Multicast security: A taxonomy and some efficient constructions R Canetti, J Garay, G Itkis, D Micciancio, M Naor, B Pinkas IEEE INFOCOM'99. Conference on Computer Communications. Proceedings …, 1999 | 1172 | 1999 |
Forward-secure signatures with optimal signing and verifying G Itkis, L Reyzin Advances in Cryptology—CRYPTO 2001: 21st Annual International Cryptology …, 2001 | 397 | 2001 |
SiBIR: Signer-base intrusion-resilient signatures G Itkis, L Reyzin Advances in Cryptology—CRYPTO 2002: 22nd Annual International Cryptology …, 2002 | 195 | 2002 |
Fast and lean self-stabilizing asynchronous protocols G Itkis, L Levin Proceedings 35th Annual Symposium on Foundations of Computer Science, 226-239, 1994 | 93 | 1994 |
Upper and lower bounds on black-box steganography N Dedić, G Itkis, L Reyzin, S Russell Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005 | 72* | 2005 |
Deterministic, constant space, self-stabilizing leader election on uniform rings G Itkis, C Lin, J Simon Distributed Algorithms: 9th International Workshop, WDAG'95 Le Mont-Saint …, 1995 | 59 | 1995 |
Intrusion-resilient signatures: generic constructions, or defeating strong adversary with minimal assumptions G Itkis Security in Communication Networks: Third International Conference, SCN 2002 …, 2003 | 46 | 2003 |
Cryptographic tamper evidence G Itkis Proceedings of the 10th ACM conference on Computer and communications …, 2003 | 45 | 2003 |
Forward security, adaptive cryptography: Time evolution G Itkis Handbook of Information Security 3, 927-944, 2006 | 40 | 2006 |
Multicast security: A taxonomy and efficient authentication R Canetti, J Garay, G Itkis, D Micciancio, M Naor, B Pinkas Proc. of INFOCOM’99, 1999 | 28 | 1999 |
Iris biometric security challenges and possible solutions: For your eyes only? using the iris as a key G Itkis, V Chandar, BW Fuller, JP Campbell, RK Cunningham IEEE Signal Processing Magazine 32 (5), 42-53, 2015 | 25 | 2015 |
Bounded-collusion attribute-based encryption from minimal assumptions G Itkis, E Shen, M Varia, D Wilson, A Yerukhimovich Public-Key Cryptography–PKC 2017: 20th IACR International Conference on …, 2017 | 17 | 2017 |
Securing bulk content almost for free J Byers, J Considine, G Itkis, MC Cheng, A Yeung Computer communications 29 (3), 280-290, 2006 | 17 | 2006 |
On mixed connectivity certificates S Even, G Itkis, S Rajsbaum Theoretical computer science 203 (2), 253-269, 1998 | 17 | 1998 |
Intrusion-resilient signatures, or towards obsoletion of certificate revocation G Itkis, L Reyzin Advances in Cryptology—CRYPTO 2, 1-16, 2002 | 16 | 2002 |
Generalized key-evolving signature schemes or how to foil an armed adversary G Itkis, P Xie Applied Cryptography and Network Security: First International Conference …, 2003 | 13 | 2003 |
Multicast Security: A Taxonomy and E cient Construction R Canetti, J Garay, G Itkis, D Micciancio, M Naor, B Pinkas Proc. IEEE Infocom, 1999 | 7 | 1999 |
Power of fast VLSI models is insensitive to wires' thinness G Itkis, LA Levin 30th Annual Symposium on Foundations of Computer Science, 402-407, 1989 | 5 | 1989 |
Group Key Manager on a Smart Card H Hamandi, G Itkis Boston University Computer Science Department, 2004 | 2 | 2004 |
Broadcasting on a budget in the multi-service communication model G Itkis, I Newman, A Schuster Proceedings. Fifth International Conference on High Performance Computing …, 1998 | 2 | 1998 |