Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Alfredo De Santis
@article{DBLP:journals/tdsc/PriscoSP24, author = {Roberto De Prisco and Alfredo De Santis and Francesco Palmieri}, title = {Bounds and Protocols for Graph-Based Distributed Secret Sharing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {1}, pages = {434--448}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3261239}, doi = {10.1109/TDSC.2023.3261239}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/PriscoSP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PriscoSMZ23, author = {Roberto De Prisco and Alfredo De Santis and Delfina Malandrino and Rocco Zaccagnino}, title = {An improved privacy attack on smartphones exploiting the accelerometer}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103479}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103479}, doi = {10.1016/J.JISA.2023.103479}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/PriscoSMZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/PriscoSP23, author = {Roberto De Prisco and Alfredo De Santis and Francesco Palmieri}, title = {Improved Protocols for Distributed Secret Sharing}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {5}, pages = {3558--3571}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3213790}, doi = {10.1109/TDSC.2022.3213790}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/PriscoSP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/SantisM23, author = {Alfredo De Santis and Barbara Masucci}, editor = {Vijayalakshmi Atluri and Anna Lisa Ferrara}, title = {New Results on Distributed Secret Sharing Protocols}, booktitle = {Data and Applications Security and Privacy {XXXVII} - 37th Annual {IFIP} {WG} 11.3 Conference, DBSec 2023, Sophia-Antipolis, France, July 19-21, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13942}, pages = {51--68}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-37586-6\_4}, doi = {10.1007/978-3-031-37586-6\_4}, timestamp = {Fri, 14 Jul 2023 22:01:48 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/SantisM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/CarpentieriCSPP22, author = {Bruno Carpentieri and Arcangelo Castiglione and Alfredo De Santis and Francesco Palmieri and Raffaele Pizzolante}, title = {Privacy-preserving Secure Media Streaming for Multi-user Smart Environments}, journal = {{ACM} Trans. Internet Techn.}, volume = {22}, number = {2}, pages = {32:1--32:21}, year = {2022}, url = {https://doi.org/10.1145/3423047}, doi = {10.1145/3423047}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toit/CarpentieriCSPP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/DArcoPS21, author = {Paolo D'Arco and Roberto De Prisco and Alfredo De Santis}, title = {Secret sharing schemes for infinite sets of participants: {A} new design technique}, journal = {Theor. Comput. Sci.}, volume = {859}, pages = {149--161}, year = {2021}, url = {https://doi.org/10.1016/j.tcs.2021.01.019}, doi = {10.1016/J.TCS.2021.01.019}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/DArcoPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itasec/PriscoSZ21, author = {Roberto De Prisco and Alfredo De Santis and Rocco Zaccagnino}, editor = {Alessandro Armando and Michele Colajanni}, title = {An Accelerometer-based Privacy Attack on Smartphones}, booktitle = {Proceedings of the Italian Conference on Cybersecurity, {ITASEC} 2021, All Digital Event, April 7-9, 2021}, series = {{CEUR} Workshop Proceedings}, volume = {2940}, pages = {193--206}, publisher = {CEUR-WS.org}, year = {2021}, url = {https://ceur-ws.org/Vol-2940/paper17.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:11 +0100}, biburl = {https://dblp.org/rec/conf/itasec/PriscoSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-02919, author = {Francis Yuk{-}Lun Chin and Ngai Lam Ho and Alfredo De Santis and S. K. Kim}, title = {A Simple Algorithm for the Constrained Sequence Problems}, journal = {CoRR}, volume = {abs/2103.02919}, year = {2021}, url = {https://arxiv.org/abs/2103.02919}, eprinttype = {arXiv}, eprint = {2103.02919}, timestamp = {Mon, 15 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-02919.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/CarpentieriCSPP20, author = {Bruno Carpentieri and Arcangelo Castiglione and Alfredo De Santis and Francesco Palmieri and Raffaele Pizzolante}, title = {Compression-based steganography}, journal = {Concurr. Comput. Pract. Exp.}, volume = {32}, number = {8}, year = {2020}, url = {https://doi.org/10.1002/cpe.5322}, doi = {10.1002/CPE.5322}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/CarpentieriCSPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/PriscoSFM20, author = {Roberto De Prisco and Alfredo De Santis and Pompeo Faruolo and Marco Mannetta}, title = {Design of an outdoor position certification authority}, journal = {Int. J. Embed. Syst.}, volume = {12}, number = {4}, pages = {404--413}, year = {2020}, url = {https://doi.org/10.1504/IJES.2020.107639}, doi = {10.1504/IJES.2020.107639}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijes/PriscoSFM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/CarpentieriCSPP20, author = {Bruno Carpentieri and Arcangelo Castiglione and Alfredo De Santis and Francesco Palmieri and Raffaele Pizzolante and Xiaofei Xing}, title = {Securing visual search queries in ubiquitous scenarios empowered by smart personal devices}, journal = {Inf. Sci.}, volume = {508}, pages = {393--404}, year = {2020}, url = {https://doi.org/10.1016/j.ins.2019.08.075}, doi = {10.1016/J.INS.2019.08.075}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/CarpentieriCSPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/EspositoFCPS20, author = {Christian Esposito and Massimo Ficco and Aniello Castiglione and Francesco Palmieri and Alfredo De Santis}, title = {Distributed Group Key Management for Event Notification Confidentiality Among Sensors}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {17}, number = {3}, pages = {566--580}, year = {2020}, url = {https://doi.org/10.1109/TDSC.2018.2799227}, doi = {10.1109/TDSC.2018.2799227}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/EspositoFCPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/CarpentieriCSPP19, author = {Bruno Carpentieri and Arcangelo Castiglione and Alfredo De Santis and Francesco Palmieri and Raffaele Pizzolante}, title = {One-pass lossless data hiding and compression of remote sensing data}, journal = {Future Gener. Comput. Syst.}, volume = {90}, pages = {222--239}, year = {2019}, url = {https://doi.org/10.1016/j.future.2018.07.051}, doi = {10.1016/J.FUTURE.2018.07.051}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/CarpentieriCSPP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/FioreSPZP19, author = {Ugo Fiore and Alfredo De Santis and Francesca Perla and Paolo Zanetti and Francesco Palmieri}, title = {Using generative adversarial networks for improving classification effectiveness in credit card fraud detection}, journal = {Inf. Sci.}, volume = {479}, pages = {448--455}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2017.12.030}, doi = {10.1016/J.INS.2017.12.030}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/FioreSPZP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tbd/CastiglioneCMSR19, author = {Aniello Castiglione and Giuseppe Cattaneo and Giancarlo De Maio and Alfredo De Santis and Gianluca Roscigno}, title = {A Novel Methodology to Acquire Live Big Data Evidence from the Cloud}, journal = {{IEEE} Trans. Big Data}, volume = {5}, number = {4}, pages = {425--438}, year = {2019}, url = {https://doi.org/10.1109/TBDATA.2017.2683521}, doi = {10.1109/TBDATA.2017.2683521}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tbd/CastiglioneCMSR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cloudcomp/EspositoSTCC18, author = {Christian Esposito and Alfredo De Santis and Genny Tortora and Henry Chang and Kim{-}Kwang Raymond Choo}, title = {Blockchain: {A} Panacea for Healthcare Cloud-Based Data Security and Privacy?}, journal = {{IEEE} Cloud Comput.}, volume = {5}, number = {1}, pages = {31--37}, year = {2018}, url = {https://doi.org/10.1109/MCC.2018.011791712}, doi = {10.1109/MCC.2018.011791712}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cloudcomp/EspositoSTCC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PizzolanteCCSPC18, author = {Raffaele Pizzolante and Arcangelo Castiglione and Bruno Carpentieri and Alfredo De Santis and Francesco Palmieri and Aniello Castiglione}, title = {On the protection of consumer genomic data in the Internet of Living Things}, journal = {Comput. Secur.}, volume = {74}, pages = {384--400}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.06.003}, doi = {10.1016/J.COSE.2017.06.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PizzolanteCCSPC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jhsn/PriscoSM18, author = {Roberto De Prisco and Alfredo De Santis and Marco Mannetta}, title = {Reducing costs in HSM-based data centers}, journal = {J. High Speed Networks}, volume = {24}, number = {4}, pages = {363--373}, year = {2018}, url = {https://doi.org/10.3233/JHS-180600}, doi = {10.3233/JHS-180600}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jhsn/PriscoSM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/EspositoCPS18, author = {Christian Esposito and Aniello Castiglione and Francesco Palmieri and Alfredo De Santis}, title = {Integrity for an Event Notification Within the Industrial Internet of Things by Using Group Signatures}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {14}, number = {8}, pages = {3669--3678}, year = {2018}, url = {https://doi.org/10.1109/TII.2018.2791956}, doi = {10.1109/TII.2018.2791956}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/EspositoCPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/DArcoPS18, author = {Paolo D'Arco and Roberto De Prisco and Alfredo De Santis}, editor = {Arcangelo Castiglione and Florin Pop and Massimo Ficco and Francesco Palmieri}, title = {On the Equivalence of 2-Threshold Secret Sharing Schemes and Prefix Codes}, booktitle = {Cyberspace Safety and Security - 10th International Symposium, {CSS} 2018, Amalfi, Italy, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11161}, pages = {157--167}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01689-0\_13}, doi = {10.1007/978-3-030-01689-0\_13}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/css/DArcoPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mfcs/DArcoPSPV18, author = {Paolo D'Arco and Roberto De Prisco and Alfredo De Santis and Angel L. P{\'{e}}rez del Pozo and Ugo Vaccaro}, editor = {Igor Potapov and Paul G. Spirakis and James Worrell}, title = {Probabilistic Secret Sharing}, booktitle = {43rd International Symposium on Mathematical Foundations of Computer Science, {MFCS} 2018, August 27-31, 2018, Liverpool, {UK}}, series = {LIPIcs}, volume = {117}, pages = {64:1--64:16}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2018}, url = {https://doi.org/10.4230/LIPIcs.MFCS.2018.64}, doi = {10.4230/LIPICS.MFCS.2018.64}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mfcs/DArcoPSPV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/racs/CarpentieriCSPP18, author = {Bruno Carpentieri and Arcangelo Castiglione and Alfredo De Santis and Francesco Palmieri and Raffaele Pizzolante}, editor = {Chih{-}Cheng Hung and Lamjed Ben Said}, title = {Data hiding using compressed archives}, booktitle = {Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, {RACS} 2018, Honolulu, HI, USA, October 09-12, 2018}, pages = {136--142}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3264746.3264752}, doi = {10.1145/3264746.3264752}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/racs/CarpentieriCSPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/CastiglionePESP17, author = {Arcangelo Castiglione and Raffaele Pizzolante and Christian Esposito and Alfredo De Santis and Francesco Palmieri and Aniello Castiglione}, title = {A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants}, journal = {Future Gener. Comput. Syst.}, volume = {67}, pages = {230--241}, year = {2017}, url = {https://doi.org/10.1016/j.future.2016.08.001}, doi = {10.1016/J.FUTURE.2016.08.001}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/CastiglionePESP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/CastiglioneDSR17, author = {Arcangelo Castiglione and Paolo D'Arco and Alfredo De Santis and Rosario Russo}, title = {Secure group communication schemes for dynamic heterogeneous distributed computing}, journal = {Future Gener. Comput. Syst.}, volume = {74}, pages = {313--324}, year = {2017}, url = {https://doi.org/10.1016/j.future.2015.11.026}, doi = {10.1016/J.FUTURE.2015.11.026}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/CastiglioneDSR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/CastiglioneSMPH17, author = {Arcangelo Castiglione and Alfredo De Santis and Barbara Masucci and Francesco Palmieri and Xinyi Huang and Aniello Castiglione}, title = {Supporting dynamic updates in storage clouds with the Akl-Taylor scheme}, journal = {Inf. Sci.}, volume = {387}, pages = {56--74}, year = {2017}, url = {https://doi.org/10.1016/j.ins.2016.08.093}, doi = {10.1016/J.INS.2016.08.093}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/CastiglioneSMPH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/YouLS17, author = {Ilsun You and Gabriele Lenzini and Alfredo De Santis}, title = {Guest Editorial Special Issue on Insider Threats to Information Security, Digital Espionage, and Counter-Intelligence}, journal = {{IEEE} Syst. J.}, volume = {11}, number = {2}, pages = {371--372}, year = {2017}, url = {https://doi.org/10.1109/JSYST.2017.2658258}, doi = {10.1109/JSYST.2017.2658258}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/YouLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/CastiglionePPMC17, author = {Arcangelo Castiglione and Raffaele Pizzolante and Francesco Palmieri and Barbara Masucci and Bruno Carpentieri and Alfredo De Santis and Aniello Castiglione}, title = {On-Board Format-Independent Security of Functional Magnetic Resonance Images}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {16}, number = {2}, pages = {56:1--56:15}, year = {2017}, url = {https://doi.org/10.1145/2893474}, doi = {10.1145/2893474}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tecs/CastiglionePPMC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsusc/FioreCSP17, author = {Ugo Fiore and Aniello Castiglione and Alfredo De Santis and Francesco Palmieri}, title = {Exploiting Battery-Drain Vulnerabilities in Mobile Smart Devices}, journal = {{IEEE} Trans. Sustain. Comput.