default search action
Giuseppe Ateniese
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c75]Giuseppe Ateniese, Foteini Baldimtsi, Matteo Campanelli, Danilo Francati, Ioanna Karantaidou:
Advancing Scalability in Decentralized Storage: A Novel Approach to Proof-of-Replication via Polynomial Evaluation. CRYPTO (2) 2024: 3-39 - [c74]Huseyin Gokay, Foteini Baldimtsi, Giuseppe Ateniese:
Atomic Swaps for Boneh-Lynn-Shacham (BLS) Based Blockchains. ESORICS (3) 2024: 341-361 - [c73]Hanlin Zhang, Benjamin L. Edelman, Danilo Francati, Daniele Venturi, Giuseppe Ateniese, Boaz Barak:
Watermarks in the Sand: Impossibility of Strong Watermarking for Language Models. ICML 2024 - [c72]Dario Pasquini, Giuseppe Ateniese, Carmela Troncoso:
Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data. SP 2024: 1365-1384 - [c71]Dario Pasquini, Danilo Francati, Giuseppe Ateniese, Evgenios M. Kornaropoulos:
Breach Extraction Attacks: Exposing and Addressing the Leakage in Second Generation Compromised Credential Checking Services. SP 2024: 1405-1423 - [i57]Dario Pasquini, Evgenios M. Kornaropoulos, Giuseppe Ateniese:
LLMmap: Fingerprinting For Large Language Models. CoRR abs/2407.15847 (2024) - [i56]Alberto Maria Mongardini, Daniele Friolo, Giuseppe Ateniese:
Stealth and Beyond: Attribute-Driven Accountability in Bitcoin Transactions. IACR Cryptol. ePrint Arch. 2024: 1789 (2024) - 2023
- [c70]Giuseppe Ateniese, Long Chen, Danilo Francati, Dimitrios Papadopoulos, Qiang Tang:
Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity - (Revisiting Space-Based Security in the Adaptive Setting). Public Key Cryptography (2) 2023: 63-93 - [i55]Dario Pasquini, Giuseppe Ateniese, Carmela Troncoso:
Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data. CoRR abs/2301.07628 (2023) - [i54]Hanlin Zhang, Benjamin L. Edelman, Danilo Francati, Daniele Venturi, Giuseppe Ateniese, Boaz Barak:
Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models. CoRR abs/2311.04378 (2023) - [i53]Giuseppe Ateniese, Foteini Baldimtsi, Matteo Campanelli, Danilo Francati, Ioanna Karantaidou:
Advancing Scalability in Decentralized Storage: A Novel Approach to Proof-of-Replication via Polynomial Evaluation. IACR Cryptol. ePrint Arch. 2023: 1569 (2023) - [i52]Hanlin Zhang, Benjamin L. Edelman, Danilo Francati, Daniele Venturi, Giuseppe Ateniese, Boaz Barak:
Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models. IACR Cryptol. ePrint Arch. 2023: 1776 (2023) - [i51]Dario Pasquini, Danilo Francati, Giuseppe Ateniese, Evgenios M. Kornaropoulos:
Breach Extraction Attacks: Exposing and Addressing the Leakage in Second Generation Compromised Credential Checking Services. IACR Cryptol. ePrint Arch. 2023: 1848 (2023) - 2022
- [j22]Bin Xiao, Fan Wu, Francesco Chiti, Mohammad Hossein Manshaei, Giuseppe Ateniese:
Guest Editorial: Introduction to the Special Section on Security and Privacy for AI Models and Applications. IEEE Trans. Netw. Sci. Eng. 9(1): 171-172 (2022) - [c69]Dario Pasquini, Danilo Francati, Giuseppe Ateniese:
Eluding Secure Aggregation in Federated Learning via Model Inconsistency. CCS 2022: 2429-2443 - [e2]Giuseppe Ateniese, Daniele Venturi:
Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Rome, Italy, June 20-23, 2022, Proceedings. Lecture Notes in Computer Science 13269, Springer 2022, ISBN 978-3-031-09233-6 [contents] - 2021
- [j21]Giuseppe Ateniese, Danilo Francati, David Nuñez, Daniele Venturi:
Match Me if You Can: Matchmaking Encryption and Its Applications. J. Cryptol. 34(3): 16 (2021) - [j20]Giuseppe Ateniese, Danilo Francati, Bernardo Magri, Daniele Venturi:
Immunization against complete subversion without random oracles. Theor. Comput. Sci. 859: 1-36 (2021) - [c68]Danilo Francati, Giuseppe Ateniese, Abdoulaye Faye, Andrea Maria Milazzo, Angelo Massimo Perillo, Luca Schiatti, Giuseppe Giordano:
Audita: A Blockchain-based Auditing Framework for Off-chain Storage. SBC@AsiaCCS 2021: 5-10 - [c67]Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi:
Unleashing the Tiger: Inference Attacks on Split Learning. CCS 2021: 2113-2129 - [c66]Dario Pasquini, Ankit Gangwal, Giuseppe Ateniese, Massimo Bernaschi, Mauro Conti:
Improving Password Guessing via Representation Learning. SP 2021: 1382-1399 - [c65]Dario Pasquini, Marco Cianfriglia, Giuseppe Ateniese, Massimo Bernaschi:
Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries. USENIX Security Symposium 2021: 821-838 - [i50]Dario Pasquini, Danilo Francati, Giuseppe Ateniese:
Eluding Secure Aggregation in Federated Learning via Model Inconsistency. CoRR abs/2111.07380 (2021) - [i49]Giuseppe Ateniese, Long Chen, Danilo Francati, Dimitrios Papadopoulos, Qiang Tang:
Verifiable Capacity-bound Functions: A New Primitive from Kolmogorov Complexity. IACR Cryptol. ePrint Arch. 2021: 162 (2021) - 2020
- [j19]Giuseppe Ateniese, Bernardo Magri, Daniele Venturi:
Subversion-resilient signatures: Definitions, constructions and applications. Theor. Comput. Sci. 820: 91-122 (2020) - [c64]Giuseppe Ateniese:
Is AI Taking Over the World? No, but It's Making it Less Private. SBC@AsiaCCS 2020: 1 - [c63]Adriano Di Luzio, Danilo Francati, Giuseppe Ateniese:
Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains. CANS 2020: 323-343 - [c62]Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi:
Interpretable Probabilistic Password Strength Meters via Deep Learning. ESORICS (1) 2020: 502-522 - [c61]Giuseppe Ateniese, Long Chen, Mohammad Etemad, Qiang Tang:
Proof of Storage-Time: Efficiently Checking Continuous Data Availability. NDSS 2020 - [e1]Hung-Min Sun, Shiuh-Pyng Shieh, Guofei Gu, Giuseppe Ateniese:
ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020. ACM 2020, ISBN 978-1-4503-6750-9 [contents] - [i48]Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi:
Interpretable Probabilistic Password Strength Meters via Deep Learning. CoRR abs/2004.07179 (2020) - [i47]Dario Pasquini, Marco Cianfriglia, Giuseppe Ateniese, Massimo Bernaschi:
Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries. CoRR abs/2010.12269 (2020) - [i46]Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi:
Unleashing the Tiger: Inference Attacks on Split Learning. CoRR abs/2012.02670 (2020) - [i45]Giuseppe Ateniese, Long Chen, Mohammad Etemad, Qiang Tang:
Proof of Storage-Time: Efficiently Checking Continuous Data Availability. IACR Cryptol. ePrint Arch. 2020: 840 (2020)
2010 – 2019
- 2019
- [c60]Briland Hitaj, Paolo Gasti, Giuseppe Ateniese, Fernando Pérez-Cruz:
