%%% ==================================================================== %%% BibTeX-file{ %%% author = "Nelly Fazio" %%% } %%% ==================================================================== @UNPUBLISHED{FaNi00, AUTHOR = {Fazio, N. and Nicolosi, A.}, TITLE = {Relations between Formal and Semi-formal Specification Systems: a Case Study}, YEAR = {2000}, NOTE = {Available at \URL{http://www-cs.ccny.cuny.edu/~fazio/research.html}} } @MASTERTHESIS{Faz01-thesis, AUTHOR = {Fazio, N.}, TITLE = {Nuove Tecniche Crittografiche per le Trasmissioni su Larga Scala}}, YEAR = {2001}, SCHOOL = {Universit\`a di Catania, Italy}, NOTE = {Laurea Thesis, in Italian} } @INPROCEEDINGS{DoFa02, AUTHOR = {Dodis, Y. and Fazio, N.}, TITLE = {Public-Key Broadcast Encryption for Stateless Receivers}, YEAR = {2002}, BOOKTITLE = {ACM Digital Rights Management---DRM '02}, NOTE = {LNCS 2696}, PAGES = {61--80}, PUBLISHER = {Springer}, ADDRESS = {Heidelberg} } @INPROCEEDINGS{DoFa03, AUTHOR = {Dodis, Y. and Fazio, N.}, TITLE = {Public-Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack}, YEAR = {2003}, BOOKTITLE = {IACR Public Key Cryptography---PKC '03}, NOTE = {LNCS 2567}, PAGES = {100--115}, PUBLISHER = {Springer}, ADDRESS = {Heidelberg} } @UNPUBLISHED{DoFa03-full, AUTHOR = {Dodis, Y. and Fazio, N.}, TITLE = {Public-Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack}, YEAR = {2003}, BOOKTITLE = {Cryptology ePrint Srchive}, NOTE = {Full version of~\cite{DoFa03}. \texttt{http://eprint.iacr.org/2003/095}} } @INPROCEEDINGS{DFKY03, AUTHOR = {Dodis, Y. and Fazio, N. and Kiayias, A. and Yung, M.}, TITLE = {Scalable Public-Key Tracing and Revoking}, YEAR = {2003}, BOOKTITLE = {Annual Symposium on Principles of Distributed Computing---PODC '03}, PAGES = {190--199}, PUBLISHER = {ACM Press}, ADDRESS = {New York}, NOTE = {Invited to the PODC '03 Special Issue of Journal of Distributed Computing} } @UNPUBLISHED{DFKY04-full, AUTHOR = {Dodis, Y. and Fazio, N. and Kiayias, A. and Yung, M.}, TITLE = {Scalable Public-Key Tracing and Revoking}, YEAR = {2004}, BOOKTITLE = {Cryptology ePrint Archive}, NOTE = {Full version of~\cite{DFKY03}. \texttt{http://eprint.iacr.org/2004/160}} } @UNPUBLISHED{FaNi03, AUTHOR = {Fazio, N. and Nicolosi, A.}, TITLE = {Cryptographic Accumulators: Definitions, Constructions and Applications}, YEAR = {2003}, NOTE = {Available at \URL{http://www-cs.ccny.cuny.edu/~fazio/research.html}} } @INPROCEEDINGS{YFDL04, AUTHOR = {Yao, D. and Fazio, N. and Dodis, Y. and Lysyanskaya, A.}, TITLE = {ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption}, YEAR = {2004}, BOOKTITLE = {ACM Computer and Communications Security---CCS '04}, PAGES = {354--363}, PUBLISHER = {ACM Press}, ADDRESS = {New York} } @UNPUBLISHED{YFDL04-full, AUTHOR = {Yao, D. and Fazio, N. and Dodis, Y. and Lysyanskaya, A.}, TITLE = {ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption}, YEAR = {2004}, BOOKTITLE = {Cryptology ePrint Archive}, NOTE = {Full version of~\cite{YFDL04}. \texttt{http://eprint.iacr.org/2004/212}} } @ARTICLE{DFKY05, AUTHOR = {Dodis, Y. and Fazio, N. and Kiayias, A. and Yung, M.}, TITLE = {Scalable Public-Key Tracing and Revoking}, JOURNAL = {Invited to the Journal of Distributed Computing}, VOLUME = {17}, NUMBER = {4}, PAGES = {323--347}, YEAR = {2005} } @TECHREPORT{ABFF06, AUTHOR = {Atallah, M. and Blanton, M. and Fazio, N. and Frikken, K.