}, volume = {2}, number = {2}, pages = {90--99}, year = {2017}, url = {https://doi.org/10.1109/TSUSC.2017.2690148}, doi = {10.1109/TSUSC.2017.2690148}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsusc/FioreCSP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SantisFM17, author = {Alfredo De Santis and Manuela Flores and Barbara Masucci}, title = {One-Message Unilateral Entity Authentication Schemes}, booktitle = {Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017}, pages = {25:1--25:6}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3098954.3098982}, doi = {10.1145/3098954.3098982}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/SantisFM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gpc/PriscoSM17, author = {Roberto De Prisco and Alfredo De Santis and Marco Mannetta}, editor = {Man Ho Allen Au and Arcangelo Castiglione and Kim{-}Kwang Raymond Choo and Francesco Palmieri and Kuan{-}Ching Li}, title = {Reducing Costs in HSM-Based Data Centers}, booktitle = {Green, Pervasive, and Cloud Computing - 12th International Conference, {GPC} 2017, Cetara, Italy, May 11-14, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10232}, pages = {3--14}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-57186-7\_1}, doi = {10.1007/978-3-319-57186-7\_1}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gpc/PriscoSM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CastiglioneSM16, author = {Arcangelo Castiglione and Alfredo De Santis and Barbara Masucci}, title = {Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {4}, pages = {451--460}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2015.2413415}, doi = {10.1109/TDSC.2015.2413415}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CastiglioneSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CastiglioneSMPC16, author = {Arcangelo Castiglione and Alfredo De Santis and Barbara Masucci and Francesco Palmieri and Aniello Castiglione and Jin Li and Xinyi Huang}, title = {Hierarchical and Shared Access Control}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {4}, pages = {850--865}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2512533}, doi = {10.1109/TIFS.2015.2512533}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CastiglioneSMPC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/CastiglioneSMPC16a, author = {Arcangelo Castiglione and Alfredo De Santis and Barbara Masucci and Francesco Palmieri and Aniello Castiglione and Xinyi Huang}, title = {Cryptographic Hierarchical Access Control for Dynamic Structures}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {10}, pages = {2349--2364}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2581147}, doi = {10.1109/TIFS.2016.2581147}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/CastiglioneSMPC16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CastiglioneSMPC16, author = {Arcangelo Castiglione and Alfredo De Santis and Barbara Masucci and Francesco Palmieri and Aniello Castiglione}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {37--54}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_3}, doi = {10.1007/978-3-319-40367-0\_3}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/CastiglioneSMPC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/ColellaCSEP16, author = {Antonio Colella and Aniello Castiglione and Alfredo De Santis and Christian Esposito and Francesco Palmieri}, title = {Privacy-Aware Routing for Sharing Sensitive Information across Wide-Area Networks}, booktitle = {19th International Conference on Network-Based Information Systems, NBiS 2016, Ostrava, Czech Republic, September 7-9, 2016}, pages = {70--75}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/NBiS.2016.69}, doi = {10.1109/NBIS.2016.69}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nbis/ColellaCSEP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/CastiglionePSCCP15, author = {Arcangelo Castiglione and Raffaele Pizzolante and Alfredo De Santis and Bruno Carpentieri and Aniello Castiglione and Francesco Palmieri}, title = {Cloud-based adaptive compression and secure management services for 3D healthcare data}, journal = {Future Gener. Comput. Syst.}, volume = {43-44}, pages = {120--134}, year = {2015}, url = {https://doi.org/10.1016/j.future.2014.07.001}, doi = {10.1016/J.FUTURE.2014.07.001}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/CastiglionePSCCP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/CastiglionePFCS15, author = {Arcangelo Castiglione and Francesco Palmieri and Ugo Fiore and Aniello Castiglione and Alfredo De Santis}, title = {Modeling energy-efficient secure communications in multi-mode wireless mobile devices}, journal = {J. Comput. Syst. Sci.}, volume = {81}, number = {8}, pages = {1464--1478}, year = {2015}, url = {https://doi.org/10.1016/j.jcss.2014.12.022}, doi = {10.1016/J.JCSS.2014.12.022}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcss/CastiglionePFCS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/CastiglionePPSC15, author = {Arcangelo Castiglione and Raffaele Pizzolante and Francesco Palmieri and Alfredo De Santis and Bruno Carpentieri and Aniello Castiglione}, title = {Secure and reliable data communication in developing regions and rural areas}, journal = {Pervasive Mob. Comput.}, volume = {24}, pages = {117--128}, year = {2015}, url = {https://doi.org/10.1016/j.pmcj.2015.04.001}, doi = {10.1016/J.PMCJ.2015.04.001}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/percom/CastiglionePPSC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SantisMP15, author = {Alfredo De Santis and Giancarlo De Maio and Umberto Ferraro Petrillo}, title = {Using {HTML5} to prevent detection of drive-by-download web malware}, journal = {Secur. Commun. Networks}, volume = {8}, number = {7}, pages = {1237--1255}, year = {2015}, url = {https://doi.org/10.1002/sec.1077}, doi = {10.1002/SEC.1077}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SantisMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/DArcoS15, author = {Paolo D'Arco and Alfredo De Santis}, title = {Anonymous protocols: Notions and equivalence}, journal = {Theor. Comput. Sci.}, volume = {581}, pages = {9--25}, year = {2015}, url = {https://doi.org/10.1016/j.tcs.2015.02.042}, doi = {10.1016/J.TCS.2015.02.042}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/DArcoS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/www/CarulloCSP15, author = {Giuliana Carullo and Aniello Castiglione and Alfredo De Santis and Francesco Palmieri}, title = {A triadic closure and homophily-based recommendation system for online social networks}, journal = {World Wide Web}, volume = {18}, number = {6}, pages = {1579--1601}, year = {2015}, url = {https://doi.org/10.1007/s11280-015-0333-5}, doi = {10.1007/S11280-015-0333-5}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/www/CarulloCSP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/3pgcic/PizzolanteCCSPC15, author = {Raffaele Pizzolante and Arcangelo Castiglione and Bruno Carpentieri and Alfredo De Santis and Francesco Palmieri and Aniello Castiglione}, editor = {Fatos Xhafa and Leonard Barolli and Fabrizio Messina and Marek R. Ogiela}, title = {Format-Independent Protection of {DNA} Microarray Images}, booktitle = {10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015, Krakow, Poland, November 4-6, 2015}, pages = {351--357}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/3PGCIC.2015.138}, doi = {10.1109/3PGCIC.2015.138}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/3pgcic/PizzolanteCCSPC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/3pgcic/PizzolanteCCSC15, author = {Raffaele Pizzolante and Arcangelo Castiglione and Bruno Carpentieri and Alfredo De Santis and Aniello Castiglione}, editor = {Fatos Xhafa and Leonard Barolli and Fabrizio Messina and Marek R. Ogiela}, title = {Reversible Copyright Protection for {DNA} Microarray Images}, booktitle = {10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2015, Krakow, Poland, November 4-6, 2015}, pages = {707--712}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/3PGCIC.2015.139}, doi = {10.1109/3PGCIC.2015.139}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/3pgcic/PizzolanteCCSC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/CastiglioneSPCL15, author = {Arcangelo Castiglione and Alfredo De Santis and Raffaele Pizzolante and Aniello Castiglione and Vincenzo Loia and Francesco Palmieri}, editor = {Leonard Barolli and Makoto Takizawa and Fatos Xhafa and Tomoya Enokido and Jong Hyuk Park}, title = {On the Protection of fMRI Images in Multi-domain Environments}, booktitle = {29th {IEEE} International Conference on Advanced Information Networking and Applications, {AINA} 2015, Gwangju, South Korea, March 24-27, 2015}, pages = {476--481}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/AINA.2015.224}, doi = {10.1109/AINA.2015.224}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aina/CastiglioneSPCL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CastiglioneCSMP15, author = {Aniello Castiglione and Arcangelo Castiglione and Alfredo De Santis and Barbara Masucci and Francesco Palmieri and Raffaele Pizzolante}, editor = {Elisa Bertino and Ilsun You}, title = {Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence}, booktitle = {Proceedings of the 7th {ACM} {CCS} International Workshop on Managing Insider Security Threats, {MIST} 2015, Denver, Colorado, USA, October 16, 2015}, pages = {29--39}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2808783.2808789}, doi = {10.1145/2808783.2808789}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CastiglioneCSMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wivace/BiasiFPSCSIP15, author = {Luigi Di Biasi and Roberto Fino and Rosaura Parisi and Lucia Sessa and Giuseppe Cattaneo and Alfredo De Santis and Pio Iannelli and Stefano Piotto}, editor = {Federico Rossi and Fabio Mavelli and Pasquale Stano and Danilo Caivano}, title = {Novel Algorithm for Efficient Distribution of Molecular Docking Calculations}, booktitle = {Advances in Artificial Life, Evolutionary Computation and Systems Chemistry - 10th Italian Workshop, {WIVACE} 2015, Bari, Italy, September 22-25, 2015, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {587}, pages = {65--74}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-32695-5\_6}, doi = {10.1007/978-3-319-32695-5\_6}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wivace/BiasiFPSCSIP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wivace/SessaBCCSIP15, author = {Lucia Sessa and Luigi Di Biasi and Simona Concilio and Giuseppe Cattaneo and Alfredo De Santis and Pio Iannelli and Stefano Piotto}, editor = {Federico Rossi and Fabio Mavelli and Pasquale Stano and Danilo Caivano}, title = {A New Flexible Protocol for Docking Studies}, booktitle = {Advances in Artificial Life, Evolutionary Computation and Systems Chemistry - 10th Italian Workshop, {WIVACE} 2015, Bari, Italy, September 22-25, 2015, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {587}, pages = {117--126}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-32695-5\_11}, doi = {10.1007/978-3-319-32695-5\_11}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wivace/SessaBCCSIP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/SantisMP15, author = {Alfredo De Santis and Giancarlo De Maio and Umberto Ferraro Petrillo}, title = {Using {HTML5} to Prevent Detection of Drive-by-Download Web Malware}, journal = {CoRR}, volume = {abs/1507.03467}, year = {2015}, url = {http://arxiv.org/abs/1507.03467}, eprinttype = {arXiv}, eprint = {1507.03467}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/SantisMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijpp/FiorePCS14, author = {Ugo Fiore and Francesco Palmieri and Aniello Castiglione and Alfredo De Santis}, title = {A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems}, journal = {Int. J. Parallel Program.}, volume = {42}, number = {5}, pages = {755--775}, year = {2014}, url = {https://doi.org/10.1007/s10766-013-0289-y}, doi = {10.1007/S10766-013-0289-Y}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijpp/FiorePCS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/CastiglionePSFP14, author = {Aniello Castiglione and Roberto De Prisco and Alfredo De Santis and Ugo Fiore and Francesco Palmieri}, title = {A botnet-based command and control approach relying on swarm intelligence}, journal = {J. Netw. Comput. Appl.}, volume = {38}, pages = {22--33}, year = {2014}, url = {https://doi.org/10.1016/j.jnca.2013.05.002}, doi = {10.1016/J.JNCA.2013.05.002}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/CastiglionePSFP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/DArcoPS14, author = {Paolo D'Arco and Roberto De Prisco and Alfredo De Santis}, title = {Measure-independent characterization of contrast optimal visual cryptography schemes}, journal = {J. Syst. Softw.}, volume = {95}, pages = {89--99}, year = {2014}, url = {https://doi.org/10.1016/j.jss.2014.03.079}, doi = {10.1016/J.JSS.2014.03.079}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/DArcoPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/PriscoS14, author = {Roberto De Prisco and Alfredo De Santis}, title = {On the Relation of Random Grid and Deterministic Visual Cryptography}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {9}, number = {4}, pages = {653--665}, year = {2014}, url = {https://doi.org/10.1109/TIFS.2014.2305574}, doi = {10.1109/TIFS.2014.2305574}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/PriscoS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/CastiglioneSCP14, author = {Arcangelo Castiglione and Alfredo De Santis and Aniello Castiglione and Francesco Palmieri}, editor = {Leonard Barolli and Kin Fun Li and Tomoya Enokido and Fatos Xhafa and Makoto Takizawa}, title = {An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update}, booktitle = {28th {IEEE} International Conference on Advanced Information Networking and Applications, {AINA} 2014, Victoria, BC, Canada, May 13-16, 2014}, pages = {351--358}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/AINA.2014.45}, doi = {10.1109/AINA.2014.45}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aina/CastiglioneSCP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/FiorePCLS14, author = {Ugo Fiore and Francesco Palmieri and Aniello Castiglione and Vincenzo Loia and Alfredo De Santis}, title = {Multimedia-based battery drain attacks for Android devices}, booktitle = {11th {IEEE} Consumer Communications and Networking Conference, {CCNC} 2014, Las Vegas, NV, USA, January 10-13, 2014}, pages = {145--150}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CCNC.2014.6866562}, doi = {10.1109/CCNC.2014.6866562}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/FiorePCLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imis/CastiglionePCS14, author = {Arcangelo Castiglione and Raffaele Pizzolante and Bruno Carpentieri and Alfredo De Santis}, title = {An Efficient Protocol for Reliable Data Communication on Dataless Devices}, booktitle = {Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, {IMIS} 2014, Birmingham, United Kingdom, 2-4 July, 2014}, pages = {517--522}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/IMIS.2014.75}, doi = {10.1109/IMIS.2014.75}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imis/CastiglionePCS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/CarulloCS14, author = {Giuliana Carullo and Aniello Castiglione and Alfredo De Santis}, editor = {Fatos Xhafa and Leonard Barolli and Francesco Palmieri and Mario Koeppen and Vincenzo Loia}, title = {Friendship Recommendations in Online Social Networks}, booktitle = {2014 International Conference on Intelligent Networking and Collaborative Systems, Salerno, Italy, September 10-12, 2014}, pages = {42--48}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INCoS.2014.114}, doi = {10.1109/INCOS.2014.114}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/incos/CarulloCS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/PizzolanteCC14, author = {Raffaele Pizzolante and Arcangelo Castiglione and Bruno Carpentieri and Alfredo De Santis and Aniello Castiglione}, editor = {Fatos Xhafa and Leonard Barolli and Francesco Palmieri and Mario Koeppen and Vincenzo Loia}, title = {Protection of Microscopy Images through Digital Watermarking Techniques}, booktitle = {2014 International Conference on Intelligent Networking and Collaborative Systems, Salerno, Italy, September 10-12, 2014}, pages = {65--72}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INCoS.2014.116}, doi = {10.1109/INCOS.2014.116}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/incos/PizzolanteCC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/CastiglionePSD14, author = {Arcangelo Castiglione and Raffaele Pizzolante and Alfredo De Santis and Ciriaco D'Ambrosio}, editor = {Fatos Xhafa and Leonard Barolli and Francesco Palmieri and Mario Koeppen and Vincenzo Loia}, title = {A Collaborative Decision-Support System for Secure Analysis of Cranial Disorders}, booktitle = {2014 International Conference on Intelligent Networking and Collaborative Systems, Salerno, Italy, September 10-12, 2014}, pages = {189--196}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INCoS.2014.115}, doi = {10.1109/INCOS.2014.115}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/incos/CastiglionePSD14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/ColellaCS14, author = {Antonio Colella and Aniello Castiglione and Alfredo De Santis}, editor = {Fatos Xhafa and Leonard Barolli and Francesco Palmieri and Mario Koeppen and Vincenzo Loia}, title = {The Role of Trust and Co-partnership in the Societal Digital Security Culture Approach}, booktitle = {2014 International Conference on Intelligent Networking and Collaborative Systems, Salerno, Italy, September 10-12, 2014}, pages = {350--355}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INCoS.2014.142}, doi = {10.1109/INCOS.2014.142}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/incos/ColellaCS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/PizzolanteCCS14, author = {Raffaele Pizzolante and Arcangelo Castiglione and Bruno Carpentieri and Alfredo De Santis}, editor = {Leonard Barolli and Fatos Xhafa and Makoto Takizawa and Tomoya Enokido and Aniello Castiglione and Alfredo De Santis}, title = {Parallel Low-Complexity Lossless Coding of Three-Dimensional Medical Images}, booktitle = {17th International Conference on Network-Based Information Systems, NBiS 2014, Salerno, Italy, September 10-12, 2014}, pages = {91--98}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/NBiS.2014.107}, doi = {10.1109/NBIS.2014.107}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nbis/PizzolanteCCS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/CastiglioneSM14, author = {Arcangelo Castiglione and Alfredo De Santis and Barbara Masucci}, editor = {Leonard Barolli and Fatos Xhafa and Makoto Takizawa and Tomoya Enokido and Aniello Castiglione and Alfredo De Santis}, title = {Hierarchical and Shared Key Assignment}, booktitle = {17th International Conference on Network-Based Information Systems, NBiS 2014, Salerno, Italy, September 10-12, 2014}, pages = {263--270}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/NBiS.2014.106}, doi = {10.1109/NBIS.2014.106}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nbis/CastiglioneSM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/FioreCSP14, author = {Ugo Fiore and Aniello Castiglione and Alfredo De Santis and Francesco Palmieri}, editor = {Leonard Barolli and Fatos Xhafa and Makoto Takizawa and Tomoya Enokido and Aniello Castiglione and Alfredo De Santis}, title = {Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome}, booktitle = {17th International Conference on Network-Based Information Systems, NBiS 2014, Salerno, Italy, September 10-12, 2014}, pages = {355--360}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/NBiS.2014.102}, doi = {10.1109/NBIS.2014.102}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nbis/FioreCSP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nbis/2014, editor = {Leonard Barolli and Fatos Xhafa and Makoto Takizawa and Tomoya Enokido and Aniello Castiglione and Alfredo De Santis}, title = {17th International Conference on Network-Based Information Systems, NBiS 2014, Salerno, Italy, September 10-12, 2014}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/7021861/proceeding}, isbn = {978-1-4799-4224-4}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nbis/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CastiglioneSM14, author = {Arcangelo Castiglione and Alfredo De Santis and Barbara Masucci}, title = {Key Indistinguishability vs. Strong Key Indistinguishability for Hierarchical Key Assignment Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {752}, year = {2014}, url = {http://eprint.iacr.org/2014/752}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CastiglioneSM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/CastiglioneCMS13, author = {Aniello Castiglione and Giuseppe Cattaneo and Giancarlo De Maio and Alfredo De Santis}, title = {Automated Production of Predetermined Digital Evidence}, journal = {{IEEE} Access}, volume = {1}, pages = {216--231}, year = {2013}, url = {https://doi.org/10.1109/ACCESS.2013.2260817}, doi = {10.1109/ACCESS.2013.2260817}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/CastiglioneCMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/PalmieriFCS13, author = {Francesco Palmieri and Ugo Fiore and Aniello Castiglione and Alfredo De Santis}, title = {On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines}, journal = {Appl. Soft Comput.}, volume = {13}, number = {1}, pages = {615--627}, year = {2013}, url = {https://doi.org/10.1016/j.asoc.2012.08.045}, doi = {10.1016/J.ASOC.2012.08.045}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/asc/PalmieriFCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/FiorePCS13, author = {Ugo Fiore and Francesco Palmieri and Aniello Castiglione and Alfredo De Santis}, title = {Network anomaly detection with the restricted Boltzmann machine}, journal = {Neurocomputing}, volume = {122}, pages = {13--23}, year = {2013}, url = {https://doi.org/10.1016/j.neucom.2012.11.050}, doi = {10.1016/J.NEUCOM.2012.11.050}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/FiorePCS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/AtenieseSFM13, author = {Giuseppe Ateniese and Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci}, title = {A note on time-bound hierarchical key assignment schemes}, journal = {Inf. Process. Lett.}, volume = {113}, number = {5-6}, pages = {151--155}, year = {2013}, url = {https://doi.org/10.1016/j.ipl.2013.01.006}, doi = {10.1016/J.IPL.2013.01.006}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/AtenieseSFM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/SantisCFP13, author = {Alfredo De Santis and Aniello Castiglione and Ugo Fiore and Francesco Palmieri}, title = {An intelligent security architecture for distributed firewalling environments}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {4}, number = {2}, pages = {223--234}, year = {2013}, url = {https://doi.org/10.1007/s12652-011-0069-8}, doi = {10.1007/S12652-011-0069-8}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/SantisCFP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/PriscoS13, author = {Roberto De Prisco and Alfredo De Santis}, title = {Color visual cryptography schemes for black and white secret images}, journal = {Theor. Comput. Sci.}, volume = {510}, pages = {62--86}, year = {2013}, url = {https://doi.org/10.1016/j.tcs.2013.09.005}, doi = {10.1016/J.TCS.2013.09.005}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/PriscoS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/PalmieriFCLS13, author = {Francesco Palmieri and Ugo Fiore and Aniello Castiglione and Fang{-}Yie Leu and Alfredo De Santis}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {Analyzing the Internet Stability in Presence of Disasters}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {253--268}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_18}, doi = {10.1007/978-3-642-40588-4\_18}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/PalmieriFCLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/CastiglioneDSP13, author = {Arcangelo Castiglione and Ciriaco D'Ambrosio and Alfredo De Santis and Francesco Palmieri}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {414--429}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_29}, doi = {10.1007/978-3-642-40588-4\_29}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/CastiglioneDSP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/CastiglioneCMS13, author = {Aniello Castiglione and Giuseppe Cattaneo and Giancarlo De Maio and Alfredo De Santis}, editor = {Leonard Barolli and Fatos Xhafa and Makoto Takizawa and Tomoya Enokido and Hui{-}Huang Hsu}, title = {Forensically-Sound Methods to Collect Live Network Evidence}, booktitle = {27th {IEEE} International Conference on Advanced Information Networking and Applications, {AINA} 2013, Barcelona, Spain, March 25-28, 2013}, pages = {405--412}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/AINA.2013.133}, doi = {10.1109/AINA.2013.133}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aina/CastiglioneCMS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/CarulloCCSFP13, author = {Giuliana Carullo and Aniello Castiglione and Giuseppe Cattaneo and Alfredo De Santis and Ugo Fiore and Francesco Palmieri}, editor = {Leonard Barolli and Fatos Xhafa and Makoto Takizawa and Tomoya Enokido and Hui{-}Huang Hsu}, title = {FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment}, booktitle = {27th {IEEE} International Conference on Advanced Information Networking and Applications, {AINA} 2013, Barcelona, Spain, March 25-28, 2013}, pages = {1113--1120}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/AINA.2013.100}, doi = {10.1109/AINA.2013.100}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aina/CarulloCCSFP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DArcoPS13, author = {Paolo D'Arco and Roberto De Prisco and Alfredo De Santis}, editor = {Carles Padr{\'{o}}}, title = {Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes}, booktitle = {Information Theoretic Security - 7th International Conference, {ICITS} 2013, Singapore, November 28-30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8317}, pages = {39--55}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04268-8\_3}, doi = {10.1007/978-3-319-04268-8\_3}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/DArcoPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imis/CastiglioneDSCP13, author = {Arcangelo Castiglione and Ciriaco D'Ambrosio and Alfredo De Santis and Aniello Castiglione and Francesco Palmieri}, editor = {Leonard Barolli and Ilsun You and Fatos Xhafa and Fang{-}Yie Leu and Hsing{-}Chung Chen}, title = {On Secure Data Management in Health-Care Environment}, booktitle = {Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, {IMIS} 2013, Taichung, Taiwan, July 3-5, 2013}, pages = {666--671}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/IMIS.2013.120}, doi = {10.1109/IMIS.2013.120}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imis/CastiglioneDSCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/CastiglioneSCPF13, author = {Arcangelo Castiglione and Alfredo De Santis and Aniello Castiglione and Francesco Palmieri and Ugo Fiore}, title = {An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications}, booktitle = {2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013}, pages = {157--165}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INCoS.2013.32}, doi = {10.1109/INCOS.2013.32}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/incos/CastiglioneSCPF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/DArcoS13, author = {Paolo D'Arco and Alfredo De Santis}, editor = {Jordi Castell{\`{a}}{-}Roca and Josep Domingo{-}Ferrer and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Ali A. Ghorbani and Christian Damsgaard Jensen and Jes{\'{u}}s A. Manj{\'{o}}n and Iosif{-}Viorel Onut and Natalia Stakhanova and Vicen{\c{c}} Torra and Jie Zhang}, title = {Key privacy and anonymous protocols}, booktitle = {Eleventh Annual International Conference on Privacy, Security and Trust, {PST} 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain, July 10-12, 2013}, pages = {11--18}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/PST.2013.6596031}, doi = {10.1109/PST.2013.6596031}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pst/DArcoS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PriscoS13, author = {Roberto De Prisco and Alfredo De Santis}, title = {On the Relation of Random Grid, Probabilistic and Deterministic Visual Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {818}, year = {2013}, url = {http://eprint.iacr.org/2013/818}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PriscoS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cma/CastiglioneSFP12, author = {Aniello Castiglione and Alfredo De Santis and Ugo Fiore and Francesco Palmieri}, title = {An asynchronous covert channel using spam}, journal = {Comput. Math. Appl.}, volume = {63}, number = {2}, pages = {437--447}, year = {2012}, url = {https://doi.org/10.1016/j.camwa.2011.07.068}, doi = {10.1016/J.CAMWA.2011.07.068}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cma/CastiglioneSFP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CastiglioneCCSFPP12, author = {Aniello Castiglione and Giuseppe Cattaneo and Maurizio Cembalo and Alfredo De Santis and Pompeo Faruolo and Fabio Petagna and Umberto Ferraro Petrillo}, title = {Engineering a secure mobile messaging framework}, journal = {Comput. Secur.}, volume = {31}, number = {6}, pages = {771--781}, year = {2012}, url = {https://doi.org/10.1016/j.cose.2012.06.004}, doi = {10.1016/J.COSE.2012.06.004}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CastiglioneCCSFPP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AtenieseSFM12, author = {Giuseppe Ateniese and Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci}, title = {Provably-Secure Time-Bound Hierarchical Key Assignment Schemes}, journal = {J. Cryptol.}, volume = {25}, number = {2}, pages = {243--270}, year = {2012}, url = {https://doi.org/10.1007/s00145-010-9094-6}, doi = {10.1007/S00145-010-9094-6}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AtenieseSFM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/CastiglioneCPSY12, author = {Aniello Castiglione and Giuseppe Cattaneo and Roberto De Prisco and Alfredo De Santis and Kangbin Yim}, editor = {Gerald Quirchmayr and Josef Basl and Ilsun You and Lida Xu and Edgar R. Weippl}, title = {How to Forge a Digital Alibi on Mac {OS} {X}}, booktitle = {Multidisciplinary Research and Practice for Information Systems - {IFIP} {WG} 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, {CD-ARES} 2012, Prague, Czech Republic, August 20-24, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7465}, pages = {430--444}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32498-7\_32}, doi = {10.1007/978-3-642-32498-7\_32}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/CastiglioneCPSY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imis/CastiglioneCMSCE12, author = {Aniello Castiglione and Giuseppe Cattaneo and Giancarlo De Maio and Alfredo De Santis and Gerardo Costabile and Mattia Epifani}, editor = {Ilsun You and Leonard Barolli and Antonio Gentile and Hae{-}Duck Joshua Jeong and Marek R. Ogiela and Fatos Xhafa}, title = {The Forensic Analysis of a False Digital Alibi}, booktitle = {Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, {IMIS} 2012, Palermo, Italy, July 4-6, 2012}, pages = {114--121}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/IMIS.2012.127}, doi = {10.1109/IMIS.2012.127}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imis/CastiglioneCMSCE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imis/CastiglioneSFP12, author = {Aniello Castiglione and Alfredo De Santis and Ugo Fiore and Francesco Palmieri}, editor = {Ilsun You and Leonard Barolli and Antonio Gentile and Hae{-}Duck Joshua Jeong and Marek R. Ogiela and Fatos Xhafa}, title = {Device Tracking in Private Networks via {NAPT} Log Analysis}, booktitle = {Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, {IMIS} 2012, Palermo, Italy, July 4-6, 2012}, pages = {603--608}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/IMIS.2012.125}, doi = {10.1109/IMIS.2012.125}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imis/CastiglioneSFP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SantisY12, author = {Alfredo De Santis and Moti Yung}, title = {"Metaproofs" (and their Cryptographic Applications)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {495}, year = {2012}, url = {http://eprint.iacr.org/2012/495}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SantisY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/CastiglioneDSP11, author = {Aniello Castiglione and Bonaventura D'Alessio and Alfredo De Santis and Francesco Palmieri}, title = {Hiding Information into {OOXML} Documents: New Steganographic Perspectives}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {2}, number = {4}, pages = {59--83}, year = {2011}, url = {https://doi.org/10.22667/JOWUA.2011.12.31.059}, doi = {10.22667/JOWUA.2011.12.31.059}, timestamp = {Tue, 05 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jowua/CastiglioneDSP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/SantisFM11, author = {Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci}, title = {Efficient provably-secure hierarchical key assignment schemes}, journal = {Theor. Comput. Sci.