BibTeX records: Breno de Medeiros

download as .bib file

@inproceedings{DBLP:conf/acns/AtenieseFMM14,
  author       = {Giuseppe Ateniese and
                  Antonio Faonio and
                  Bernardo Magri and
                  Breno de Medeiros},
  editor       = {Ioana Boureanu and
                  Philippe Owesarski and
                  Serge Vaudenay},
  title        = {Certified Bitcoins},
  booktitle    = {Applied Cryptography and Network Security - 12th International Conference,
                  {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8479},
  pages        = {80--96},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07536-5\_6},
  doi          = {10.1007/978-3-319-07536-5\_6},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/AtenieseFMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseFMM14,
  author       = {Giuseppe Ateniese and
                  Antonio Faonio and
                  Bernardo Magri and
                  Breno de Medeiros},
  title        = {Certified Bitcoins},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {76},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/076},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseFMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BurmesterLMT09,
  author       = {Mike Burmester and
                  Tri Van Le and
                  Breno de Medeiros and
                  Gene Tsudik},
  title        = {Universally Composable {RFID} Identification and Authentication Protocols},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {12},
  number       = {4},
  pages        = {21:1--21:33},
  year         = {2009},
  url          = {https://doi.org/10.1145/1513601.1513603},
  doi          = {10.1145/1513601.1513603},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BurmesterLMT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/BurmesterM09,
  author       = {Mike Burmester and
                  Breno de Medeiros},
  title        = {On the Security of Route Discovery in MANETs},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {8},
  number       = {9},
  pages        = {1180--1188},
  year         = {2009},
  url          = {https://doi.org/10.1109/TMC.2009.13},
  doi          = {10.1109/TMC.2009.13},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/BurmesterM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adhoc-now/BurmesterMMP09,
  author       = {Mike Burmester and
                  Breno de Medeiros and
                  Jorge Munilla and
                  Alberto Peinado},
  editor       = {Pedro M. Ruiz and
                  Jose Joaquin Garcia{-}Luna{-}Aceves},
  title        = {Secure {EPC} Gen2 Compliant Radio Frequency Identification},
  booktitle    = {Ad-Hoc, Mobile and Wireless Networks, 8th International Conference,
                  {ADHOC-NOW} 2009, Murcia, Spain, September 22-25, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5793},
  pages        = {227--240},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04383-3\_17},
  doi          = {10.1007/978-3-642-04383-3\_17},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/adhoc-now/BurmesterMMP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WeirAMG09,
  author       = {Matt Weir and
                  Sudhir Aggarwal and
                  Breno de Medeiros and
                  Bill Glodek},
  title        = {Password Cracking Using Probabilistic Context-Free Grammars},
  booktitle    = {30th {IEEE} Symposium on Security and Privacy {(SP} 2009), 17-20 May
                  2009, Oakland, California, {USA}},
  pages        = {391--405},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SP.2009.8},
  doi          = {10.1109/SP.2009.8},
  timestamp    = {Thu, 21 Sep 2023 16:14:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/WeirAMG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BurmesterMMP09,
  author       = {Mike Burmester and
                  Breno de Medeiros and
                  Jorge Munilla and
                  Alberto Peinado},
  title        = {Secure {EPC} Gen2 compliant Radio Frequency Identification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {149},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/149},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BurmesterMMP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/BurmesterMM08,
  author       = {Mike Burmester and
                  Breno de Medeiros and
                  Rossana Motta},
  title        = {Anonymous {RFID} authentication supporting constant-cost key-lookup
                  against active adversaries},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {2},
  pages        = {79--90},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJACT.2008.021082},
  doi          = {10.1504/IJACT.2008.021082},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/BurmesterMM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BurmesterM08,
  author       = {Mike Burmester and
                  Breno de Medeiros},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {The Security of {EPC} Gen2 Compliant {RFID} Protocols},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {490--506},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_30},
  doi          = {10.1007/978-3-540-68914-0\_30},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/BurmesterM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/BurmesterMM08,
  author       = {Mike Burmester and
                  Breno de Medeiros and
                  Rossana Motta},
  editor       = {Gilles Grimaud and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Provably Secure Grouping-Proofs for {RFID} Tags},
  booktitle    = {Smart Card Research and Advanced Applications, 8th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2008, London, UK, September 8-11,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5189},
  pages        = {176--190},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85893-5\_13},
  doi          = {10.1007/978-3-540-85893-5\_13},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/BurmesterMM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BurmesterMM08,
  author       = {Mike Burmester and
                  Breno de Medeiros and
                  Rossana Motta},
  editor       = {Masayuki Abe and
                  Virgil D. Gligor},
  title        = {Robust, anonymous {RFID} authentication with constant key-lookup},
  booktitle    = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
                  2008},
  pages        = {283--291},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1368310.1368351},
  doi          = {10.1145/1368310.1368351},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BurmesterMM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/AggarwalDKM08,
  author       = {Sudhir Aggarwal and
                  Zhenhai Duan and
                  Leo Kermes and
                  Breno de Medeiros},
  title        = {E-Crime Investigative Technologies},
  booktitle    = {41st Hawaii International International Conference on Systems Science
                  {(HICSS-41} 2008), Proceedings, 7-10 January 2008, Waikoloa, Big Island,
                  HI, {USA}},
  pages        = {486},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/HICSS.2008.133},
  doi          = {10.1109/HICSS.2008.133},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/AggarwalDKM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LeBM07,