}, TITLE = {Dynamic and Efficient Key Management for Access Hierarchies}, NOTE = {Available as CERIAS Technical Report TR 2006-09, Purdue University, April 2006.} } @INPROCEEDINGS{BCFNY06, AUTHOR = {Bresson, E. and Catalano, D. and Fazio, N. and Nicolosi, A. and Yung, M.}, TITLE = {Output Privacy in Secure Multiparty Computation}, YEAR = {2006}, BOOKTITLE = {YACC '06} } @INPROCEEDINGS{DFN06, AUTHOR = {Damg{\aa}rd, I. and Fazio, N. and Nicolosi, A.}, TITLE = {Non-Interactive Zero-Knowledge from Homomorphic Encryption}, YEAR = {2006}, BOOKTITLE = {IACR Theory of Cryptography Conference---TCC '06}, PAGES = {41--59}, NOTE = {LNCS 3876}, PUBLISHER = {Springer}, ADDRESS = {Heidelberg} } @PHDTHESIS{Faz06-thesis, AUTHOR = {Fazio, N.}, TITLE = {On Cryptographic Techniques for Digital Rights Management}, YEAR = {2006}, SCHOOL = {New York University}, NOTE = {Ph.D. Thesis} } @INPROCEEDINGS{FNP07, AUTHOR = {Fazio, N. and Nicolosi, A. and Phan, D. H.}, TITLE = {Traitor Tracing with Optimal Transmission Rate}, YEAR = {2007}, BOOKTITLE = {International Security Conference---ISC '07}, PAGES = {71--88}, NOTE = {LNCS 4779}, PUBLISHER = {Springer}, ADDRESS = {Heidelberg} } @ARTICLE{ABFF09, AUTHOR = {Atallah, M. and Blanton, M. and Fazio, N. and Frikken, K.}, TITLE = {Dynamic and Efficient Key Management for Access Hierarchies}, JOURNAL = {ACM Transaction on Information and System Security (TISSEC)}, YEAR = {2009}, VOLUME = {12}, NUMBER = {3}, PAGES = {18:1--18:43}, PUBLISHER = {ACM}, ADDRESS = {New York} } @INPROCEEDINGS{Faz09-abstract, AUTHOR = {Fazio, N.}, TITLE = {Bilinear Groups and Algebraic Cryptography}, YEAR = {2009}, BOOKTITLE = {AMS/MAA Joint Mathematics Meeting (Special Session on Algebraic Cryptography and Generic Complexity)}, ADDRESS = {Washington, DC} } @UNPUBLISHED{FWG08, AUTHOR = {Fazio, N. and Wong, T.M. and Golding, R.}, TITLE = {Authenticated Communication in Dynamic Federated Systems}, YEAR = {2008}, NOTE = {Manuscript} } @MISC{FWG10-patent, AUTHOR = {Fazio, N. and Wong, T.M. and Golding, R.}, TITLE = {Method For Authenticated Communication in Dynamic Federated Environments}, YEAR = {2010}, NOTE = {U.S. Patent Application, Publication Number UC 2010/0037055 A1} } @INPROCEEDINGS{FaPo08, AUTHOR = {Fazio, N. and Ponceleon, D.B.}, TITLE = {Tutorial on Content Protection}, BOOKTITLE = {ACM Multimedia}, YEAR = {2008}, PAGES = {1153-1154} } @INBOOK{YFDL08, AUTHOR = {Yao, D. and Fazio, N. and Dodis, Y. and Lysyanskaya, A}, TITLE = {Forward-Secure Hierarchical IBE with Applications to Broadcast Encryption Schemes}, CHAPTER = {7}, PAGES = {101--119}, BOOKTITLE = {IOS Press Cryptology and Information Security Series on Identity-Based Cryptography}, PUBLISHER = {M. Joye and G. Neven}, YEAR = {2008} } @INPROCEEDINGS{FaSk10-abstract, AUTHOR = {Fazio, N. and Skeith, W.}, TITLE = {Group-Theoretic Cryptography: Respice, Adspice, Prospice}, YEAR = {2010}, BOOKTITLE = {AMS Sectional Meeting (Special Session: Groups, Computation, and Applications)}, ADDRESS = {Newark, NJ} } @INPROCEEDINGS{BFNSS11, AUTHOR = {Baumslag, G. and Fazio, N. and Nicolosi, A. and Shpilrain, V. and Skeith, W.