}, volume = {412}, number = {41}, pages = {5684--5699}, year = {2011}, url = {https://doi.org/10.1016/j.tcs.2011.06.024}, doi = {10.1016/J.TCS.2011.06.024}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/SantisFM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DArcoS11, author = {Paolo D'Arco and Alfredo De Santis}, title = {On Ultralightweight {RFID} Authentication Protocols}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {8}, number = {4}, pages = {548--563}, year = {2011}, url = {https://doi.org/10.1109/TDSC.2010.75}, doi = {10.1109/TDSC.2010.75}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DArcoS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/CastiglioneDSP11, author = {Aniello Castiglione and Bonaventura D'Alessio and Alfredo De Santis and Francesco Palmieri}, editor = {A Min Tjoa and Gerald Quirchmayr and Ilsun You and Lida Xu}, title = {New Steganographic Techniques for the {OOXML} File Format}, booktitle = {Availability, Reliability and Security for Business, Enterprise and Health Information Systems - {IFIP} {WG} 8.4/8.9 International Cross Domain Conference and Workshop, {ARES} 2011, Vienna, Austria, August 22-26, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6908}, pages = {344--358}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23300-5\_27}, doi = {10.1007/978-3-642-23300-5\_27}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/CastiglioneDSP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SantisCCMI11, author = {Alfredo De Santis and Aniello Castiglione and Giuseppe Cattaneo and Giancarlo De Maio and Mario Ianulardo}, editor = {A Min Tjoa and Gerald Quirchmayr and Ilsun You and Lida Xu}, title = {Automated Construction of a False Digital Alibi}, booktitle = {Availability, Reliability and Security for Business, Enterprise and Health Information Systems - {IFIP} {WG} 8.4/8.9 International Cross Domain Conference and Workshop, {ARES} 2011, Vienna, Austria, August 22-26, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6908}, pages = {359--373}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23300-5\_28}, doi = {10.1007/978-3-642-23300-5\_28}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/SantisCCMI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bwcca/CastiglioneDS11, author = {Aniello Castiglione and Bonaventura D'Alessio and Alfredo De Santis}, title = {Steganography and Secure Communication on Online Social Networks and Online Photo Sharing}, booktitle = {2011 International Conference on Broadband, Wireless Computing, Communication and Applications, {BWCCA} 2011, Barcelona, Spain, October 26-28, 2011}, pages = {363--368}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/BWCCA.2011.60}, doi = {10.1109/BWCCA.2011.60}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bwcca/CastiglioneDS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bwcca/AlbanoCCS11, author = {Pietro Albano and Aniello Castiglione and Giuseppe Cattaneo and Alfredo De Santis}, title = {A Novel Anti-forensics Technique for the Android {OS}}, booktitle = {2011 International Conference on Broadband, Wireless Computing, Communication and Applications, {BWCCA} 2011, Barcelona, Spain, October 26-28, 2011}, pages = {380--385}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/BWCCA.2011.62}, doi = {10.1109/BWCCA.2011.62}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bwcca/AlbanoCCS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bwcca/CastiglioneCMS11, author = {Aniello Castiglione and Giuseppe Cattaneo and Giancarlo De Maio and Alfredo De Santis}, title = {Automatic, Selective and Secure Deletion of Digital Evidence}, booktitle = {2011 International Conference on Broadband, Wireless Computing, Communication and Applications, {BWCCA} 2011, Barcelona, Spain, October 26-28, 2011}, pages = {392--398}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/BWCCA.2011.64}, doi = {10.1109/BWCCA.2011.64}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bwcca/CastiglioneCMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/PriscoS11, author = {Roberto De Prisco and Alfredo De Santis}, editor = {Serge Fehr}, title = {Using Colors to Improve Visual Cryptography for Black and White Images}, booktitle = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, pages = {182--201}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0\_17}, doi = {10.1007/978-3-642-20728-0\_17}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/PriscoS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imis/CastiglioneSFP11, author = {Aniello Castiglione and Alfredo De Santis and Ugo Fiore and Francesco Palmieri}, editor = {Ilsun You and Leonard Barolli and Feilong Tang and Fatos Xhafa}, title = {E-mail-Based Covert Channels for Asynchronous Message Steganography}, booktitle = {Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, {IMIS} 2011, Seoul, Korea, June 30-July 02, 2011}, pages = {503--508}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/IMIS.2011.133}, doi = {10.1109/IMIS.2011.133}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/imis/CastiglioneSFP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/CastiglioneCS11, author = {Aniello Castiglione and Giuseppe Cattaneo and Alfredo De Santis}, editor = {Fatos Xhafa and Leonard Barolli and Mario K{\"{o}}ppen}, title = {A Forensic Analysis of Images on Online Social Networks}, booktitle = {2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30 - Dec. 2, 2011}, pages = {679--684}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/INCoS.2011.17}, doi = {10.1109/INCOS.2011.17}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/incos/CastiglioneCS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/AlbanoCCMS11, author = {Pietro Albano and Aniello Castiglione and Giuseppe Cattaneo and Giancarlo De Maio and Alfredo De Santis}, editor = {Fatos Xhafa and Leonard Barolli and Mario K{\"{o}}ppen}, title = {On the Construction of a False Digital Alibi on the Android {OS}}, booktitle = {2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30 - Dec. 2, 2011}, pages = {685--690}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/INCoS.2011.129}, doi = {10.1109/INCOS.2011.129}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/incos/AlbanoCCMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/CastiglioneSP11, author = {Aniello Castiglione and Alfredo De Santis and Francesco Palmieri}, editor = {Fatos Xhafa and Leonard Barolli and Mario K{\"{o}}ppen}, title = {Characterizing and Classifying Card-Sharing Traffic through Wavelet Analysis}, booktitle = {2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30 - Dec. 2, 2011}, pages = {691--697}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/INCoS.2011.62}, doi = {10.1109/INCOS.2011.62}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/incos/CastiglioneSP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigite/CembaloSP11, author = {Maurizio Cembalo and Alfredo De Santis and Umberto Ferraro Petrillo}, editor = {Bryan S. Goda and Edward Sobiesk and Randy W. Connolly}, title = {{SAVI:} a new system for advanced {SQL} visualization}, booktitle = {SIGITE' 11 {ACM} Special Interest Group for Information Technology Education Conference, West Point, NY, USA, October 20-22, 2011}, pages = {165--170}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2047594.2047641}, doi = {10.1145/2047594.2047641}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigite/CembaloSP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/PriscoS10, author = {Roberto De Prisco and Alfredo De Santis}, title = {Cheating Immune Threshold Visual Secret Sharing}, journal = {Comput. J.}, volume = {53}, number = {9}, pages = {1485--1496}, year = {2010}, url = {https://doi.org/10.1093/comjnl/bxp068}, doi = {10.1093/COMJNL/BXP068}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/PriscoS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BlundoCVSFPS10, author = {Carlo Blundo and Stelvio Cimato and Sabrina De Capitani di Vimercati and Alfredo De Santis and Sara Foresti and Stefano Paraboschi and Pierangela Samarati}, title = {Managing key hierarchies for access control enforcement: Heuristic approaches}, journal = {Comput. Secur.}, volume = {29}, number = {5}, pages = {533--547}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.12.006}, doi = {10.1016/J.COSE.2009.12.006}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BlundoCVSFPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/CastiglioneSS10, author = {Aniello Castiglione and Alfredo De Santis and Claudio Soriente}, title = {Security and privacy issues in the Portable Document Format}, journal = {J. Syst. Softw.}, volume = {83}, number = {10}, pages = {1813--1822}, year = {2010}, url = {https://doi.org/10.1016/j.jss.2010.04.062}, doi = {10.1016/J.JSS.2010.04.062}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/CastiglioneSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/DArcoSFM10, author = {Paolo D'Arco and Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci}, title = {Variations on a theme by Akl and Taylor: Security and tradeoffs}, journal = {Theor. Comput. Sci.}, volume = {411}, number = {1}, pages = {213--227}, year = {2010}, url = {https://doi.org/10.1016/j.tcs.2009.09.028}, doi = {10.1016/J.TCS.2009.09.028}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/DArcoSFM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bwcca/CastiglioneSFP10, author = {Aniello Castiglione and Alfredo De Santis and Ugo Fiore and Francesco Palmieri}, title = {An Enhanced Firewall Scheme for Dynamic and Adaptive Containment of Emerging Security Threats}, booktitle = {Proceedings of the Fifth International Conference on Broadband and Wireless Computing, Communication and Applications, {BWCCA} 2010, November 4-6, 2010, Fukuoka Institute of Technology, Fukuoka, Japan (In conjunction with the 3PGCIC-2010 International Conference)}, pages = {475--481}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/BWCCA.2010.117}, doi = {10.1109/BWCCA.2010.117}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bwcca/CastiglioneSFP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisis/SantisCCCPP10, author = {Alfredo De Santis and Aniello Castiglione and Giuseppe Cattaneo and Maurizio Cembalo and Fabio Petagna and Umberto Ferraro Petrillo}, editor = {Leonard Barolli and Fatos Xhafa and Salvatore Vitabile and Hui{-}Huang Hsu}, title = {An Extensible Framework for Efficient Secure {SMS}}, booktitle = {{CISIS} 2010, The Fourth International Conference on Complex, Intelligent and Software Intensive Systems, Krakow, Poland, 15-18 February 2010}, pages = {843--850}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CISIS.2010.81}, doi = {10.1109/CISIS.2010.81}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisis/SantisCCCPP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecweb/CastiglioneCSP10, author = {Aniello Castiglione and Marco Cepparulo and Alfredo De Santis and Francesco Palmieri}, editor = {Francesco Buccafurri and Giovanni Semeraro}, title = {Towards a Lawfully Secure and Privacy Preserving Video Surveillance System}, booktitle = {E-Commerce and Web Technologies, 11th International Conference, EC-Web 2010, Bilbao, Spain, September 1-3, 2010. Proceedings}, series = {Lecture Notes in Business Information Processing}, volume = {61}, pages = {73--84}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15208-5\_7}, doi = {10.1007/978-3-642-15208-5\_7}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecweb/CastiglioneCSP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/CattaneoSP09, author = {Giuseppe Cattaneo and Alfredo De Santis and Umberto Ferraro Petrillo}, editor = {James B. D. Joshi and Tao Zhang}, title = {{DISCERN:} {A} collaborative visualization system for learning cryptographic protocols}, booktitle = {The 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2009, Washington DC, USA, November 11-14, 2009}, pages = {1--8}, publisher = {{ICST} / {IEEE}}, year = {2009}, url = {https://doi.org/10.4108/ICST.COLLABORATECOM2009.8360}, doi = {10.4108/ICST.COLLABORATECOM2009.8360}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/CattaneoSP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecweb/CastiglionePS09, author = {Aniello Castiglione and Roberto De Prisco and Alfredo De Santis}, editor = {Tommaso Di Noia and Francesco Buccafurri}, title = {Do You Trust Your Phone?}, booktitle = {E-Commerce and Web Technologies, 10th International Conference, EC-Web 2009, Linz, Austria, September 1-4, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5692}, pages = {50--61}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03964-5\_6}, doi = {10.1007/978-3-642-03964-5\_6}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecweb/CastiglionePS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mfcs/DArcoSFM09, author = {Paolo D'Arco and Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci}, editor = {Rastislav Kr{\'{a}}lovic and Damian Niwinski}, title = {Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants}, booktitle = {Mathematical Foundations of Computer Science 2009, 34th International Symposium, {MFCS} 2009, Novy Smokovec, High Tatras, Slovakia, August 24-28, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5734}, pages = {247--257}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03816-7\_22}, doi = {10.1007/978-3-642-03816-7\_22}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mfcs/DArcoSFM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/BlundoCVSFPS09, author = {Carlo Blundo and Stelvio Cimato and Sabrina De Capitani di Vimercati and Alfredo De Santis and Sara Foresti and Stefano Paraboschi and Pierangela Samarati}, editor = {Dimitris Gritzalis and Javier L{\'{o}}pez}, title = {Efficient Key Management for Enforcing Access Control in Outsourced Scenarios}, booktitle = {Emerging Challenges for Security, Privacy and Trust, 24th {IFIP} {TC} 11 International Information Security Conference, {SEC} 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {297}, pages = {364--375}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01244-0\_32}, doi = {10.1007/978-3-642-01244-0\_32}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/BlundoCVSFPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/SantisFM08, author = {Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci}, title = {An attack on a payment scheme}, journal = {Inf. Sci.}, volume = {178}, number = {5}, pages = {1418--1421}, year = {2008}, url = {https://doi.org/10.1016/j.ins.2007.10.009}, doi = {10.1016/J.INS.2007.10.009}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/SantisFM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/SantisCPY08, author = {Alfredo De Santis and Giovanni Di Crescenzo and Giuseppe Persiano and Moti Yung}, title = {On Monotone Formula Composition of Perfect Zero-Knowledge Languages}, journal = {{SIAM} J. Comput.}, volume = {38}, number = {4}, pages = {1300--1329}, year = {2008}, url = {https://doi.org/10.1137/S0097539798346123}, doi = {10.1137/S0097539798346123}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/SantisCPY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/SantisFM08, author = {Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci}, title = {New constructions for provably-secure time-bound hierarchical key assignment schemes}, journal = {Theor. Comput. Sci.}, volume = {407}, number = {1-3}, pages = {213--230}, year = {2008}, url = {https://doi.org/10.1016/j.tcs.2008.05.021}, doi = {10.1016/J.TCS.2008.05.021}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/SantisFM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vlc/CattaneoSP08, author = {Giuseppe Cattaneo and Alfredo De Santis and Umberto Ferraro Petrillo}, title = {Visualization of cryptographic protocols with {GRACE}}, journal = {J. Vis. Lang. Comput.