Nelly Fazio
Nelly Fazio
Associate Professor, City College & Graduate Center of CUNY
Bestätigte E-Mail-Adresse bei cs.ccny.cuny.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Dynamic and efficient key management for access hierarchies
MJ Atallah, M Blanton, N Fazio, KB Frikken
ACM Transactions on Information and System Security (TISSEC) 12 (3), 1-43, 2009
5512009
Public key broadcast encryption for stateless receivers
Y Dodis, N Fazio
ACM Workshop on Digital Rights Management, 61-80, 2002
3702002
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption
D Yao, N Fazio, Y Dodis, A Lysyanskaya
Proceedings of the 11th ACM conference on Computer and communications …, 2004
1752004
Public key trace and revoke scheme secure against adaptive chosen ciphertext attack
Y Dodis, N Fazio
International Workshop on Public Key Cryptography, 100-115, 2003
1702003
Outsider-anonymous broadcast encryption with sublinear ciphertexts
N Fazio, IM Perera
International Workshop on Public Key Cryptography, 225-242, 2012
762012
Non-interactive zero-knowledge from homomorphic encryption
I Damgård, N Fazio, A Nicolosi
Theory of Cryptography Conference, 41-59, 2006
702006
Scalable public-key tracing and revoking
Y Dodis, N Fazio, A Kiayias, M Yung
Distributed Computing 17 (4), 323-347, 2005
662005
Cryptographic accumulators: Definitions, constructions and applications
N Fazio, A Nicolosi
Paper written for course at New York University: www. cs. nyu. edu/nicolosi …, 2002
362002
Theory of cryptography
S Halevi, T Rabin
third theory of cryptography conference, TCC, 4-7, 2006
282006
Traitor tracing with optimal transmission rate
N Fazio, A Nicolosi, DH Phan
International Conference on Information Security, 71-88, 2007
252007
Method for authenticated communication in dynamic federated environments
N Fazio, RA Golding, TMT Wong
US Patent 9,130,757, 2015
222015
Broadcast steganography
N Fazio, AR Nicolosi, IM Perera
Cryptographers’ Track at the RSA Conference, 64-84, 2014
172014
Homomorphic secret sharing from paillier encryption
N Fazio, R Gennaro, T Jafarikhah, WE Skeith
International Conference on Provable Security, 381-399, 2017
162017
On cryptographic techniques for digital rights management
N Fazio
New York University, Graduate School of Arts and Science, 2006
162006
Public Key Cryptography--PKC 2011: 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011, Proceedings
D Catalano, N Fazio, R Gennaro, A Nicolosi
Springer Science & Business Media, 2011
152011
Dynamic and efficient key management for access hierarchies
M Blanton, N Fazio, KB Frikken
Proceedings of the ACM Conference on Computer and Communications Security, 2005
142005
Hard-core predicates for a Diffie-Hellman problem over finite fields
N Fazio, R Gennaro, IM Perera, WE Skeith
Annual Cryptology Conference, 148-165, 2013
132013
Generalized learning problems and applications to non-commutative cryptography
G Baumslag, N Fazio, AR Nicolosi, V Shpilrain, WE Skeith
International Conference on Provable Security, 324-339, 2011
92011
Fully scalable public-key traitor tracing
Y Dodis, N Fazio, A Kiayias, M Yung
proceeding of PODC, 2003
72003
Hardness of learning problems over burnside groups of exponent 3
N Fazio, K Iga, AR Nicolosi, L Perret, WE Skeith
Designs, Codes and Cryptography 75 (1), 59-70, 2015
52015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20