  author       = {Tri Van Le and
                  Mike Burmester and
                  Breno de Medeiros},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Universally composable and forward-secure {RFID} authentication and
                  authenticated key exchange},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {242--252},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229319},
  doi          = {10.1145/1229285.1229319},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LeBM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sadfe/AggarwalBDMT07,
  author       = {Sudhir Aggarwal and
                  Daniel Beech and
                  Rajarshi Das and
                  Breno de Medeiros and
                  Eric Thompson},
  editor       = {Ming{-}Yuh Huang and
                  Deborah A. Frincke},
  title        = {X-Online: An Online Interface for Digital Decryption Tools},
  booktitle    = {Second International Workshop on Systematic Approaches to Digital
                  Forensic Engineering, {SADFE} 2007, Seattle, Washington, USA, April
                  10-12, 2007},
  pages        = {105--116},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SADFE.2007.24},
  doi          = {10.1109/SADFE.2007.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sadfe/AggarwalBDMT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeBM07,
  author       = {Tri Van Le and
                  Mike Burmester and
                  Breno de Medeiros},
  title        = {Forward-secure {RFID} Authentication and Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {51},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/051},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeBM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BurmesterM07,
  author       = {Mike Burmester and
                  Breno de Medeiros},
  title        = {Towards provable security for route discovery protocols in mobile
                  ad hoc networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {324},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/324},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BurmesterM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BurmesterMM07,
  author       = {Mike Burmester and
                  Breno de Medeiros and
                  Rossana Motta},
  title        = {Robust, Anonymous {RFID} Authentication with Constant Key-Lookup},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {402},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/402},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BurmesterMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BurmesterLM06,
  author       = {Mike Burmester and
                  Tri Van Le and
                  Breno de Medeiros},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Towards Provable Security for Ubiquitous Applications},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {295--312},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_25},
  doi          = {10.1007/11780656\_25},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BurmesterLM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/BurmesterLM06,
  author       = {Mike Burmester and
                  Tri Van Le and
                  Breno de Medeiros},
  title        = {Provably Secure Ubiquitous Systems: Universally Composable {RFID}
                  Authentication Protocols},
  booktitle    = {Second International Conference on Security and Privacy in Communication
                  Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August
                  2, 2006 - September 1, 2006},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/SECCOMW.2006.359563},
  doi          = {10.1109/SECCOMW.2006.359563},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/BurmesterLM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BurmesterLM06,
  author       = {Mike Burmester and
                  Tri Van Le and
                  Breno de Medeiros},
  title        = {Provably Secure Ubiquitous Systems: Universally Composable {RFID}
                  Authentication Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {131},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/131},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BurmesterLM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeBM06,
  author       = {Tri Van Le and
                  Mike Burmester and
                  Breno de Medeiros},
  title        = {Universally Composable and Forward Secure {RFID} Authentication and
                  Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {448},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/448},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeBM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AtenieseCM05,
  author       = {Giuseppe Ateniese and
                  Jan Camenisch and
                  Breno de Medeiros},
  editor       = {Vijay Atluri and
                  Catherine Meadows and
                  Ari Juels},
  title        = {Untraceable {RFID} tags via insubvertible encryption},
  booktitle    = {Proceedings of the 12th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  pages        = {92--101},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102120.1102134},
  doi          = {10.1145/1102120.1102134},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AtenieseCM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AtenieseCMT05,
  author       = {Giuseppe Ateniese and
                  Daniel H. Chou and
                  Breno de Medeiros and
                  Gene Tsudik},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Sanitizable Signatures},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {159--177},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_10},
  doi          = {10.1007/11555827\_10},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AtenieseCMT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/KamaraMW05a,
  author       = {Seny Kamara and
                  Breno de Medeiros and
                  Susanne Wetzel},
  editor       = {Joaquim Filipe and
                  Helder Coelhas and
                  M{\'{o}}nica Saramago},
  title        = {Secret Locking: Exploring New Approaches to Biometric Key Encapsulation},
  booktitle    = {E-business and Telecommunication Networks - Second International Conference,
                  {ICETE} 2005, Reading, UK, October 3-7, 2005. Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {3},
  pages        = {101--112},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-75993-5\_9},
  doi          = {10.1007/978-3-540-75993-5\_9},
  timestamp    = {Tue, 16 Aug 2022 23:04:29 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/KamaraMW05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/KamaraMW05,
  author       = {Seny Kamara and
                  Breno de Medeiros and
                  Susanne Wetzel},
  editor       = {Joaquim Filipe and
                  Luminita Vasiu},
  title        = {Secret locking: Exploring new approaches to biometric key encapsulation},
  booktitle    = {{ICETE} 2005 - Proceedings of the Second International Conference
                  on e-Business and Telecommunication Networks, Reading, UK, October
                  3-7, 2005},
  pages        = {254--261},
  publisher    = {{INSTICC} Press},