}, volume = {19}, number = {2}, pages = {258--290}, year = {2008}, url = {https://doi.org/10.1016/j.jvlc.2007.05.001}, doi = {10.1016/J.JVLC.2007.05.001}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vlc/CattaneoSP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/DArcoS08, author = {Paolo D'Arco and Alfredo De Santis}, editor = {Serge Vaudenay}, title = {Weaknesses in a Recent Ultra-Lightweight {RFID} Authentication Protocol}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5023}, pages = {27--39}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68164-9\_3}, doi = {10.1007/978-3-540-68164-9\_3}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/DArcoS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iticse/CatuognoS08, author = {Luigi Catuogno and Alfredo De Santis}, editor = {June Amillo and Cary Laxer and Ernestina Menasalvas Ruiz and Alison Young}, title = {An internet role-game for the laboratory of network security course}, booktitle = {Proceedings of the 13th Annual {SIGCSE} Conference on Innovation and Technology in Computer Science Education, ITiCSE 2008, Madrid, Spain, June 30 - July 2, 2008}, pages = {240--244}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1384271.1384336}, doi = {10.1145/1384271.1384336}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iticse/CatuognoS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DArcoS08, author = {Paolo D'Arco and Alfredo De Santis}, title = {From Weaknesses to Secret Disclosure in a Recent Ultra-Lightweight {RFID} Authentication Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {470}, year = {2008}, url = {http://eprint.iacr.org/2008/470}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DArcoS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BlundoDSS07, author = {Carlo Blundo and Paolo D'Arco and Alfredo De Santis and Douglas R. Stinson}, title = {On Unconditionally Secure Distributed Oblivious Transfer}, journal = {J. Cryptol.}, volume = {20}, number = {3}, pages = {323--373}, year = {2007}, url = {https://doi.org/10.1007/s00145-007-0327-2}, doi = {10.1007/S00145-007-0327-2}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BlundoDSS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/SantisM07, author = {Alfredo De Santis and Barbara Masucci}, title = {New results on non-perfect sharing of multiple secrets}, journal = {J. Syst. Softw.}, volume = {80}, number = {2}, pages = {216--223}, year = {2007}, url = {https://doi.org/10.1016/j.jss.2006.03.046}, doi = {10.1016/J.JSS.2006.03.046}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/SantisM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/CastiglioneSS07, author = {Aniello Castiglione and Alfredo De Santis and Claudio Soriente}, title = {Taking advantages of a disadvantage: Digital forensics and steganography using document metadata}, journal = {J. Syst. Softw.}, volume = {80}, number = {5}, pages = {750--764}, year = {2007}, url = {https://doi.org/10.1016/j.jss.2006.07.006}, doi = {10.1016/J.JSS.2006.07.006}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/CastiglioneSS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/CimatoPS07, author = {Stelvio Cimato and Roberto De Prisco and Alfredo De Santis}, title = {Colored visual cryptography without color darkening}, journal = {Theor. Comput. Sci.}, volume = {374}, number = {1-3}, pages = {261--276}, year = {2007}, url = {https://doi.org/10.1016/j.tcs.2007.01.006}, doi = {10.1016/J.TCS.2007.01.006}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/CimatoPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/SantisS07, author = {Alfredo De Santis and Claudio Soriente}, title = {Modified Original Smart Cards and Smart Card Clone Countermeasures}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2007, Harbin, Heilongjiang, China, December 15-19, 2007}, pages = {878--882}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/CIS.2007.187}, doi = {10.1109/CIS.2007.187}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/SantisS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DArcoS07, author = {Paolo D'Arco and Alfredo De Santis}, editor = {Yvo Desmedt}, title = {Optimising {SD} and {LSD} in Presence of Non-uniform Probabilities of Revocation}, booktitle = {Information Theoretic Security - Second International Conference, {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4883}, pages = {46--64}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-10230-1\_4}, doi = {10.1007/978-3-642-10230-1\_4}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/DArcoS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mfcs/SantisFM07, author = {Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci}, editor = {Ludek Kucera and Anton{\'{\i}}n Kucera}, title = {Efficient Provably-Secure Hierarchical Key Assignment Schemes}, booktitle = {Mathematical Foundations of Computer Science 2007, 32nd International Symposium, {MFCS} 2007, Cesk{\'{y}} Krumlov, Czech Republic, August 26-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4708}, pages = {371--382}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74456-6\_34}, doi = {10.1007/978-3-540-74456-6\_34}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mfcs/SantisFM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/SantisFM07, author = {Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci}, editor = {Volkmar Lotz and Bhavani Thuraisingham}, title = {New constructions for provably-secure time-bound hierarchical key assignment schemes}, booktitle = {12th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings}, pages = {133--138}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1266840.1266861}, doi = {10.1145/1266840.1266861}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/SantisFM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/CimatoPS06, author = {Stelvio Cimato and Roberto De Prisco and Alfredo De Santis}, title = {Probabilistic Visual Cryptography Schemes}, journal = {Comput. J.}, volume = {49}, number = {1}, pages = {97--107}, year = {2006}, url = {https://doi.org/10.1093/comjnl/bxh152}, doi = {10.1093/COMJNL/BXH152}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/CimatoPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/SantisFM06, author = {Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci}, title = {Unconditionally secure key assignment schemes}, journal = {Discret. Appl. Math.}, volume = {154}, number = {2}, pages = {234--252}, year = {2006}, url = {https://doi.org/10.1016/j.dam.2005.03.025}, doi = {10.1016/J.DAM.2005.03.025}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dam/SantisFM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/SantisFM06, author = {Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci}, title = {Enforcing the security of a time-bound hierarchical key assignment scheme}, journal = {Inf. Sci.}, volume = {176}, number = {12}, pages = {1684--1694}, year = {2006}, url = {https://doi.org/10.1016/j.ins.2005.07.002}, doi = {10.1016/J.INS.2005.07.002}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/SantisFM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/BlundoCS06, author = {Carlo Blundo and Stelvio Cimato and Alfredo De Santis}, title = {Visual cryptography schemes with optimal pixel expansion}, journal = {Theor. Comput. Sci.}, volume = {369}, number = {1-3}, pages = {169--182}, year = {2006}, url = {https://doi.org/10.1016/j.tcs.2006.08.008}, doi = {10.1016/J.TCS.2006.08.008}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/BlundoCS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CiaramellaDSGT06, author = {Angelo Ciaramella and Paolo D'Arco and Alfredo De Santis and Clemente Galdi and Roberto Tagliaferri}, title = {Neural Network Techniques for Proactive Password Checking}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {3}, number = {4}, pages = {327--339}, year = {2006}, url = {https://doi.org/10.1109/TDSC.2006.53}, doi = {10.1109/TDSC.2006.53}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CiaramellaDSGT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/BlundoDS06, author = {Carlo Blundo and Paolo D'Arco and Alfredo De Santis}, title = {On Self-Healing Key Distribution Schemes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {52}, number = {12}, pages = {5455--5467}, year = {2006}, url = {https://doi.org/10.1109/TIT.2006.885514}, doi = {10.1109/TIT.2006.885514}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/BlundoDS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AtenieseSFM06, author = {Giuseppe Ateniese and Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci}, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {Provably-secure time-bound hierarchical key assignment schemes}, booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, pages = {288--297}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405.1180441}, doi = {10.1145/1180405.1180441}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AtenieseSFM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isse/CastiglioneCSPP06, author = {Aniello Castiglione and Giuseppe Cattaneo and Alfredo De Santis and Fabio Petagna and Umberto Ferraro Petrillo}, editor = {Sachar Paulus and Norbert Pohlmann and Helmut Reimer}, title = {{SPEECH:} Secure Personal End-to-End Communication with Handheld}, booktitle = {{ISSE} 2006 - Securing Electronic Busines Processes, Highlights of the Information Security Solutions Europe 2006 Conference, 10-12 October 2006, Rome, Italy}, pages = {287--297}, publisher = {Vieweg}, year = {2006}, url = {https://doi.org/10.1007/978-3-8348-9195-2\_31}, doi = {10.1007/978-3-8348-9195-2\_31}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isse/CastiglioneCSPP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/PriscoS06, author = {Roberto De Prisco and Alfredo De Santis}, editor = {Roberto De Prisco and Moti Yung}, title = {Cheating Immune (2, \emph{n})-Threshold Visual Secret Sharing}, booktitle = {Security and Cryptography for Networks, 5th International Conference, {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4116}, pages = {216--228}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11832072\_15}, doi = {10.1007/11832072\_15}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/PriscoS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlundoCS06, author = {Carlo Blundo and Stelvio Cimato and Alfredo De Santis}, title = {Visual Cryptography Schemes with Optimal Pixel Expansion}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {170}, year = {2006}, url = {http://eprint.iacr.org/2006/170}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlundoCS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseSFM06, author = {Giuseppe Ateniese and Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci}, title = {Provably-Secure Time-Bound Hierarchical Key Assignment Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {225}, year = {2006}, url = {http://eprint.iacr.org/2006/225}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseSFM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SantisFM06, author = {Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci}, title = {Efficient Provably-Secure Hierarchical Key Assignment Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {479}, year = {2006}, url = {http://eprint.iacr.org/2006/479}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SantisFM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SantisFM06a, author = {Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci}, title = {New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {483}, year = {2006}, url = {http://eprint.iacr.org/2006/483}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SantisFM06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CimatoPS05, author = {Stelvio Cimato and Roberto De Prisco and Alfredo De Santis}, title = {Optimal Colored Threshold Visual Cryptography Schemes}, journal = {Des. Codes Cryptogr.}, volume = {35}, number = {3}, pages = {311--335}, year = {2005}, url = {https://doi.org/10.1007/s10623-003-6741-z}, doi = {10.1007/S10623-003-6741-Z}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CimatoPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/CimatoSFM05, author = {Stelvio Cimato and Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci}, title = {Ideal contrast visual cryptography schemes with reversing}, journal = {Inf. Process. Lett.}, volume = {93}, number = {4}, pages = {199--206}, year = {2005}, url = {https://doi.org/10.1016/j.ipl.2004.10.011}, doi = {10.1016/J.IPL.2004.10.011}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/CimatoSFM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/CimatoSP05, author = {Stelvio Cimato and Alfredo De Santis and Umberto Ferraro Petrillo}, title = {Overcoming the obfuscation of Java programs by identifier renaming}, journal = {J. Syst. Softw.}, volume = {78}, number = {1}, pages = {60--72}, year = {2005}, url = {https://doi.org/10.1016/j.jss.2004.11.019}, doi = {10.1016/J.JSS.2004.11.019}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/CimatoSP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcas/BergamoDSK05, author = {Pina Bergamo and Paolo D'Arco and Alfredo De Santis and Ljupco Kocarev}, title = {Security of public-key cryptosystems based on Chebyshev polynomials}, journal = {{IEEE} Trans. Circuits Syst. {I} Regul. Pap.}, volume = {52-I}, number = {7}, pages = {1382--1393}, year = {2005}, url = {https://doi.org/10.1109/TCSI.2005.851701}, doi = {10.1109/TCSI.2005.851701}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcas/BergamoDSK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcc/SantisFM05, author = {Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci}, editor = {{\O}yvind Ytrehus}, title = {A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy}, booktitle = {Coding and Cryptography, International Workshop, {WCC} 2005, Bergen, Norway, March 14-18, 2005. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3969}, pages = {202--217}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11779360\_17}, doi = {10.1007/11779360\_17}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcc/SantisFM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BlundoDSL04, author = {Carlo Blundo and Paolo D'Arco and Alfredo De Santis and Massimiliano Listo}, title = {Design of Self-Healing Key Distribution Schemes}, journal = {Des. Codes Cryptogr.}, volume = {32}, number = {1-3}, pages = {15--44}, year = {2004}, url = {https://doi.org/10.1023/B:DESI.0000029210.20690.3f}, doi = {10.1023/B:DESI.0000029210.20690.3F}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BlundoDSL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SantisM04, author = {Alfredo De Santis and Barbara Masucci}, title = {Anonymous Membership Broadcast Schemes}, journal = {Des. Codes Cryptogr.}, volume = {32}, number = {1-3}, pages = {135--151}, year = {2004}, url = {https://doi.org/10.1023/B:DESI.0000029218.71926.b0}, doi = {10.1023/B:DESI.0000029218.71926.B0}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SantisM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/ChinSFHK04, author = {Francis Y. L. Chin and Alfredo De Santis and Anna Lisa Ferrara and Ngai Lam Ho and S. K. Kim}, title = {A simple algorithm for the constrained sequence problems}, journal = {Inf. Process. Lett.}, volume = {90}, number = {4}, pages = {175--179}, year = {2004}, url = {https://doi.org/10.1016/j.ipl.2004.02.008}, doi = {10.1016/J.IPL.2004.02.008}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/ChinSFHK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/SantisFM04, author = {Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci}, title = {Cryptographic key assignment schemes for any access control policy}, journal = {Inf. Process. Lett.}, volume = {92}, number = {4}, pages = {199--205}, year = {2004}, url = {https://doi.org/10.1016/j.ipl.2004.03.019}, doi = {10.1016/J.IPL.2004.03.019}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/SantisFM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/BlundoDSG04, author = {Carlo Blundo and Paolo D'Arco and Alfredo De Santis and Clemente Galdi}, title = {H\({}_{\mbox{YPPOCRATES}}\): a new proactive password checker}, journal = {J. Syst. Softw.}, volume = {71}, number = {1-2}, pages = {163--175}, year = {2004}, url = {https://doi.org/10.1016/S0164-1212(03)00004-9}, doi = {10.1016/S0164-1212(03)00004-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/BlundoDSG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/SantisS04, author = {Alfredo De Santis and Claudio Soriente}, title = {A blocker-proof conditional access system}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {50}, number = {2}, pages = {591--596}, year = {2004}, url = {https://doi.org/10.1109/TCE.2004.1309432}, doi = {10.1109/TCE.2004.1309432}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tce/SantisS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/BonisS04, author = {Annalisa De Bonis and Alfredo De Santis}, title = {Randomness in secret sharing and visual cryptography schemes}, journal = {Theor. Comput. Sci.