PassGAN: A Deep Learning Approach for Password Guessing. ACNS 2019: 217-237 - [c59]Giuseppe Ateniese, Danilo Francati, Bernardo Magri, Daniele Venturi:
Public Immunization Against Complete Subversion Without Random Oracles. ACNS 2019: 465-485 - [c58]Giuseppe Ateniese, Danilo Francati, David Nuñez, Daniele Venturi:
Match Me if You Can: Matchmaking Encryption and Its Applications. CRYPTO (2) 2019: 701-731 - [i44]Adriano Di Luzio, Danilo Francati, Giuseppe Ateniese:
Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains. CoRR abs/1906.05919 (2019) - [i43]Dario Pasquini, Ankit Gangwal, Giuseppe Ateniese, Massimo Bernaschi, Mauro Conti:
Improving Password Guessing via Representation Learning. CoRR abs/1910.04232 (2019) - [i42]Danilo Francati, Giuseppe Ateniese, Abdoulaye Faye, Andrea Maria Milazzo, Angelo Massimo Perillo, Luca Schiatti, Giuseppe Giordano:
Audita: A Blockchain-based Auditing Framework for Off-chain Storage. CoRR abs/1911.08515 (2019) - [i41]Adriano Di Luzio, Danilo Francati, Giuseppe Ateniese:
Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains. IACR Cryptol. ePrint Arch. 2019: 704 (2019) - [i40]Giuseppe Ateniese, Danilo Francati, Bernardo Magri, Daniele Venturi:
Immunization against Complete Subversion without Random Oracles. IACR Cryptol. ePrint Arch. 2019: 1173 (2019) - [i39]Dario Pasquini, Ankit Gangwal, Giuseppe Ateniese, Massimo Bernaschi, Mauro Conti:
Improving Password Guessing via Representation Learning. IACR Cryptol. ePrint Arch. 2019: 1188 (2019) - [i38]Danilo Francati, Giuseppe Ateniese, Abdoulaye Faye, Andrea Maria Milazzo, Angelo Massimo Perillo, Luca Schiatti, Giuseppe Giordano:
Audita: A Blockchain-based Auditing Framework for Off-chain Storage. IACR Cryptol. ePrint Arch. 2019: 1345 (2019) - 2018
- [c57]Giuseppe Ateniese, Katharina Fech, Bernardo Magri:
A Family of FDH Signature Schemes Based on the Quadratic Residuosity Assumption. INDOCRYPT 2018: 248-262 - [c56]Giuseppe Ateniese, Aggelos Kiayias, Bernardo Magri, Yiannis Tselekounis, Daniele Venturi:
Secure Outsourcing of Cryptographic Circuits Manufacturing. ProvSec 2018: 75-93 - [i37]Giuseppe Ateniese, Danilo Francati, David Nuñez, Daniele Venturi:
Match Me if You Can: Matchmaking Encryption and its Applications. IACR Cryptol. ePrint Arch. 2018: 1094 (2018) - 2017
- [j18]Giuseppe Ateniese, Giuseppe Bianchi, Angelo T. Capossele, Chiara Petrioli, Dora Spenza:
Low-Cost Standard Signatures for Energy-Harvesting Wireless Sensor Networks. ACM Trans. Embed. Comput. Syst. 16(3): 64:1-64:23 (2017) - [j17]Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, Geyong Min:
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage. IEEE Trans. Inf. Forensics Secur. 12(4): 767-778 (2017) - [c55]Giuseppe Ateniese, Michael T. Goodrich, Vassilios Lekakis, Charalampos Papamanthou, Evripidis Paraskevas, Roberto Tamassia:
Accountable Storage. ACNS 2017: 623-644 - [c54]Briland Hitaj, Giuseppe Ateniese, Fernando Pérez-Cruz:
Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning. CCS 2017: 603-618 - [c53]Giuseppe Ateniese, Bernardo Magri, Daniele Venturi, Ewerton R. Andrade:
Redactable Blockchain - or - Rewriting History in Bitcoin and Friends. EuroS&P 2017: 111-126 - [c52]Giuseppe Ateniese, Giuseppe Bianchi, Angelo T. Capossele, Chiara Petrioli, Dora Spenza:
HELIOS: Outsourcing of Security Operations in Green Wireless Sensor Networks. VTC Spring 2017: 1-7 - [i36]Briland Hitaj, Giuseppe Ateniese, Fernando Pérez-Cruz:
Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning. CoRR abs/1702.07464 (2017) - [i35]Briland Hitaj, Paolo Gasti, Giuseppe Ateniese, Fernando Pérez-Cruz:
PassGAN: A Deep Learning Approach for Password Guessing. CoRR abs/1709.00440 (2017) - 2016
- [j16]Giuseppe Ateniese, Özgür Dagdelen, Ivan Damgård, Daniele Venturi:
Entangled cloud storage. Future Gener. Comput. Syst. 62: 104-118 (2016) - [c51]Johannes Krupp, Dominique Schröder, Mark Simkin, Dario Fiore, Giuseppe Ateniese, Stefan Nürnberger:
Nearly Optimal Verifiable Data Streaming. Public Key Cryptography (1) 2016: 417-445 - [i34]Giuseppe Ateniese, Aggelos Kiayias, Bernardo Magri, Yiannis Tselekounis, Daniele Venturi:
Secure Outsourcing of Circuit Manufacturing. IACR Cryptol. ePrint Arch. 2016: 527 (2016) - [i33]Giuseppe Ateniese, Bernardo Magri, Daniele Venturi, Ewerton R. Andrade:
Redactable Blockchain - or - Rewriting History in Bitcoin and Friends. IACR Cryptol. ePrint Arch. 2016: 757 (2016) - 2015
- [j15]Giuseppe Ateniese, Luigi V. Mancini, Angelo Spognardi, Antonio Villani, Domenico Vitali, Giovanni Felici:
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers. Int. J. Secur. Networks 10(3): 137-150 (2015) - [j14]Yong Yu, Yi Mu, Giuseppe Ateniese:
Recent Advances in Security and Privacy in Big Data. J. Univers. Comput. Sci. 21(3): 365-368 (2015) - [c50]Giuseppe Ateniese, Özgür Dagdelen, Ivan Damgård, Daniele Venturi:
Entangled Encodings and Data Entanglement. SCC@ASIACCS 2015: 3-12 - [c49]Giuseppe Ateniese, Bernardo Magri, Daniele Venturi:
Subversion-Resilient Signature Schemes. CCS 2015: 364-375 - [c48]Giuseppe Ateniese, Antonio Faonio, Seny Kamara:
Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage. IMACC 2015: 311-328 - [c47]Giuseppe Ateniese, Briland Hitaj, Luigi Vincenzo Mancini, Nino Vincenzo Verde, Antonio Villani:
No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position. NSS 2015: 46-59 - [c46]Duane Wilson, Giuseppe Ateniese:
From Pretty Good to Great: Enhancing PGP Using Bitcoin and the Blockchain. NSS 2015: 368-375 - [i32]Giuseppe Ateniese, Briland Hitaj, Luigi V. Mancini, Nino Vincenzo Verde, Antonio Villani:
No Place to Hide that Bytes won't Reveal: Sniffing Location-Based Encrypted Traffic to Track User Position. CoRR abs/1505.07774 (2015) - [i31]Duane Wilson, Giuseppe Ateniese:
From Pretty Good To Great: Enhancing PGP using Bitcoin and the Blockchain. CoRR abs/1508.04868 (2015) - [i30]Johannes Krupp, Dominique Schröder, Mark Simkin, Dario Fiore, Giuseppe Ateniese, Stefan Nürnberger:
Nearly Optimal Verifiable Data Streaming (Full Version). IACR Cryptol. ePrint Arch. 2015: 333 (2015) - [i29]Giuseppe Ateniese, Bernardo Magri, Daniele Venturi:
Subversion-Resilient Signature Schemes. IACR Cryptol. ePrint Arch. 2015: 517 (2015) - [i28]Giuseppe Ateniese, Antonio Faonio, Seny Kamara:
Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage. IACR Cryptol. ePrint Arch. 2015: 920 (2015) - 2014
- [j13]Giuseppe Ateniese, Roberto Baldoni, Silvia Bonomi, Giuseppe Antonio Di Luna:
