Cryptographers' World
 

Jessica Staddon


Author's Web Page Link

6 papers in database with 486 citations Star

H-number: 6

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Philippe Golle,  Jessica Staddon,  Brent Waters,  Secure Conjunctive Keyword Search over Encrypted Data, pp. 31 - 45, ACNS 2004.

[Electronic Edition][Cited 84 times Red Star]

2. Mihir Bellare,  Alexandra Boldyreva,  Jessica Staddon,  Randomness Re-use in Multi-recipient Encryption Schemes, pp. 85 - 99, PKC 2003.

[Electronic Edition][Cited 42 times ]

3. Alice Silverberg,  Jessica Staddon,  Judy L. Walker,  Efficient Traitor Tracing Algorithms Using List Decoding, pp. 175 - 192, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 50 times Red Star]

4. Juan A. Garay,  Jessica Staddon,  Avishai Wool,  Long-Lived Broadcast Encryption, pp. 333 - 352, CRYPTO 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 96 times Red Star]

5. Eli Gafni,  Jessica Staddon,  Yiqun Lisa Yin,  Efficient Methods for Integrating Traceability and Broadcast Encryption, pp. 372 - 387, CRYPTO 1999.

[Electronic Edition][Cited 91 times Red Star]

6. Michael Luby,  Jessica Staddon,  Combinatorial Bounds for Broadcast Encryption, pp. 512 - 526, EUROCRYPT 1998.

[Electronic Edition][Cited 123 times Red StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...