}, volume = {314}, number = {3}, pages = {351--374}, year = {2004}, url = {https://doi.org/10.1016/j.tcs.2003.12.018}, doi = {10.1016/J.TCS.2003.12.018}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/BonisS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/BlundoDS04, author = {Carlo Blundo and Paolo D'Arco and Alfredo De Santis}, editor = {Josep D{\'{\i}}az and Juhani Karhum{\"{a}}ki and Arto Lepist{\"{o}} and Donald Sannella}, title = {Definitions and Bounds for Self-Healing Key Distribution Schemes}, booktitle = {Automata, Languages and Programming: 31st International Colloquium, {ICALP} 2004, Turku, Finland, July 12-16, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3142}, pages = {234--245}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27836-8\_22}, doi = {10.1007/978-3-540-27836-8\_22}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/BlundoDS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mfcs/SantisCP04, author = {Alfredo De Santis and Giovanni Di Crescenzo and Giuseppe Persiano}, editor = {Jir{\'{\i}} Fiala and V{\'{a}}clav Koubek and Jan Kratochv{\'{\i}}l}, title = {On NC\({}^{\mbox{1}}\) Boolean Circuit Composition of Non-interactive Perfect Zero-Knowledge}, booktitle = {Mathematical Foundations of Computer Science 2004, 29th International Symposium, {MFCS} 2004, Prague, Czech Republic, August 22-27, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3153}, pages = {356--367}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28629-5\_26}, doi = {10.1007/978-3-540-28629-5\_26}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mfcs/SantisCP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/CimatoPS04, author = {Stelvio Cimato and Roberto De Prisco and Alfredo De Santis}, editor = {Carlo Blundo and Stelvio Cimato}, title = {Colored Visual Cryptography Without Color Darkening}, booktitle = {Security in Communication Networks, 4th International Conference, {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3352}, pages = {235--248}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30598-9\_17}, doi = {10.1007/978-3-540-30598-9\_17}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/CimatoPS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/cs-CR-0411030, author = {Pina Bergamo and Paolo D'Arco and Alfredo De Santis and Ljupco Kocarev}, title = {Security of public key cryptosystems based on Chebyshev Polynomials}, journal = {CoRR}, volume = {cs.CR/0411030}, year = {2004}, url = {http://arxiv.org/abs/cs.CR/0411030}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/cs-CR-0411030.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamdm/BlundoDSS03, author = {Carlo Blundo and Paolo D'Arco and Alfredo De Santis and Douglas R. Stinson}, title = {Contrast Optimal Threshold Visual Cryptography Schemes}, journal = {{SIAM} J. Discret. Math.}, volume = {16}, number = {2}, pages = {224--261}, year = {2003}, url = {https://doi.org/10.1137/S0895480198336683}, doi = {10.1137/S0895480198336683}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamdm/BlundoDSS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/CimatoPS03, author = {Stelvio Cimato and Roberto De Prisco and Alfredo De Santis}, title = {Contrast optimal colored visual cryptography schemes}, booktitle = {Proceedings 2003 {IEEE} Information Theory Workshop, {ITW} 2003, La Sorbonne, Paris, France, 31 March - 4 April, 2003}, pages = {139--142}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/ITW.2003.1216714}, doi = {10.1109/ITW.2003.1216714}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/itw/CimatoPS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infrasec/BlundoDSG02, author = {Carlo Blundo and Paolo D'Arco and Alfredo De Santis and Clemente Galdi}, editor = {George I. Davida and Yair Frankel and Owen Rees}, title = {A Novel Approach to Proactive Password Checking}, booktitle = {Infrastructure Security, International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2437}, pages = {30--39}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45831-X\_3}, doi = {10.1007/3-540-45831-X\_3}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infrasec/BlundoDSG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/random/SantisCP02, author = {Alfredo De Santis and Giovanni Di Crescenzo and Giuseppe Persiano}, editor = {Jos{\'{e}} D. P. Rolim and Salil P. Vadhan}, title = {Randomness-Optimal Characterization of Two {NP} Proof Systems}, booktitle = {Randomization and Approximation Techniques, 6th International Workshop, {RANDOM} 2002, Cambridge, MA, USA, September 13-15, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2483}, pages = {179--193}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45726-7\_15}, doi = {10.1007/3-540-45726-7\_15}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/random/SantisCP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BlundoDSS02, author = {Carlo Blundo and Paolo D'Arco and Alfredo De Santis and Douglas R. Stinson}, editor = {Kaisa Nyberg and Howard M. Heys}, title = {New Results on Unconditionally Secure Distributed Oblivious Transfer}, booktitle = {Selected Areas in Cryptography, 9th Annual International Workshop, {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2595}, pages = {291--309}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36492-7\_19}, doi = {10.1007/3-540-36492-7\_19}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BlundoDSS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BlundoBS01, author = {Carlo Blundo and Annalisa De Bonis and Alfredo De Santis}, title = {Improved Schemes for Visual Cryptography}, journal = {Des. Codes Cryptogr.}, volume = {24}, number = {3}, pages = {255--278}, year = {2001}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BlundoBS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/BlundoDS01, author = {Carlo Blundo and Paolo D'Arco and Alfredo De Santis}, title = {A t-private k-database information retrieval scheme}, journal = {Int. J. Inf. Sec.}, volume = {1}, number = {1}, pages = {64--68}, year = {2001}, url = {https://doi.org/10.1007/s102070100005}, doi = {10.1007/S102070100005}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/BlundoDS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/AtenieseBSS01, author = {Giuseppe Ateniese and Carlo Blundo and Alfredo De Santis and Douglas R. Stinson}, title = {Extended capabilities for visual cryptography}, journal = {Theor. Comput. Sci.}, volume = {250}, number = {1-2}, pages = {143--161}, year = {2001}, url = {https://doi.org/10.1016/S0304-3975(99)00127-9}, doi = {10.1016/S0304-3975(99)00127-9}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/AtenieseBSS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/SantisGV01, author = {Alfredo De Santis and Antonio Giorgio Gaggia and Ugo Vaccaro}, title = {Bounds on entropy in a guessing game}, journal = {{IEEE} Trans. Inf. Theory}, volume = {47}, number = {1}, pages = {468--473}, year = {2001}, url = {https://doi.org/10.1109/18.904564}, doi = {10.1109/18.904564}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/SantisGV01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SantisCOPS01, author = {Alfredo De Santis and Giovanni Di Crescenzo and Rafail Ostrovsky and Giuseppe Persiano and Amit Sahai}, editor = {Joe Kilian}, title = {Robust Non-interactive Zero Knowledge}, booktitle = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2139}, pages = {566--598}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44647-8\_33}, doi = {10.1007/3-540-44647-8\_33}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/SantisCOPS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BlundoDSG01, author = {Carlo Blundo and Paolo D'Arco and Alfredo De Santis and Clemente Galdi}, editor = {George I. Davida and Yair Frankel}, title = {Hyppocrates}, booktitle = {Information Security, 4th International Conference, {ISC} 2001, Malaga, Spain, October 1-3, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2200}, pages = {63--80}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45439-X\_5}, doi = {10.1007/3-540-45439-X\_5}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/BlundoDSG01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/BonisS01, author = {Annalisa De Bonis and Alfredo De Santis}, editor = {Michel Dupuy and Pierre Paradinas}, title = {Secret Sharing and Visual Cryptography Schemes}, booktitle = {Trusted Information: The New Decade Challenge, {IFIP} {TC11} Sixteenth Annual Working Conference on Information Security (IFIP/Sec'01), June 11-13, 2001, Paris, France}, series = {{IFIP} Conference Proceedings}, volume = {193}, pages = {123--138}, publisher = {Kluwer}, year = {2001}, timestamp = {Fri, 26 Jul 2002 13:05:24 +0200}, biburl = {https://dblp.org/rec/conf/sec/BonisS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/SantisM00, author = {Alfredo De Santis and Barbara Masucci}, title = {On secret set schemes}, journal = {Inf. Process. Lett.}, volume = {74}, number = {5-6}, pages = {243--251}, year = {2000}, url = {https://doi.org/10.1016/S0020-0190(00)00061-2}, doi = {10.1016/S0020-0190(00)00061-2}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/SantisM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/BlundoSN00, author = {Carlo Blundo and Alfredo De Santis and Moni Naor}, title = {Visual cryptography for grey level images}, journal = {Inf. Process. Lett.}, volume = {75}, number = {6}, pages = {255--259}, year = {2000}, url = {https://doi.org/10.1016/S0020-0190(00)00108-3}, doi = {10.1016/S0020-0190(00)00108-3}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/BlundoSN00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/SantisCP00, author = {Alfredo De Santis and Giovanni Di Crescenzo and Giuseppe Persiano}, editor = {Ugo Montanari and Jos{\'{e}} D. P. Rolim and Emo Welzl}, title = {Necessary and Sufficient Assumptions for Non-iterative Zero-Knowledge Proofs of Knowledge for All {NP} Relations}, booktitle = {Automata, Languages and Programming, 27th International Colloquium, {ICALP} 2000, Geneva, Switzerland, July 9-15, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1853}, pages = {451--462}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45022-X\_38}, doi = {10.1007/3-540-45022-X\_38}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/SantisCP00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stacs/BonisS00, author = {Annalisa De Bonis and Alfredo De Santis}, editor = {Horst Reichel and Sophie Tison}, title = {Randomness in Visual Cryptography}, booktitle = {{STACS} 2000, 17th Annual Symposium on Theoretical Aspects of Computer Science, Lille, France, February 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1770}, pages = {626--638}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-46541-3\_52}, doi = {10.1007/3-540-46541-3\_52}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stacs/BonisS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cc/BlundoSPV99, author = {Carlo Blundo and Alfredo De Santis and Giuseppe Persiano and Ugo Vaccaro}, title = {Randomness Complexity of Private Computation}, journal = {Comput. Complex.}, volume = {8}, number = {2}, pages = {145--168}, year = {1999}, url = {https://doi.org/10.1007/s000370050025}, doi = {10.1007/S000370050025}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cc/BlundoSPV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/SantisCGP99, author = {Alfredo De Santis and Giovanni Di Crescenzo and Oded Goldreich and Giuseppe Persiano}, title = {The Graph Clustering Problem has a Perfect Zero-Knowledge Interactive Proof}, journal = {Inf. Process. Lett.}, volume = {69}, number = {4}, pages = {201--206}, year = {1999}, url = {https://doi.org/10.1016/S0020-0190(99)00010-1}, doi = {10.1016/S0020-0190(99)00010-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/SantisCGP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/BlundoSG99, author = {Carlo Blundo and Alfredo De Santis and Antonio Giorgio Gaggia}, title = {Probability of Shares in Secret Sharing Schemes}, journal = {Inf. Process. Lett.}, volume = {72}, number = {5-6}, pages = {169--175}, year = {1999}, url = {https://doi.org/10.1016/S0020-0190(99)00153-2}, doi = {10.1016/S0020-0190(99)00153-2}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/BlundoSG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/SantisM99, author = {Alfredo De Santis and Barbara Masucci}, title = {A Lower Bound on the Encoding Length in Lossy Transmission}, journal = {Inf. Sci.}, volume = {116}, number = {2-4}, pages = {129--146}, year = {1999}, url = {https://doi.org/10.1016/S0020-0255(98)10101-9}, doi = {10.1016/S0020-0255(98)10101-9}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/SantisM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BlundoSKO99, author = {Carlo Blundo and Alfredo De Santis and Kaoru Kurosawa and Wakaha Ogata}, title = {On a Fallacious Bound for Authentication Codes}, journal = {J. Cryptol.}, volume = {12}, number = {3}, pages = {155--159}, year = {1999}, url = {https://doi.org/10.1007/s001459900049}, doi = {10.1007/S001459900049}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BlundoSKO99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BlundoSS99, author = {Carlo Blundo and Alfredo De Santis and Douglas R. Stinson}, title = {On the Contrast in Visual Cryptography Schemes}, journal = {J. Cryptol.}, volume = {12}, number = {4}, pages = {261--289}, year = {1999}, url = {https://doi.org/10.1007/s001459900057}, doi = {10.1007/S001459900057}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BlundoSS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/SantisM99, author = {Alfredo De Santis and Barbara Masucci}, title = {Multiple ramp schemes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {45}, number = {5}, pages = {1720--1728}, year = {1999}, url = {https://doi.org/10.1109/18.771255}, doi = {10.1109/18.771255}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/SantisM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/SantisCP99, author = {Alfredo De Santis and Giovanni Di Crescenzo and Giuseppe Persiano}, editor = {Jir{\'{\i}} Wiedermann and Peter van Emde Boas and Mogens Nielsen}, title = {Non-Interactive Zero-Knowledge: {A} Low-Randomness Characterization of {NP}}, booktitle = {Automata, Languages and Programming, 26th International Colloquium, ICALP'99, Prague, Czech Republic, July 11-15, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1644}, pages = {271--280}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48523-6\_24}, doi = {10.1007/3-540-48523-6\_24}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/SantisCP99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cg/BlundoS98, author = {Carlo Blundo and Alfredo De Santis}, title = {Visual cryptography schemes with perfect reconstruction of black pixels}, journal = {Comput. Graph.}, volume = {22}, number = {4}, pages = {449--455}, year = {1998}, url = {https://doi.org/10.1016/S0097-8493(98)00034-X}, doi = {10.1016/S0097-8493(98)00034-X}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cg/BlundoS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/PriscoS98, author = {Roberto De Prisco and Alfredo De Santis}, title = {On the Data Expansion of the Huffman Compression Algorithm}, journal = {Comput. J.}, volume = {41}, number = {3}, pages = {137--144}, year = {1998}, url = {https://doi.org/10.1093/comjnl/41.3.137}, doi = {10.1093/COMJNL/41.3.137}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/PriscoS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PriscoS98, author = {Roberto De Prisco and Alfredo De Santis}, title = {On Lower Bounds for the Redundancy of Optimal Codes}, journal = {Des. Codes Cryptogr.}, volume = {15}, number = {1}, pages = {29--45}, year = {1998}, url = {https://doi.org/10.1023/A:1008273408148}, doi = {10.1023/A:1008273408148}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/PriscoS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/BlundoSHKVY98, author = {Carlo Blundo and Alfredo De Santis and Amir Herzberg and Shay Kutten and Ugo Vaccaro and Moti Yung}, title = {Perfectly Secure Key Distribution for Dynamic Conferences}, journal = {Inf. Comput.