Fault-tolerant oblivious assignment with m slots in synchronous systems. J. Parallel Distributed Comput. 74(7): 2648-2661 (2014) - [c45]Giuseppe Ateniese, Antonio Faonio, Bernardo Magri, Breno de Medeiros:
Certified Bitcoins. ACNS 2014: 80-96 - [c44]Nino Vincenzo Verde, Giuseppe Ateniese, Emanuele Gabrielli, Luigi Vincenzo Mancini, Angelo Spognardi:
No NAT'd User Left Behind: Fingerprinting Users behind NAT from NetFlow Records Alone. ICDCS 2014: 218-227 - [c43]Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese:
VABKS: Verifiable attribute-based keyword search over outsourced encrypted data. INFOCOM 2014: 522-530 - [c42]Duane C. Wilson, Giuseppe Ateniese:
"To Share or not to Share" in Client-Side Encrypted Clouds. ISC 2014: 401-412 - [c41]Giuseppe Ateniese, Ilario Bonacina, Antonio Faonio, Nicola Galesi:
Proofs of Space: When Space Is of the Essence. SCN 2014: 538-557 - [i27]Nino Vincenzo Verde, Giuseppe Ateniese, Emanuele Gabrielli, Luigi Vincenzo Mancini, Angelo Spognardi:
No NAT'd User left Behind: Fingerprinting Users behind NAT from NetFlow Records alone. CoRR abs/1402.1940 (2014) - [i26]Duane Wilson, Giuseppe Ateniese:
To Share or Not to Share in Client-Side Encrypted Clouds. CoRR abs/1404.2697 (2014) - [i25]Giuseppe Ateniese, Antonio Faonio, Bernardo Magri, Breno de Medeiros:
Certified Bitcoins. IACR Cryptol. ePrint Arch. 2014: 76 (2014) - [i24]Giuseppe Ateniese, Michael T. Goodrich, Vassilios Lekakis, Charalampos Papamanthou, Evripidis Paraskevas, Roberto Tamassia:
Accountable Storage. IACR Cryptol. ePrint Arch. 2014: 886 (2014) - 2013
- [j12]Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
A note on time-bound hierarchical key assignment schemes. Inf. Process. Lett. 113(5-6): 151-155 (2013) - [c40]Giuseppe Ateniese, Giuseppe Bianchi, Angelo Capossele, Chiara Petrioli:
Low-cost Standard Signatures in Wireless Sensor Networks: A Case for Reviving Pre-computation Techniques? NDSS 2013 - [i23]Giuseppe Ateniese, Giovanni Felici, Luigi V. Mancini, Angelo Spognardi, Antonio Villani, Domenico Vitali:
Hacking Smart Machines with Smarter Ones: How to Extract Meaningful Data from Machine Learning Classifiers. CoRR abs/1306.4447 (2013) - [i22]Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese:
VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data. IACR Cryptol. ePrint Arch. 2013: 462 (2013) - [i21]Giuseppe Ateniese, Ilario Bonacina, Antonio Faonio, Nicola Galesi:
Proofs of Space: When Space is of the Essence. IACR Cryptol. ePrint Arch. 2013: 805 (2013) - 2012
- [j11]Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes. J. Cryptol. 25(2): 243-270 (2012) - [c39]Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese:
Efficient query integrity for outsourced dynamic databases. CCSW 2012: 71-82 - [c38]Nathaniel Wesley Filardo, Giuseppe Ateniese:
High-Entropy Visual Identification for Touch Screen Devices. ISPEC 2012: 182-198 - [c37]Giuseppe Ateniese, Roberto Baldoni, Silvia Bonomi, Giuseppe Antonio Di Luna:
Oblivious Assignment with m Slots. SSS 2012: 187-201 - [i20]Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese:
Efficient Query Integrity for Outsourced Dynamic Databases. IACR Cryptol. ePrint Arch. 2012: 493 (2012) - [i19]Giuseppe Ateniese, Özgür Dagdelen, Ivan Damgård, Daniele Venturi:
