Theo dõi
Gene Itkis
Gene Itkis
MIT Lincoln Laboratory
Email được xác minh tại ll.mit.edu
Tiêu đề
Trích dẫn bởi
Trích dẫn bởi
Năm
Multicast security: A taxonomy and some efficient constructions
R Canetti, J Garay, G Itkis, D Micciancio, M Naor, B Pinkas
IEEE INFOCOM'99. Conference on Computer Communications. Proceedings …, 1999
11601999
Forward-secure signatures with optimal signing and verifying
G Itkis, L Reyzin
Annual International Cryptology Conference, 332-354, 2001
4112001
SiBIR: Signer-base intrusion-resilient signatures
G Itkis, L Reyzin
Advances in Cryptology—CRYPTO 2002: 22nd Annual International Cryptology …, 2002
1952002
Fast and lean self-stabilizing asynchronous protocols
G Itkis, L Levin
Proceedings 35th Annual Symposium on Foundations of Computer Science, 226-239, 1994
931994
Upper and lower bounds on black-box steganography
N Dedić, G Itkis, L Reyzin, S Russell
Theory of Cryptography Conference, 227-244, 2005
74*2005
Deterministic, constant space, self-stabilizing leader election on uniform rings
G Itkis, C Lin, J Simon
Distributed Algorithms: 9th International Workshop, WDAG'95 Le Mont-Saint …, 1995
591995
Intrusion-resilient signatures: generic constructions, or defeating strong adversary with minimal assumptions
G Itkis
International Conference on Security in Communication Networks, 102-118, 2002
472002
Cryptographic tamper evidence
G Itkis
Proceedings of the 10th ACM conference on Computer and communications …, 2003
442003
Forward security, adaptive cryptography: Time evolution
G Itkis
Handbook of Information Security 3, 927-944, 2006
402006
Multicast security: A taxonomy and efficient authentication
R Canetti, J Garay, G Itkis, D Micciancio, M Naor, B Pinkas
Proc. of INFOCOM’99, 1999
311999
Multicast security: A taxonomy and efficient reconstructions
R Canetti, J Garay, G Itkis, D Micciancio, M Naor, B Pinkas
Proceedings of IEEE Infocom 99, 637, 1999
261999
Iris biometric security challenges and possible solutions: For your eyes only? using the iris as a key
G Itkis, V Chandar, BW Fuller, JP Campbell, RK Cunningham
IEEE Signal Processing Magazine 32 (5), 42-53, 2015
252015
Bounded-collusion attribute-based encryption from minimal assumptions
G Itkis, E Shen, M Varia, D Wilson, A Yerukhimovich
Public-Key Cryptography–PKC 2017: 20th IACR International Conference on …, 2017
182017
Securing bulk content almost for free
J Byers, J Considine, G Itkis, MC Cheng, A Yeung
Computer communications 29 (3), 280-290, 2006
172006
On mixed connectivity certificates
S Even, G Itkis, S Rajsbaum
Theoretical computer science 203 (2), 253-269, 1998
171998
Intrusion-resilient signatures, or towards obsoletion of certificate revocation
G Itkis, L Reyzin
Advances in Cryptology—CRYPTO 2, 1-16, 2002
162002
Generalized key-evolving signature schemes or how to foil an armed adversary
G Itkis, P Xie
Applied Cryptography and Network Security: First International Conference …, 2003
132003
Multicast Security: A Taxonomy and E cient Construction
R Canetti, J Garay, G Itkis, D Micciancio, M Naor, B Pinkas
Proc. IEEE Infocom, 1999
51999
Power of fast VLSI models is insensitive to wires' thinness
G Itkis, LA Levin
FOCS, 402-407, 1989
51989
Group Key Manager on a Smart Card
H Hamandi, G Itkis
Boston University Computer Science Department, 2004
22004
Hệ thống không thể thực hiện thao tác ngay bây giờ. Hãy thử lại sau.
Bài viết 1–20