}, volume = {146}, number = {1}, pages = {1--23}, year = {1998}, url = {https://doi.org/10.1006/inco.1998.2717}, doi = {10.1006/INCO.1998.2717}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/BlundoSHKVY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/BlundoSV98, author = {Carlo Blundo and Alfredo De Santis and Ugo Vaccaro}, title = {On Secret Sharing Schemes}, journal = {Inf. Process. Lett.}, volume = {65}, number = {1}, pages = {25--32}, year = {1998}, url = {https://doi.org/10.1016/S0020-0190(97)00194-4}, doi = {10.1016/S0020-0190(97)00194-4}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/BlundoSV98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SantisCP98, author = {Alfredo De Santis and Giovanni Di Crescenzo and Giuseppe Persiano}, editor = {Li Gong and Michael K. Reiter}, title = {Communication-Efficient Anonymous Group Identification}, booktitle = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998}, pages = {73--82}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/288090.288110}, doi = {10.1145/288090.288110}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SantisCP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/SantisCPY98, author = {Alfredo De Santis and Giovanni Di Crescenzo and Giuseppe Persiano and Moti Yung}, editor = {Kim Guldstrand Larsen and Sven Skyum and Glynn Winskel}, title = {Image Density is Complete for Non-Interactive-SZK (Extended Abstract)}, booktitle = {Automata, Languages and Programming, 25th International Colloquium, ICALP'98, Aalborg, Denmark, July 13-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1443}, pages = {784--795}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055102}, doi = {10.1007/BFB0055102}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/SantisCPY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR98-006, author = {Alfredo De Santis and Giovanni Di Crescenzo and Oded Goldreich and Giuseppe Persiano}, title = {The Graph Clustering Problem has a Perfect Zero-Knowledge Proof}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR98-006}}, year = {1998}, url = {https://eccc.weizmann.ac.il/eccc-reports/1998/TR98-006/index.html}, eprinttype = {ECCC}, eprint = {TR98-006}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR98-006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SantisCGP98, author = {Alfredo De Santis and Giovanni Di Crescenzo and Oded Goldreich and Giuseppe Persiano}, title = {The Graph Clustering Problem has a Perfect Zero-Knowledge Proof}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {2}, year = {1998}, url = {http://eprint.iacr.org/1998/002}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SantisCGP98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/PriscoS97, author = {Roberto De Prisco and Alfredo De Santis}, title = {Catastrophic Faults in Reconfigurable Systolic Linear Arrays}, journal = {Discret. Appl. Math.}, volume = {75}, number = {2}, pages = {105--123}, year = {1997}, url = {https://doi.org/10.1016/S0166-218X(96)00090-X}, doi = {10.1016/S0166-218X(96)00090-X}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dam/PriscoS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BlundoSSV97, author = {Carlo Blundo and Alfredo De Santis and Roberto de Simone and Ugo Vaccaro}, title = {Tight Bounds on the Information Rate of Secret Sharing Schemes}, journal = {Des. Codes Cryptogr.}, volume = {11}, number = {2}, pages = {107--122}, year = {1997}, url = {https://doi.org/10.1023/A:1008216403325}, doi = {10.1023/A:1008216403325}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BlundoSSV97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/SantisP97, author = {Alfredo De Santis and Giuseppe Persiano}, title = {Guest editorial}, journal = {Eur. Trans. Telecommun.}, volume = {8}, number = {5}, pages = {443}, year = {1997}, url = {https://doi.org/10.1002/ett.4460080502}, doi = {10.1002/ETT.4460080502}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/SantisP97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/BlundoS97, author = {Carlo Blundo and Alfredo De Santis}, title = {Lower Bounds for Robust Secret Sharing Schemes}, journal = {Inf. Process. Lett.}, volume = {63}, number = {6}, pages = {317--321}, year = {1997}, url = {https://doi.org/10.1016/S0020-0190(97)00135-X}, doi = {10.1016/S0020-0190(97)00135-X}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/BlundoS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/PriscoS97, author = {Roberto De Prisco and Alfredo De Santis}, title = {A new bound for the data expansion of Huffman codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {43}, number = {6}, pages = {2028--2032}, year = {1997}, url = {https://doi.org/10.1109/18.641572}, doi = {10.1109/18.641572}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/PriscoS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/SantisCP97, author = {Alfredo De Santis and Giovanni Di Crescenzo and Giuseppe Persiano}, editor = {Pierpaolo Degano and Roberto Gorrieri and Alberto Marchetti{-}Spaccamela}, title = {Randomness-Efficient Non-Interactive Zero-Knowledge (Extended Abstract)}, booktitle = {Automata, Languages and Programming, 24th International Colloquium, ICALP'97, Bologna, Italy, 7-11 July 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1256}, pages = {716--726}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-63165-8\_225}, doi = {10.1007/3-540-63165-8\_225}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/SantisCP97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sequences/1997, editor = {Bruno Carpentieri and Alfredo De Santis and Ugo Vaccaro and James A. Storer}, title = {Compression and Complexity of {SEQUENCES} 1997, Positano, Amalfitan Coast, Salerno, Italy, June 11-13, 1997, Proceedings}, publisher = {{IEEE}}, year = {1997}, url = {https://ieeexplore.ieee.org/xpl/conhome/5423/proceeding}, isbn = {0-8186-8132-2}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sequences/1997.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/AtenieseBSS96, author = {Giuseppe Ateniese and Carlo Blundo and Alfredo De Santis and Douglas R. Stinson}, title = {Visual Cryptography for General Access Structures}, journal = {Inf. Comput.}, volume = {129}, number = {2}, pages = {86--106}, year = {1996}, url = {https://doi.org/10.1006/inco.1996.0076}, doi = {10.1006/INCO.1996.0076}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/AtenieseBSS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/BlundoSV96, author = {Carlo Blundo and Alfredo De Santis and Ugo Vaccaro}, title = {Randomness in Distribution Protocols}, journal = {Inf. Comput.}, volume = {131}, number = {2}, pages = {111--139}, year = {1996}, url = {https://doi.org/10.1006/inco.1996.0095}, doi = {10.1006/INCO.1996.0095}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/BlundoSV96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/PriscoS96, author = {Roberto De Prisco and Alfredo De Santis}, title = {On the Redundancy Achieved by Huffman Codes}, journal = {Inf. Sci.}, volume = {88}, number = {1-4}, pages = {131--148}, year = {1996}, url = {https://doi.org/10.1016/0020-0255(95)00220-0}, doi = {10.1016/0020-0255(95)00220-0}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/PriscoS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/SantisP96, author = {Alfredo De Santis and Giuseppe Persiano}, title = {The Power of Preprocessing in Zero-Knowledge Proofs of Knowledge}, journal = {J. Cryptol.}, volume = {9}, number = {3}, pages = {129--148}, year = {1996}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/SantisP96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/BlundoSGV96, author = {Carlo Blundo and Alfredo De Santis and Luisa Gargano and Ugo Vaccaro}, title = {On the Information Rate of Secret Sharing Schemes}, journal = {Theor. Comput. Sci.}, volume = {154}, number = {2}, pages = {283--306}, year = {1996}, url = {https://doi.org/10.1016/0304-3975(95)00065-8}, doi = {10.1016/0304-3975(95)00065-8}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/BlundoSGV96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/PriscoS96, author = {Roberto De Prisco and Alfredo De Santis}, title = {New Lower Bounds on the Cost of Binary Search Trees}, journal = {Theor. Comput. Sci.}, volume = {156}, number = {1{\&}2}, pages = {315--325}, year = {1996}, url = {https://doi.org/10.1016/0304-3975(95)00153-0}, doi = {10.1016/0304-3975(95)00153-0}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/PriscoS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/BlundoCSV96, author = {Carlo Blundo and Antonella Cresti and Alfredo De Santis and Ugo Vaccaro}, title = {Fully Dynamic Secret Sharing Schemes}, journal = {Theor. Comput. Sci.}, volume = {165}, number = {2}, pages = {407--440}, year = {1996}, url = {https://doi.org/10.1016/0304-3975(96)00003-5}, doi = {10.1016/0304-3975(96)00003-5}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/BlundoCSV96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/AtenieseBSS96, author = {Giuseppe Ateniese and Carlo Blundo and Alfredo De Santis and Douglas R. Stinson}, editor = {Friedhelm Meyer auf der Heide and Burkhard Monien}, title = {Constructions and Bounds for Visual Cryptography}, booktitle = {Automata, Languages and Programming, 23rd International Colloquium, ICALP96, Paderborn, Germany, 8-12 July 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1099}, pages = {416--428}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61440-0\_147}, doi = {10.1007/3-540-61440-0\_147}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/AtenieseBSS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR96-012, author = {Giuseppe Ateniese and Carlo Blundo and Alfredo De Santis and Douglas R. Stinson}, title = {Visual Cryptography for General Access Structures}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR96-012}}, year = {1996}, url = {https://eccc.weizmann.ac.il/eccc-reports/1996/TR96-012/index.html}, eprinttype = {ECCC}, eprint = {TR96-012}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR96-012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlundoSS96, author = {Carlo Blundo and Alfredo De Santis and Douglas R. Stinson}, title = {On the Contrast in Visual Cryptography Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {13}, year = {1996}, url = {http://eprint.iacr.org/1996/013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlundoSS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/SantisCP95, author = {Alfredo De Santis and Giovanni Di Crescenzo and Giuseppe Persiano}, title = {Zero-Knowledge Arguments and Public-Key Cryptography}, journal = {Inf. Comput.}, volume = {121}, number = {1}, pages = {23--40}, year = {1995}, url = {https://doi.org/10.1006/inco.1995.1121}, doi = {10.1006/INCO.1995.1121}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/SantisCP95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BlundoSSV95, author = {Carlo Blundo and Alfredo De Santis and Douglas R. Stinson and Ugo Vaccaro}, title = {Graph Decompositions and Secret Sharing Schemes}, journal = {J. Cryptol.}, volume = {8}, number = {1}, pages = {39--64}, year = {1995}, url = {https://doi.org/10.1007/BF00204801}, doi = {10.1007/BF00204801}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BlundoSSV95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/BlundoSGV95, author = {Carlo Blundo and Alfredo De Santis and Antonio Giorgio Gaggia and Ugo Vaccaro}, title = {New bounds on the information rate of secret sharing schemes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {41}, number = {2}, pages = {549--554}, year = {1995}, url = {https://doi.org/10.1109/18.370169}, doi = {10.1109/18.370169}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/BlundoSGV95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/BlundoSPV95, author = {Carlo Blundo and Alfredo De Santis and Giuseppe Persiano and Ugo Vaccaro}, editor = {Zolt{\'{a}}n F{\"{u}}l{\"{o}}p and Ferenc G{\'{e}}cseg}, title = {On the Number of Random Bits in Totally Private Computation}, booktitle = {Automata, Languages and Programming, 22nd International Colloquium, ICALP95, Szeged, Hungary, July 10-14, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {944}, pages = {171--182}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-60084-1\_72}, doi = {10.1007/3-540-60084-1\_72}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/BlundoSPV95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/eurocrypt/94, editor = {Alfredo De Santis}, title = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {950}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/BFb0053418}, doi = {10.1007/BFB0053418}, isbn = {3-540-60176-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/SantisP94, author = {Alfredo De Santis and Giuseppe Persiano}, title = {Tight Upper and Lower Bounds on the Path Length of Binary Trees}, journal = {{SIAM} J. Comput.}, volume = {23}, number = {1}, pages = {12--23}, year = {1994}, url = {https://doi.org/10.1137/S0097539791197323}, doi = {10.1137/S0097539791197323}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/SantisP94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/SantisCP94, author = {Alfredo De Santis and Giovanni Di Crescenzo and Giuseppe Persiano}, title = {The Knowledge Complexity of Quadratic Residuosity Languages}, journal = {Theor. Comput. Sci.}, volume = {132}, number = {2}, pages = {291--317}, year = {1994}, url = {https://doi.org/10.1016/0304-3975(94)90237-2}, doi = {10.1016/0304-3975(94)90237-2}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/SantisCP94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CapocelliSP94, author = {Renato M. Capocelli and Alfredo De Santis and Giuseppe Persiano}, title = {Binary prefix codes ending in a "1"}, journal = {{IEEE} Trans. Inf. Theory}, volume = {40}, number = {4}, pages = {1296--1302}, year = {1994}, url = {https://doi.org/10.1109/18.335933}, doi = {10.1109/18.335933}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/CapocelliSP94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/SantisOP94, author = {Alfredo De Santis and Tatsuaki Okamoto and Giuseppe Persiano}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini}, title = {Zero-Knowledge Proofs of Computational Power in the Shared String Model}, booktitle = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {917}, pages = {182--192}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0000434}, doi = {10.1007/BFB0000434}, timestamp = {Sun, 02 Jun 2019 21:16:53 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/SantisOP94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlundoSCGV94, author = {Carlo Blundo and Alfredo De Santis and Giovanni Di Crescenzo and Antonio Giorgio Gaggia and Ugo Vaccaro}, editor = {Yvo Desmedt}, title = {Multi-Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {839}, pages = {150--163}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-48658-5\_17}, doi = {10.1007/3-540-48658-5\_17}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BlundoSCGV94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/SantisCPY94, author = {Alfredo De Santis and Giovanni Di Crescenzo and Giuseppe Persiano and Moti Yung}, title = {On Monotone Formula Closure of {SZK}}, booktitle = {35th Annual Symposium on Foundations of Computer Science, Santa Fe, New Mexico, USA, 20-22 November 1994}, pages = {454--465}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/SFCS.1994.365745}, doi = {10.1109/SFCS.1994.365745}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/focs/SantisCPY94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/BlundoSV94, author = {Carlo Blundo and Alfredo De Santis and Ugo Vaccaro}, editor = {Serge Abiteboul and Eli Shamir}, title = {Randomness in Distributed Protocols}, booktitle = {Automata, Languages and Programming, 21st International Colloquium, ICALP94, Jerusalem, Israel, July 11-14, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {820}, pages = {568--579}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-58201-0\_99}, doi = {10.1007/3-540-58201-0\_99}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/BlundoSV94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/SantisDFY94, author = {Alfredo De Santis and Yvo Desmedt and Yair Frankel and Moti Yung}, editor = {Frank Thomson Leighton and Michael T. Goodrich}, title = {How to share a function securely}, booktitle = {Proceedings of the Twenty-Sixth Annual {ACM} Symposium on Theory of Computing, 23-25 May 1994, Montr{\'{e}}al, Qu{\'{e}}bec, Canada}, pages = {522--533}, publisher = {{ACM}}, year = {1994}, url = {https://doi.org/10.1145/195058.195405}, doi = {10.1145/195058.195405}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/SantisDFY94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/PriscoS93, author = {Roberto De Prisco and Alfredo De Santis}, title = {On Binary Search Trees}, journal = {Inf. Process. Lett.