-123 [Conf]
- Xiaoxin Wu, Cristina Nita-Rotaru
Po^2V Network Layer Position Verification in Multi-HopWireless Networks. [Citation Graph (0, 0)][DBLP] WOWMOM, 2006, pp:150-158 [Conf]
- Ioannis Ioannidis, Bogdan Carbunar, Cristina Nita-Rotaru
High Throughput Routing in Hybrid Cellular and Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP] WOWMOM, 2005, pp:171-176 [Conf]
- Bogdan Carbunar, Ioannis Ioannidis, Cristina Nita-Rotaru
JANUS: towards robust and malicious resilient routing in hybrid wireless networks. [Citation Graph (0, 0)][DBLP] Workshop on Wireless Security, 2004, pp:11-20 [Conf]
- Yair Amir, Cristina Nita-Rotaru, Jonathan Robert Stanton, Gene Tsudik
Secure Spread: An Integrated Architecture for Secure Group Communication. [Citation Graph (0, 0)][DBLP] IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:3, pp:248-261 [Journal]
- Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, Gene Tsudik
On the performance of group key agreement protocols. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:3, pp:457-488 [Journal]
- Yair Amir, Yongdae Kim, Cristina Nita-Rotaru, John L. Schultz, Jonathan Robert Stanton, Gene Tsudik
Secure Group Communication Using Robust Contributory Key Agreement. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 2004, v:15, n:5, pp:468-480 [Journal]
- Ruben Torres, Xin Sun, Aaron Walters, Cristina Nita-Rotaru, Sanjay G. Rao
Enabling Confidentiality of Data Delivery in an Overlay Broadcasting System. [Citation Graph (0, 0)][DBLP] INFOCOM, 2007, pp:607-615 [Conf]
On the accuracy of decentralized virtual coordinate systems in adversarial networks. [Citation Graph (, )][DBLP]
Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks. [Citation Graph (, )][DBLP]
Experimental comparison of peer-to-peer streaming overlays: An application perspective. [Citation Graph (, )][DBLP]
Secure group communication in wireless mesh networks. [Citation Graph (, )][DBLP]
An on-demand secure routing protocol resilient to byzantine failures. [Citation Graph (, )][DBLP]
Mitigating attacks against virtual coordinate based routing in wireless sensor networks. [Citation Graph (, )][DBLP]
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks. [Citation Graph (, )][DBLP]
On the Pitfalls of High-Throughput Multicast Metrics in Adversarial Wireless Mesh Networks. [Citation Graph (, )][DBLP]
BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks. [Citation Graph (, )][DBLP]
Secure group communication in wireless mesh networks. [Citation Graph (, )][DBLP]
UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks. [Citation Graph (, )][DBLP]
Virtual Classroom Extension for Effective Distance Education. [Citation Graph (, )][DBLP]
Secure network coding for wireless mesh networks: Threats, challenges, and directions. [Citation Graph (, )][DBLP]
A survey of attack and defense techniques for reputation systems. [Citation Graph (, )][DBLP]
Search in 0.022secs, Finished in 0.024secs
|