Gene Itkis
Gene Itkis
MIT Lincoln Laboratory
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
Multicast security: A taxonomy and some efficient constructions
R Canetti, J Garay, G Itkis, D Micciancio, M Naor, B Pinkas
IEEE INFOCOM'99. Conference on Computer Communications. Proceedings …, 1999
Forward-secure signatures with optimal signing and verifying
G Itkis, L Reyzin
Annual International Cryptology Conference, 332-354, 2001
SiBIR: Signer-base intrusion-resilient signatures
G Itkis, L Reyzin
Annual International Cryptology Conference, 499-514, 2002
Fast and lean self-stabilizing asynchronous protocols
G Itkis, L Levin
Proceedings 35th Annual Symposium on Foundations of Computer Science, 226-239, 1994
Upper and lower bounds on black-box steganography
N Dedić, G Itkis, L Reyzin, S Russell
Theory of Cryptography Conference, 227-244, 2005
Deterministic, constant space, self-stabilizing leader election on uniform rings
G Itkis, C Lin, J Simon
International Workshop on Distributed Algorithms, 288-302, 1995
Cryptographic tamper evidence
G Itkis
Proceedings of the 10th ACM conference on Computer and communications …, 2003
Intrusion-resilient signatures: generic constructions, or defeating strong adversary with minimal assumptions
G Itkis
International Conference on Security in Communication Networks, 102-118, 2002
Forward security, adaptive cryptography: Time evolution
G Itkis
Multicast security: A taxonomy and efficient authentication
R Canetti, J Garay, G Itkis, D Micciancio, M Naor, B Pinkas
Proc. of INFOCOM’99, 1999
Iris Biometric Security Challenges and Possible Solutions: For your eyes only? Using the iris as a key
G Itkis, V Chandar, BW Fuller, JP Campbell, RK Cunningham
IEEE Signal Processing Magazine 32 (5), 42-53, 2015
Securing bulk content almost for free
J Byers, J Considine, G Itkis, MC Cheng, A Yeung
Computer communications 29 (3), 280-290, 2006
On mixed connectivity certificates
S Even, G Itkis, S Rajsbaum
Theoretical computer science 203 (2), 253-269, 1998
Intrusion-resilient signatures, or towards obsoletion of certificate revocation
G Itkis, L Reyzin
Advances in Cryptology—CRYPTO 2, 1-16, 2002
Generalized key-evolving signature schemes or how to foil an armed adversary
G Itkis, P Xie
International Conference on Applied Cryptography and Network Security, 151-168, 2003
Multicast Security: A Taxonomy and E cient Construction
R Canetti, J Garay, G Itkis, D Micciancio, M Naor, B Pinkas
Proc. IEEE Infocom, 1999
Bounded-collusion attribute-based encryption from minimal assumptions
G Itkis, E Shen, M Varia, D Wilson, A Yerukhimovich
IACR International Workshop on Public Key Cryptography, 67-87, 2017
New multicast technology ‘Survey and Security Concerns’
JP Avognon, ZT Li
Information Technology Journal 3 (1), 95-105, 2004
Power of fast VLSI models is insensitive to wires' thinness
G Itkis, LA Levin
30th Annual Symposium on Foundations of Computer Science, 402-407, 1989
Group Key Manager on a Smart Card
H Hamandi, G Itkis
Boston University Computer Science Department, 2004
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20