}, volume = {45}, number = {5}, pages = {249--253}, year = {1993}, url = {https://doi.org/10.1016/0020-0190(93)90212-R}, doi = {10.1016/0020-0190(93)90212-R}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/PriscoS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/CapocelliSGV93, author = {Renato M. Capocelli and Alfredo De Santis and Luisa Gargano and Ugo Vaccaro}, title = {On the Size of Shares for Secret Sharing Schemes}, journal = {J. Cryptol.}, volume = {6}, number = {3}, pages = {157--167}, year = {1993}, url = {https://doi.org/10.1007/BF00198463}, doi = {10.1007/BF00198463}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/CapocelliSGV93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SantisCP93, author = {Alfredo De Santis and Giovanni Di Crescenzo and Giuseppe Persiano}, editor = {Douglas R. Stinson}, title = {Secret Sharing and Perfect Zero Knowledge}, booktitle = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {773}, pages = {73--84}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48329-2\_7}, doi = {10.1007/3-540-48329-2\_7}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/SantisCP93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlundoCSV93, author = {Carlo Blundo and Antonella Cresti and Alfredo De Santis and Ugo Vaccaro}, editor = {Douglas R. Stinson}, title = {Fully Dynamic Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {773}, pages = {110--125}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48329-2\_10}, doi = {10.1007/3-540-48329-2\_10}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BlundoCSV93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CarpentieriSV93, author = {Marco Carpentieri and Alfredo De Santis and Ugo Vaccaro}, editor = {Tor Helleseth}, title = {Size of Shares and Probability of Cheating in Threshold Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {118--125}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_10}, doi = {10.1007/3-540-48285-7\_10}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CarpentieriSV93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fiwac/BlundoSGV93, author = {Carlo Blundo and Alfredo De Santis and Luisa Gargano and Ugo Vaccaro}, editor = {G{\'{e}}rard D. Cohen and Simon Litsyn and Antoine Lobstein and Gilles Z{\'{e}}mor}, title = {Secret Sharing Schemes with Veto Capabilities}, booktitle = {Algebraic Coding, First French-Israeli Workshop, Paris, France, July 19-21, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {781}, pages = {82--89}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-57843-9\_11}, doi = {10.1007/3-540-57843-9\_11}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fiwac/BlundoSGV93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stacs/BlundoSV93, author = {Carlo Blundo and Alfredo De Santis and Ugo Vaccaro}, editor = {Patrice Enjalbert and Alain Finkel and Klaus W. Wagner}, title = {Efficient Sharing of Many Secrets}, booktitle = {{STACS} 93, 10th Annual Symposium on Theoretical Aspects of Computer Science, W{\"{u}}rzburg, Germany, February 25-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {665}, pages = {692--703}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-56503-5\_68}, doi = {10.1007/3-540-56503-5\_68}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stacs/BlundoSV93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CapocelliSGV92, author = {Renato M. Capocelli and Alfredo De Santis and Luisa Gargano and Ugo Vaccaro}, title = {On the construction of statistically synchronizable codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {38}, number = {2}, pages = {407--414}, year = {1992}, url = {https://doi.org/10.1109/18.119696}, doi = {10.1109/18.119696}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/CapocelliSGV92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CapocelliS92, author = {Renato M. Capocelli and Alfredo De Santis}, title = {On the redundancy of optimal codes with limited word length}, journal = {{IEEE} Trans. Inf. Theory}, volume = {38}, number = {2}, pages = {439--445}, year = {1992}, url = {https://doi.org/10.1109/18.119701}, doi = {10.1109/18.119701}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/CapocelliS92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlundoSGV92, author = {Carlo Blundo and Alfredo De Santis and Luisa Gargano and Ugo Vaccaro}, editor = {Ernest F. Brickell}, title = {On the Information Rate of Secret Sharing Schemes (Extended Abstract)}, booktitle = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {740}, pages = {148--167}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-48071-4\_11}, doi = {10.1007/3-540-48071-4\_11}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BlundoSGV92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlundoSHKVY92, author = {Carlo Blundo and Alfredo De Santis and Amir Herzberg and Shay Kutten and Ugo Vaccaro and Moti Yung}, editor = {Ernest F. Brickell}, title = {Perfectly-Secure Key Distribution for Dynamic Conferences}, booktitle = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {740}, pages = {471--486}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-48071-4\_33}, doi = {10.1007/3-540-48071-4\_33}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BlundoSHKVY92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BlundoSSV92, author = {Carlo Blundo and Alfredo De Santis and Douglas R. Stinson and Ugo Vaccaro}, editor = {Rainer A. Rueppel}, title = {Graph Decompositions and Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} '92, Workshop on the Theory and Application of of Cryptographic Techniques, Balatonf{\"{u}}red, Hungary, May 24-28, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {658}, pages = {1--24}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-47555-9\_1}, doi = {10.1007/3-540-47555-9\_1}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BlundoSSV92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/SantisP92, author = {Alfredo De Santis and Giuseppe Persiano}, title = {Zero-Knowledge Proofs of Knowledge Without Interaction (Extended Abstract)}, booktitle = {33rd Annual Symposium on Foundations of Computer Science, Pittsburgh, Pennsylvania, USA, 24-27 October 1992}, pages = {427--436}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/SFCS.1992.267809}, doi = {10.1109/SFCS.1992.267809}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/focs/SantisP92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/SantisPY92, author = {Alfredo De Santis and Giuseppe Persiano and Moti Yung}, editor = {Werner Kuich}, title = {One-Message Statistical Zero-Knowledge Proofs and Space-Bounded Verifier}, booktitle = {Automata, Languages and Programming, 19th International Colloquium, ICALP92, Vienna, Austria, July 13-17, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {623}, pages = {28--40}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-55719-9\_61}, doi = {10.1007/3-540-55719-9\_61}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/SantisPY92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stacs/SantisP92, author = {Alfredo De Santis and Giuseppe Persiano}, editor = {Alain Finkel and Matthias Jantzen}, title = {Communication Efficient Zero-Knowledge Proofs of Knowledge (With Applications to Electronic Cash)}, booktitle = {{STACS} 92, 9th Annual Symposium on Theoretical Aspects of Computer Science, Cachan, France, February 13-15, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {577}, pages = {449--460}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-55210-3\_204}, doi = {10.1007/3-540-55210-3\_204}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stacs/SantisP92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/BlumSMP91, author = {Manuel Blum and Alfredo De Santis and Silvio Micali and Giuseppe Persiano}, title = {Noninteractive Zero-Knowledge}, journal = {{SIAM} J. Comput.}, volume = {20}, number = {6}, pages = {1084--1118}, year = {1991}, url = {https://doi.org/10.1137/0220068}, doi = {10.1137/0220068}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/BlumSMP91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CapocelliS91, author = {Renato M. Capocelli and Alfredo De Santis}, title = {A note on D-ary Huffman codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {37}, number = {1}, pages = {174--179}, year = {1991}, url = {https://doi.org/10.1109/18.61134}, doi = {10.1109/18.61134}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/CapocelliS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CapocelliS91a, author = {Renato M. Capocelli and Alfredo De Santis}, title = {New bounds on the redundancy of Huffman codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {37}, number = {4}, pages = {1095--1104}, year = {1991}, url = {https://doi.org/10.1109/18.87001}, doi = {10.1109/18.87001}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/CapocelliS91a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CapocelliSGV91, author = {Renato M. Capocelli and Alfredo De Santis and Luisa Gargano and Ugo Vaccaro}, editor = {Joan Feigenbaum}, title = {On the Size of Shares for Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {576}, pages = {101--113}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46766-1\_7}, doi = {10.1007/3-540-46766-1\_7}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CapocelliSGV91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dcc/SantisP91, author = {Alfredo De Santis and Giuseppe Persiano}, editor = {James A. Storer and John H. Reif}, title = {An Optimal Algorithm for the Construction of Optimal Prefix Codes with Given Fringe}, booktitle = {Proceedings of the {IEEE} Data Compression Conference, {DCC} 1991, Snowbird, Utah, USA, April 8-11, 1991}, pages = {297--306}, publisher = {{IEEE} Computer Society}, year = {1991}, url = {https://doi.org/10.1109/DCC.1991.213351}, doi = {10.1109/DCC.1991.213351}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/dcc/SantisP91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stacs/SantisP91, author = {Alfredo De Santis and Giuseppe Persiano}, editor = {Christian Choffrut and Matthias Jantzen}, title = {Tight Bounds on the Path Length of Binary Trees}, booktitle = {{STACS} 91, 8th Annual Symposium on Theoretical Aspects of Computer Science, Hamburg, Germany, February 14-16, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {480}, pages = {478--487}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/BFb0020822}, doi = {10.1007/BFB0020822}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stacs/SantisP91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SantisY90, author = {Alfredo De Santis and Moti Yung}, editor = {Alfred Menezes and Scott A. Vanstone}, title = {Crptograpic Applications of the Non-Interactive Metaproof and Many-Prover Systems}, booktitle = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {537}, pages = {366--377}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-38424-3\_27}, doi = {10.1007/3-540-38424-3\_27}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/SantisY90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocode/CapocelliS90, author = {Renato M. Capocelli and Alfredo De Santis}, editor = {G{\'{e}}rard D. Cohen and Pascale Charpin}, title = {Minimum codeword length and redundancy of Huffman codes}, booktitle = {{EUROCODE} '90, International Symposium on Coding Theory and Applications, Udine, Italy, November 5-9, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {514}, pages = {309--317}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-54303-1\_142}, doi = {10.1007/3-540-54303-1\_142}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocode/CapocelliS90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SantisP90, author = {Alfredo De Santis and Giuseppe Persiano}, editor = {Ivan Damg{\aa}rd}, title = {Public-Randomness in Public Key Cryptography}, booktitle = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {473}, pages = {46--62}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-46877-3\_5}, doi = {10.1007/3-540-46877-3\_5}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SantisP90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SantisY90, author = {Alfredo De Santis and Moti Yung}, editor = {Ivan Damg{\aa}rd}, title = {On the Design of Provably Secure Cryptographic Hash Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {473}, pages = {412--431}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-46877-3\_37}, doi = {10.1007/3-540-46877-3\_37}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SantisY90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CapocelliS89, author = {Renato M. Capocelli and Alfredo De Santis}, title = {Tight upper bounds on the redundancy of Huffman codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {35}, number = {5}, pages = {1084--1091}, year = {1989}, url = {https://doi.org/10.1109/18.42226}, doi = {10.1109/18.42226}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/CapocelliS89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CapocelliST88, author = {Renato M. Capocelli and Alfredo De Santis and Inder Jeet Taneja}, title = {Bounds on the entropy series}, journal = {{IEEE} Trans. Inf. Theory}, volume = {34}, number = {1}, pages = {134--138}, year = {1988}, url = {https://doi.org/10.1109/18.2612}, doi = {10.1109/18.2612}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/CapocelliST88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colt/DeSantisMW88, author = {Alfredo De Santis and George Markowsky and Mark N. Wegman}, editor = {David Haussler and Leonard Pitt}, title = {Learning Probabilistic Prediction Functions}, booktitle = {Proceedings of the First Annual Workshop on Computational Learning Theory, {COLT} '88, Cambridge, MA, USA, August 3-5, 1988}, pages = {312--328}, publisher = {{ACM/MIT}}, year = {1988}, url = {http://dl.acm.org/citation.cfm?id=93107}, timestamp = {Fri, 23 Dec 2011 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/colt/DeSantisMW88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SantisMP88, author = {Alfredo De Santis and Silvio Micali and Giuseppe Persiano}, editor = {Shafi Goldwasser}, title = {Non-Interactive Zero-Knowledge with Preprocessing}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {269--282}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_21}, doi = {10.1007/0-387-34799-2\_21}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/SantisMP88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/DeSantisMW88, author = {Alfredo De Santis and George Markowsky and Mark N. Wegman}, title = {Learning Probabilistic Prediction Functions (Extended Abstract)}, booktitle = {29th Annual Symposium on Foundations of Computer Science, White Plains, New York, USA, 24-26 October 1988}, pages = {110--119}, publisher = {{IEEE} Computer Society}, year = {1988}, url = {https://doi.org/10.1109/SFCS.1988.21929}, doi = {10.1109/SFCS.1988.21929}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/focs/DeSantisMW88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/SantisMP87, author = {Alfredo De Santis and Silvio Micali and Giuseppe Persiano}, editor = {Carl Pomerance}, title = {Non-Interactive Zero-Knowledge Proof Systems}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {52--72}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_5}, doi = {10.1007/3-540-48184-2\_5}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/SantisMP87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CapocelliS86, author = {Renato M. Capocelli and Alfredo De Santis}, title = {Regular universal codeword sets}, journal = {{IEEE} Trans. Inf. Theory}, volume = {32}, number = {1}, pages = {129--133}, year = {1986}, url = {https://doi.org/10.1109/TIT.1986.1057130}, doi = {10.1109/TIT.1986.1057130}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/CapocelliS86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.