Search Results - "Fazio, Nelly"

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    Hardness of learning problems over Burnside groups of exponent 3 by Fazio, Nelly, Iga, Kevin, Nicolosi, Antonio R., Perret, Ludovic, Skeith, William E.

    Published in Designs, codes, and cryptography (01-04-2015)
    “…In this work, we investigate the hardness of learning Burnside homomorphisms with noise ( B n - LHN ), a computational problem introduced in the recent work of…”
    Get full text
    Journal Article
  2. 2

    Combating Insider Attacks in IEEE 802.11 Wireless Networks with Broadcast Encryption by Soryal, Joseph, Perera, Irippuge Milinda, Darwish, Ihab, Fazio, Nelly, Gennaro, Rosario, Saadawi, Tarek

    “…The IEEE 802.11 protocols are used by millions of smartphone and tablet devices to access the Internet via Wi-Fi wireless networks or communicate with one…”
    Get full text
    Conference Proceeding
  3. 3

    On cryptographic techniques for Digital Rights Management by Fazio, Nelly

    Published 01-01-2006
    “…With more and more content being produced, distributed, and ultimately rendered and consumed in digital form, devising effective Content Protection mechanisms…”
    Get full text
    Dissertation
  4. 4

    On cryptographic techniques for Digital Rights Management by Fazio, Nelly

    “…With more and more content being produced, distributed, and ultimately rendered and consumed in digital form, devising effective Content Protection mechanisms…”
    Get full text
    Dissertation
  5. 5

    Scalable public-key tracing and revoking by Dodis, Yevgeniy, Fazio, Nelly, Kiayias, Aggelos, Yung, Moti

    Published in Distributed computing (01-05-2005)
    “…Traitor tracing schemes constitute a useful tool against piracy in the context of digital content distribution. They are encryption schemes that can be…”
    Get full text
    Journal Article