A clickable version of this file is located at http://www.cs.bu.edu/fac/itkis/ref/cit.html

Scholar Home   
 
-
Search only in: Engineering, Computer Science, and Mathematics
Business, Administration,Finance, and Economics
 Scholar  (Selected) Results for author:"Gene Itkis" OR author:"G Itkis".  

Multicast security: A taxonomy and some efficient constructions
R Canetti, J Garay, G Itkis, D Micciancio, M Naor, … - IEEE infocom, 1999
Cited by: 521 + 25 + 21 + 4 + 2 + 1 + 1
(see also
Asymmetric MACs. Gene Itkis, Rump talk at Crypto'96. Cited by: 1)

Forward-secure signatures with optimal signing and verifying
G Itkis, L Reyzin - Lecture Notes in Computer Science, 2001
Cited by
: 147 + 2 + 2 + 1 + 1

SiBIR: Signer-base intrusion-resilient signatures
G Itkis, L Reyzin - Lecture Notes in Computer Science, 2002
Cited by:
76 + 6 + 1

Deterministic, constant space, self-stabilizing leader election on uniform rings
G Itkis, C Lin, J Simon - Lecture Notes in Computer Science, 1995
Cited by:
38

Fast and lean self-stabilizing asynchronous protocols  
G Itkis, LA Levin - Foundations of Computer Science, 1994 Proceedings., 35th..., 1994
Cited by:
36

Intrusion-resilient signatures: Generic constructions, or defeating strong adversary with minimal …
G Itkis - Lecture notes in computer science, 2003
Cited by: 18

Cryptographic tamper evidence
G Itkis - Proceedings of the 10th ACM conference on Computer and …, 2003
Cited by: 15

On mixed connectivity certificates
S Even, G Itkis, S Rajsbaum - Theoretical computer science, 1998

Cited by:
9
+ 1

Other publications
Cited by:
8 + 4 + 4 + 3 + 3 + 2 + 2 + 1 + 1 + 1 + 1 + 1