2009 |
9 | EE | Mikhail J. Atallah,
Marina Blanton,
Nelly Fazio,
Keith B. Frikken:
Dynamic and Efficient Key Management for Access Hierarchies.
ACM Trans. Inf. Syst. Secur. 12(3): (2009) |
2008 |
8 | EE | Nelly Fazio,
Dulce B. Ponceleon:
Tutorial on content protection.
ACM Multimedia 2008: 1153-1154 |
2007 |
7 | EE | Nelly Fazio,
Antonio Nicolosi,
Duong Hieu Phan:
Traitor Tracing with Optimal Transmission Rate.
ISC 2007: 71-88 |
2006 |
6 | EE | Ivan Damgård,
Nelly Fazio,
Antonio Nicolosi:
Non-interactive Zero-Knowledge from Homomorphic Encryption.
TCC 2006: 41-59 |
2005 |
5 | EE | Yevgeniy Dodis,
Nelly Fazio,
Aggelos Kiayias,
Moti Yung:
Scalable public-key tracing and revoking.
Distributed Computing 17(4): 323-347 (2005) |
2004 |
4 | EE | Danfeng Yao,
Nelly Fazio,
Yevgeniy Dodis,
Anna Lysyanskaya:
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption.
ACM Conference on Computer and Communications Security 2004: 354-363 |
2003 |
3 | EE | Yevgeniy Dodis,
Nelly Fazio,
Aggelos Kiayias,
Moti Yung:
Scalable public-key tracing and revoking.
PODC 2003: 190-199 |
2 | EE | Yevgeniy Dodis,
Nelly Fazio:
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack.
Public Key Cryptography 2003: 100-115 |
2002 |
1 | EE | Yevgeniy Dodis,
Nelly Fazio:
Public Key Broadcast Encryption for Stateless Receivers.
Digital Rights Management Workshop 2002: 61-80 |