dblp.uni-trier.dewww.uni-trier.de

Breno de Medeiros

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
18EEMike Burmester, Breno de Medeiros: The Security of EPC Gen2 Compliant RFID Protocols. ACNS 2008: 490-506
17EEMike Burmester, Breno de Medeiros, Rossana Motta: Robust, anonymous RFID authentication with constant key-lookup. ASIACCS 2008: 283-291
16EEMike Burmester, Breno de Medeiros, Rossana Motta: Provably Secure Grouping-Proofs for RFID Tags. CARDIS 2008: 176-190
15EESudhir Aggarwal, Zhenhai Duan, Leo Kermes, Breno de Medeiros: E-Crime Investigative Technologies. HICSS 2008: 486
14EEMike Burmester, Breno de Medeiros, Rossana Motta: Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries. IJACT 1(2): 79-90 (2008)
2007
13EETri Van Le, Mike Burmester, Breno de Medeiros: Universally composable and forward-secure RFID authentication and authenticated key exchange. ASIACCS 2007: 242-252
2006
12EEMike Burmester, Tri Van Le, Breno de Medeiros: Towards Provable Security for Ubiquitous Applications. ACISP 2006: 295-312
2005
11EEGiuseppe Ateniese, Jan Camenisch, Breno de Medeiros: Untraceable RFID tags via insubvertible encryption. ACM Conference on Computer and Communications Security 2005: 92-101
10EEGiuseppe Ateniese, Daniel H. Chou, Breno de Medeiros, Gene Tsudik: Sanitizable Signatures. ESORICS 2005: 159-177
9 Seny Kamara, Breno de Medeiros, Susanne Wetzel: Secret locking: Exploring new approaches to biometric key encapsulation. ICETE 2005: 254-261
8EEMike Burmester, Breno de Medeiros, Alec Yasinsac: Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer. Security Protocols Workshop 2005: 228-237
7EEBreno de Medeiros: Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer. Security Protocols Workshop 2005: 238-244
2004
6EEGiuseppe Ateniese, Breno de Medeiros: Identity-Based Chameleon Hash and Applications. Financial Cryptography 2004: 164-180
5EEGiuseppe Ateniese, Breno de Medeiros: On the Key Exposure Problem in Chameleon Hashes. SCN 2004: 165-179
2003
4EEGiuseppe Ateniese, Breno de Medeiros: Efficient Group Signatures without Trapdoors. ASIACRYPT 2003: 246-268
2002
3EEGiuseppe Ateniese, Reza Curtmola, Breno de Medeiros, Darren Davis: Medical Information Privacy Assurance: Cryptographic and System Aspects. SCN 2002: 199-218
2EEGiuseppe Ateniese, Breno de Medeiros: Anonymous E-prescriptions. WPES 2002: 19-31
2001
1EEGiuseppe Ateniese, Breno de Medeiros, Michael T. Goodrich: TRICERT: A Distributed Certified E-Mail Scheme. NDSS 2001

Coauthor Index

1Sudhir Aggarwal [15]
2Giuseppe Ateniese [1] [2] [3] [4] [5] [6] [10] [11]
3Mike Burmester [8] [12] [13] [14] [16] [17] [18]
4Jan Camenisch [11]
5Daniel H. Chou [10]
6Reza Curtmola [3]
7Darren Davis [3]
8Zhenhai Duan [15]
9Michael T. Goodrich [1]
10Seny Kamara [9]
11Leo Kermes [15]
12Tri Van Le [12] [13]
13Rossana Motta [14] [16] [17]
14Gene Tsudik [10]
15Susanne Wetzel [9]
16Alec Yasinsac [8]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)