Follow
Nelly Fazio
Nelly Fazio
Associate Professor, City College & Graduate Center of CUNY
Verified email at cs.ccny.cuny.edu - Homepage
Title
Cited by
Cited by
Year
Dynamic and efficient key management for access hierarchies
MJ Atallah, M Blanton, N Fazio, KB Frikken
ACM Transactions on Information and System Security (TISSEC) 12 (3), 1-43, 2009
6362009
Public key broadcast encryption for stateless receivers
Y Dodis, N Fazio
Digital Rights Management: ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA …, 2003
4182003
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption
D Yao, N Fazio, Y Dodis, A Lysyanskaya
Proceedings of the 11th ACM conference on Computer and communications …, 2004
2152004
Public key trace and revoke scheme secure against adaptive chosen ciphertext attack
Y Dodis, N Fazio
Public Key Cryptography—PKC 2003: 6th International Workshop on Practice …, 2002
1802002
Outsider-anonymous broadcast encryption with sublinear ciphertexts
N Fazio, IM Perera
Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012
1202012
Non-interactive zero-knowledge from homomorphic encryption
I Damgård, N Fazio, A Nicolosi
Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006 …, 2006
842006
Scalable public-key tracing and revoking
Y Dodis, N Fazio, A Kiayias, M Yung
Proceedings of the twenty-second annual symposium on Principles of …, 2003
732003
Cryptographic accumulators: Definitions, constructions and applications
N Fazio, A Nicolosi
Paper written for course at New York University: www. cs. nyu. edu/nicolosi …, 2002
632002
Homomorphic secret sharing from paillier encryption
N Fazio, R Gennaro, T Jafarikhah, WE Skeith
Provable Security: 11th International Conference, ProvSec 2017, Xi'an, China …, 2017
612017
Method for authenticated communication in dynamic federated environments
N Fazio, RA Golding, TMT Wong
US Patent 9,130,757, 2015
502015
Traitor tracing with optimal transmission rate
N Fazio, A Nicolosi, DH Phan
Information Security: 10th International Conference, ISC 2007, Valparaíso …, 2007
312007
Broadcast steganography
N Fazio, AR Nicolosi, IM Perera
Topics in Cryptology–CT-RSA 2014: The Cryptographer’s Track at the RSA …, 2014
232014
Hard-core predicates for a Diffie-Hellman problem over finite fields
N Fazio, R Gennaro, IM Perera, WE Skeith
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
192013
Public Key Cryptography--PKC 2011: 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011, Proceedings
D Catalano, N Fazio, R Gennaro, A Nicolosi
Springer Science & Business Media, 2011
17*2011
On cryptographic techniques for digital rights management
N Fazio
New York University, 2006
172006
Generalized learning problems and applications to non-commutative cryptography
G Baumslag, N Fazio, AR Nicolosi, V Shpilrain, WE Skeith
Provable Security: 5th International Conference, ProvSec 2011, Xi’an, China …, 2011
162011
Dynamic and efficient key management for access hierarchies
M Blanton, N Fazio, KB Frikken
Proceedings of the ACM Conference on Computer and Communications Security, 2005
162005
Hardness of learning problems over burnside groups of exponent 3
N Fazio, K Iga, AR Nicolosi, L Perret, WE Skeith
Designs, Codes and Cryptography 75, 59-70, 2015
92015
Fully scalable public-key traitor tracing
Y Dodis, N Fazio, A Kiayias, M Yung
proceeding of PODC, 2003
72003
Output privacy in secure multiparty computation
E Bresson, D Catalano, N Fazio, A Nicolosi, M Yung
Proc. YACC, 2006
62006
The system can't perform the operation now. Try again later.
Articles 1–20