Breno de Medeiros

According to our database1, Breno de Medeiros authored at least 31 papers between 2001 and 2014.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
Certified Bitcoins.
IACR Cryptol. ePrint Arch., 2014

2009
On the Security of Route Discovery in MANETs.
IEEE Trans. Mob. Comput., 2009

Universally Composable RFID Identification and Authentication Protocols.
ACM Trans. Inf. Syst. Secur., 2009

Secure EPC Gen2 compliant Radio Frequency Identification.
IACR Cryptol. ePrint Arch., 2009

Password Cracking Using Probabilistic Context-Free Grammars.
Proceedings of the 30th IEEE Symposium on Security and Privacy (SP 2009), 2009

2008
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries.
Int. J. Appl. Cryptogr., 2008

E-Crime Investigative Technologies.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

Provably Secure Grouping-Proofs for RFID Tags.
Proceedings of the Smart Card Research and Advanced Applications, 2008

The Security of EPC Gen2 Compliant RFID Protocols.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
Forward-secure RFID Authentication and Key Exchange.
IACR Cryptol. ePrint Arch., 2007

Robust, Anonymous RFID Authentication with Constant Key-Lookup.
IACR Cryptol. ePrint Arch., 2007

Towards provable security for route discovery protocols in mobile ad hoc networks.
IACR Cryptol. ePrint Arch., 2007

X-Online: An Online Interface for Digital Decryption Tools.
Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007

Universally composable and forward-secure RFID authentication and authenticated key exchange.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
Universally Composable and Forward Secure RFID Authentication and Key Exchange.
IACR Cryptol. ePrint Arch., 2006

Provably Secure Ubiquitous Systems: Universally Composable RFID Authentication Protocols.
IACR Cryptol. ePrint Arch., 2006

Towards Provable Security for Ubiquitous Applications.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
Correlation-Resistant Storage via Keyword-Searchable Encryption.
IACR Cryptol. ePrint Arch., 2005

Practical Group Signatures without Random Oracles.
IACR Cryptol. ePrint Arch., 2005

Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer.
Proceedings of the Security Protocols, 2005

Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer.
Proceedings of the Security Protocols, 2005

Secret locking: Exploring new approaches to biometric key encapsulation.
Proceedings of the ICETE 2005, 2005

Sanitizable Signatures.
Proceedings of the Computer Security, 2005

Untraceable RFID tags via insubvertible encryption.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
On the Key Exposure Problem in Chameleon Hashes.
IACR Cryptol. ePrint Arch., 2004

A Provably Secure Nyberg-Rueppel Signature Variant with Applications.
IACR Cryptol. ePrint Arch., 2004

2003
Identity-based Chameleon Hash and Applications.
IACR Cryptol. ePrint Arch., 2003

2002
Efficient Group Signatures without Trapdoors.
IACR Cryptol. ePrint Arch., 2002

Anonymous E-prescriptions.
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, 2002

Medical Information Privacy Assurance: Cryptographic and System Aspects.
Proceedings of the Security in Communication Networks, Third International Conference, 2002

2001
TRICERT: A Distributed Certified E-Mail Scheme.
Proceedings of the Network and Distributed System Security Symposium, 2001


  Loading...