  year         = {2005},
  timestamp    = {Tue, 07 Nov 2006 14:13:57 +0100},
  biburl       = {https://dblp.org/rec/conf/icete/KamaraMW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BurmesterMY05,
  author       = {Mike Burmester and
                  Breno de Medeiros and
                  Alec Yasinsac},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Community-Centric Vanilla-Rollback Access, or: How {I} Stopped Worrying
                  and Learned to Love My Computer},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {228--237},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_28},
  doi          = {10.1007/978-3-540-77156-2\_28},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/BurmesterMY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Medeiros05,
  author       = {Breno de Medeiros},
  editor       = {Bruce Christianson and
                  Bruno Crispo and
                  James A. Malcolm and
                  Michael Roe},
  title        = {Community-Centric Vanilla-Rollback Access, or: How {I} Stopped Worrying
                  and Learned to Love My Computer},
  booktitle    = {Security Protocols, 13th International Workshop, Cambridge, UK, April
                  20-22, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4631},
  pages        = {238--244},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-77156-2\_29},
  doi          = {10.1007/978-3-540-77156-2\_29},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/Medeiros05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseCHM05,
  author       = {Giuseppe Ateniese and
                  Jan Camenisch and
                  Susan Hohenberger and
                  Breno de Medeiros},
  title        = {Practical Group Signatures without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {385},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/385},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseCHM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BallardGMM05,
  author       = {Lucas Ballard and
                  Matthew Green and
                  Breno de Medeiros and
                  Fabian Monrose},
  title        = {Correlation-Resistant Storage via Keyword-Searchable Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {417},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/417},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BallardGMM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AtenieseM04,
  author       = {Giuseppe Ateniese and
                  Breno de Medeiros},
  editor       = {Ari Juels},
  title        = {Identity-Based Chameleon Hash and Applications},
  booktitle    = {Financial Cryptography, 8th International Conference, {FC} 2004, Key
                  West, FL, USA, February 9-12, 2004. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3110},
  pages        = {164--180},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27809-2\_19},
  doi          = {10.1007/978-3-540-27809-2\_19},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/AtenieseM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/AtenieseM04,
  author       = {Giuseppe Ateniese and
                  Breno de Medeiros},
  editor       = {Carlo Blundo and
                  Stelvio Cimato},
  title        = {On the Key Exposure Problem in Chameleon Hashes},
  booktitle    = {Security in Communication Networks, 4th International Conference,
                  {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3352},
  pages        = {165--179},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30598-9\_12},
  doi          = {10.1007/978-3-540-30598-9\_12},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/AtenieseM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseM04,
  author       = {Giuseppe Ateniese and
                  Breno de Medeiros},
  title        = {A Provably Secure Nyberg-Rueppel Signature Variant with Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {93},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/093},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseM04a,
  author       = {Giuseppe Ateniese and
                  Breno de Medeiros},
  title        = {On the Key Exposure Problem in Chameleon Hashes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {243},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/243},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseM04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AtenieseM03,
  author       = {Giuseppe Ateniese and
                  Breno de Medeiros},
  editor       = {Chi{-}Sung Laih},
  title        = {Efficient Group Signatures without Trapdoors},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, November 30 - December 4, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2894},
  pages        = {246--268},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40061-5\_15},
  doi          = {10.1007/978-3-540-40061-5\_15},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AtenieseM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseM03,
  author       = {Giuseppe Ateniese and
                  Breno de Medeiros},
  title        = {Identity-based Chameleon Hash and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {167},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/167},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/AtenieseCMD02,
  author       = {Giuseppe Ateniese and
                  Reza Curtmola and
                  Breno de Medeiros and
                  Darren Davis},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {Medical Information Privacy Assurance: Cryptographic and System Aspects},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {199--218},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_15},
  doi          = {10.1007/3-540-36413-7\_15},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/AtenieseCMD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/AtenieseM02,
  author       = {Giuseppe Ateniese and
                  Breno de Medeiros},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati},
  title        = {Anonymous E-prescriptions},
  booktitle    = {Proceedings of the 2002 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2002, Washington, DC, USA, November 21, 2002},
  pages        = {19--31},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/644527.644530},
  doi          = {10.1145/644527.644530},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/AtenieseM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseM02,
  author       = {Giuseppe Ateniese and
                  Breno de Medeiros},
  title        = {Efficient Group Signatures without Trapdoors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {173},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/173},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AtenieseMG01,
  author       = {Giuseppe Ateniese and
                  Breno de Medeiros and
                  Michael T. Goodrich},
  title        = {{TRICERT:} {A} Distributed Certified E-Mail Scheme},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2001, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2001},
  url          = {https://www.ndss-symposium.org/ndss2001/tricert-distributed-certified-e-mail-scheme/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/AtenieseMG01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}