}, TITLE = {Generalized Learning Problems and Applications to Non-Commutative Cryptography}, YEAR = {2011}, BOOKTITLE = {International Conference on Provable Security---ProvSec '11}, PAGES = {324--339}, NOTE = {LNCS 6980}, PUBLISHER = {Springer}, ADDRESS = {Heidelberg} } @UNPUBLISHED{BFNSS11-full, AUTHOR = {Baumslag, G. and Fazio, N. and Nicolosi, A. and Shpilrain, V. and Skeith, W.}, TITLE = {Generalized Learning Problems and Applications to Non-Commutative Cryptography}, YEAR = {2011}, BOOKTITLE = {Cryptology ePrint Archive}, NOTE = {Full version of~\cite{BFNSS11}. \texttt{http://eprint.iacr.org/2011/357}} } @INPROCEEDINGS{FINPS11-abstract, AUTHOR = {Fazio, N. and Iga, K. and Nicolosi, A. and Perret, L. and Skeith, W.}, TITLE = {On the Hardness of Learning Problems over Burnside Groups of Exponent 3}, YEAR = {2011}, BOOKTITLE = {Joint AMS/SAMS International Congress}, ADDRESS = {Port Elizabeth, South Africa} } @BOOK{PKC11, AUTHOR = {Catalano, D. and Fazio, N.and Gennaro, R. and Nicolosi, A.}, TITLE = {Public Key Cryptography - PKC 2011 - 14th International on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, BOOKTITLE = {Public Key Cryptography}, PUBLISHER = {Springer}, SERIES = {Lecture Notes in Computer Science}, VOLUME = {6571}, YEAR = {2011}, ISBN = {978-3-642-19378-1} } @UNPUBLISHED{FINPS11, AUTHOR = {Fazio, N. and Iga, K. and Nicolosi, A. and Perret, L. and Skeith, W.}, TITLE = {Hardness of Learning Problems over Burnside Groups of Exponent 3}, YEAR = {2011}, BOOKTITLE = {Cryptology ePrint Archive}, NOTE = {Full version of~\cite{FINPS13}. http://eprint.iacr.org/2011/398}} } @INPROCEEDINGS{FP12, AUTHOR = {Fazio, N. and Perera, M.}, TITLE = {Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts}, YEAR = {2012}, BOOKTITLE = {The 15th IACR International Conference on Practice and Theory of Public-Key Cryptography---PKC '12}, PAGES = {225--242}, NOTE = {LNCS 7293}, PUBLISHER = {Springer}, ADDRESS = {Heidelberg} } @INPROCEEDINGS{FP12b, AUTHOR = {Fazio, N. and Perera, M.}, TITLE = {Protecting Receivers' Identities in Secure Data Distribution}, YEAR = {2012}, BOOKTITLE = {Annual Conference of International Technology Alliance---ACITA '12} } @ARTICLE{FINPS13, AUTHOR = {Fazio, N. and Iga, K. and Nicolosi, A. and Perret, L. and Skeith, W.}, TITLE = {Hardness of Learning Problems over Burnside Groups of Exponent 3}, JOURNAL = {Designs, Codes and Cryptography}, YEAR = {2013}, PUBLISHER = {Springer} } @INPROCEEDINGS{FGPS13, AUTHOR = {Fazio, N. and Gennaro, R. and Perera, M. and Skeith, W.E.}, TITLE = {Hardcore Predicates for a Diffie-Hellman Problem over Finite Fields}, YEAR = {2013}, BOOKTITLE = {IACR International Cryptology Conference---CRYPTO '13}, PAGES = {225--242}, NOTE = {LNCS 8043}, PUBLISHER = {Springer}, ADDRESS = {Heidelberg} } @INPROCEEDINGS{SPDFGS14, AUTHOR = {Soryal, J. and Perera, M. and Darwish, I. and Fazio, N. and Gennaro, R. and Saadawi, T.}, TITLE = {Combating Insider Attacks in IEEE 802.11 Wireless Networks with Broadcast Encryption}, YEAR = {2014}, BOOKTITLE = {The 28th IEEE International Conference on Advanced Information Networking and Applications---AINA '14}, PAGES = {??--??} } @INPROCEEDINGS{FNP14, AUTHOR = {Fazio, N. and Perera, M. and Nicolosi, A.}, TITLE = {Broadcast Steganography}, YEAR = {2014}, BOOKTITLE = {RSA Conference Cryptographers' Track---CT-RSA '14}, PAGES = {??--??} }