Cryptographers' World
 

Roberto Tamassia


Author's Web Page Link

6 papers in database with 211 citations 

H-number: 6

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Michael T. Goodrich,  Roberto Tamassia,  Nikos Triandopoulos,  Super-Efficient Verification of Dynamic Outsourced Databases, pp. 407 - 424, CT-RSA 2008.

[Electronic Edition][Cited 16 times ]

2. Roberto Tamassia,  Nikos Triandopoulos,  Efficient Content Authentication in Peer-to-Peer Networks, pp. 354 - 372, ACNS 2007.

[Electronic Edition][Cited 15 times ]

3. Michael T. Goodrich,  Mikhail J. Atallah,  Roberto Tamassia,  Indexing Information for Data Forensics, pp. 206 - 221, ACNS 2005.

[Electronic Edition][Cited 14 times ]

4. Mikhail J. Atallah,  Keith B. Frikken,  Michael T. Goodrich,  Roberto Tamassia,  Secure Biometric Authentication for Weak Computational Devices, pp. 357 - 371, FC 2005.

[Electronic Edition][Cited 10 times ]

5. Michael T. Goodrich,  Jonathan Z. Sun,  Roberto Tamassia,  Efficient Tree-Based Revocation in Groups of Low-State Devices, pp. 511 - 527, CRYPTO 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 100 times Red StarRed Star]

6. Michael T. Goodrich,  Roberto Tamassia,  Nikos Triandopoulos,  Robert F. Cohen,  Authenticated Data Structures for Graph and Geometric Searching, pp. 295 - 313, CT-RSA 2003.

[Electronic Edition][Cited 56 times Red Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...