Breno de Medeiros

According to our database1, Breno de Medeiros authored at least 31 papers between 2001 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Certified Bitcoins.
Proceedings of the Applied Cryptography and Network Security, 2014

2009
On the Security of Route Discovery in MANETs.
IEEE Trans. Mob. Comput., 2009

Universally Composable RFID Identification and Authentication Protocols.
ACM Trans. Inf. Syst. Secur., 2009

Password Cracking Using Probabilistic Context-Free Grammars.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

Secure EPC Gen2 Compliant Radio Frequency Identification.
Proceedings of the Ad-Hoc, Mobile and Wireless Networks, 8th International Conference, 2009

2008
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries.
Int. J. Appl. Cryptogr., 2008

E-Crime Investigative Technologies.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

Robust, anonymous RFID authentication with constant key-lookup.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

Provably Secure Grouping-Proofs for RFID Tags.
Proceedings of the Smart Card Research and Advanced Applications, 2008

The Security of EPC Gen2 Compliant RFID Protocols.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
Forward-secure RFID Authentication and Key Exchange.
IACR Cryptol. ePrint Arch., 2007

Towards provable security for route discovery protocols in mobile ad hoc networks.
IACR Cryptol. ePrint Arch., 2007

X-Online: An Online Interface for Digital Decryption Tools.
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007

Universally composable and forward-secure RFID authentication and authenticated key exchange.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
Universally Composable and Forward Secure RFID Authentication and Key Exchange.
IACR Cryptol. ePrint Arch., 2006

Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Towards Provable Security for Ubiquitous Applications.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
Correlation-Resistant Storage via Keyword-Searchable Encryption.
IACR Cryptol. ePrint Arch., 2005

Practical Group Signatures without Random Oracles.
IACR Cryptol. ePrint Arch., 2005

Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer.
Proceedings of the Security Protocols, 2005

Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer.
Proceedings of the Security Protocols, 2005

Secret Locking: Exploring New Approaches to Biometric Key Encapsulation.
Proceedings of the E-business and Telecommunication Networks, 2005

Sanitizable Signatures.
Proceedings of the Computer Security, 2005

Untraceable RFID tags via insubvertible encryption.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
A Provably Secure Nyberg-Rueppel Signature Variant with Applications.
IACR Cryptol. ePrint Arch., 2004

On the Key Exposure Problem in Chameleon Hashes.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004

Identity-Based Chameleon Hash and Applications.
Proceedings of the Financial Cryptography, 2004

2003
Efficient Group Signatures without Trapdoors.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

2002
Anonymous E-prescriptions.
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, 2002

Medical Information Privacy Assurance: Cryptographic and System Aspects.
Proceedings of the Security in Communication Networks, Third International Conference, 2002

2001
TRICERT: A Distributed Certified E-Mail Scheme.
Proceedings of the Network and Distributed System Security Symposium, 2001


  Loading...