| 2009 |
| 9 | EE | Mikhail J. Atallah,
Marina Blanton,
Nelly Fazio,
Keith B. Frikken:
Dynamic and Efficient Key Management for Access Hierarchies.
ACM Trans. Inf. Syst. Secur. 12(3): (2009) |
| 2008 |
| 8 | EE | Nelly Fazio,
Dulce B. Ponceleon:
Tutorial on content protection.
ACM Multimedia 2008: 1153-1154 |
| 2007 |
| 7 | EE | Nelly Fazio,
Antonio Nicolosi,
Duong Hieu Phan:
Traitor Tracing with Optimal Transmission Rate.
ISC 2007: 71-88 |
| 2006 |
| 6 | EE | Ivan Damgård,
Nelly Fazio,
Antonio Nicolosi:
Non-interactive Zero-Knowledge from Homomorphic Encryption.
TCC 2006: 41-59 |
| 2005 |
| 5 | EE | Yevgeniy Dodis,
Nelly Fazio,
Aggelos Kiayias,
Moti Yung:
Scalable public-key tracing and revoking.
Distributed Computing 17(4): 323-347 (2005) |
| 2004 |
| 4 | EE | Danfeng Yao,
Nelly Fazio,
Yevgeniy Dodis,
Anna Lysyanskaya:
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption.
ACM Conference on Computer and Communications Security 2004: 354-363 |
| 2003 |
| 3 | EE | Yevgeniy Dodis,
Nelly Fazio,
Aggelos Kiayias,
Moti Yung:
Scalable public-key tracing and revoking.
PODC 2003: 190-199 |
| 2 | EE | Yevgeniy Dodis,
Nelly Fazio:
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack.
Public Key Cryptography 2003: 100-115 |
| 2002 |
| 1 | EE | Yevgeniy Dodis,
Nelly Fazio:
Public Key Broadcast Encryption for Stateless Receivers.
Digital Rights Management Workshop 2002: 61-80 |