Entangled Cloud Storage. IACR Cryptol. ePrint Arch. 2012: 511 (2012) - 2011
- [j10]Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Osama Khan, Lea Kissner, Zachary N. J. Peterson, Dawn Song:
Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. 14(1): 12:1-12:34 (2011) - [c36]Giuseppe Ateniese, Emiliano De Cristofaro, Gene Tsudik:
(If) Size Matters: Size-Hiding Private Set Intersection. Public Key Cryptography 2011: 156-173 - [i18]Nathaniel Wesley Filardo, Giuseppe Ateniese:
High-Entropy Visual Identification for Touch Screen Devices. IACR Cryptol. ePrint Arch. 2011: 359 (2011) - 2010
- [j9]Paul T. Stanton, Benjamin McKeown, Randal C. Burns, Giuseppe Ateniese:
FastAD: an authenticated directory for billions of objects. ACM SIGOPS Oper. Syst. Rev. 44(1): 45-49 (2010) - [c35]Bo Chen, Reza Curtmola, Giuseppe Ateniese, Randal C. Burns:
Remote data checking for network coding-based distributed storage systems. CCSW 2010: 31-42 - [c34]Paolo Gasti, Giuseppe Ateniese, Marina Blanton:
Deniable cloud storage: sharing files via public-key deniability. WPES 2010: 31-42 - [i17]Giuseppe Ateniese, Emiliano De Cristofaro, Gene Tsudik:
(If) Size Matters: Size-Hiding Private Set Intersection. IACR Cryptol. ePrint Arch. 2010: 220 (2010)
2000 – 2009
- 2009
- [j8]Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik:
Remarks on ''Analysis of one popular group signature scheme'' in Asiacrypt 2006. Int. J. Appl. Cryptogr. 1(4): 320-322 (2009) - [c33]Giuseppe Ateniese, Seny Kamara, Jonathan Katz:
Proofs of Storage from Homomorphic Identification Protocols. ASIACRYPT 2009: 319-333 - [c32]Giuseppe Ateniese, Paolo Gasti:
Universally Anonymous IBE Based on the Quadratic Residuosity Assumption. CT-RSA 2009: 32-47 - [c31]Giuseppe Ateniese, Karyn Benson, Susan Hohenberger:
Key-Private Proxy Re-encryption. CT-RSA 2009: 279-294 - [i16]Giuseppe Ateniese, Paolo Gasti:
Universally Anonymous IBE based on the Quadratic Residuosity Assumption. IACR Cryptol. ePrint Arch. 2009: 280 (2009) - 2008
- [c30]Reza Curtmola, Osama Khan, Randal C. Burns, Giuseppe Ateniese:
MR-PDP: Multiple-Replica Provable Data Possession. ICDCS 2008: 411-420 - [c29]Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, Gene Tsudik:
Scalable and efficient provable data possession. SecureComm 2008: 9 - [i15]Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, Gene Tsudik:
Scalable and Efficient Provable Data Possession. IACR Cryptol. ePrint Arch. 2008: 114 (2008) - [i14]Giuseppe Ateniese, Karyn Benson, Susan Hohenberger:
Key-Private Proxy Re-Encryption. IACR Cryptol. ePrint Arch. 2008: 463 (2008) - 2007
- [c28]Matthew Green, Giuseppe Ateniese:
Identity-Based Proxy Re-encryption. ACNS 2007: 288-306 - [c27]Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, Dawn Xiaodong Song:
Provable data possession at untrusted stores. CCS 2007: 598-609 - [c26]Zachary N. J. Peterson, Randal C. Burns, Giuseppe Ateniese, Stephen Bono:
Design and Implementation of Verifiable Audit Trails for a Versioning File System. FAST 2007: 93-106 - [c25]Giuseppe Ateniese, Jonathan Kirsch, Marina Blanton:
Secret Handshakes with Dynamic and Fuzzy Matching. NDSS 2007 - [i13]Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, Dawn Song:
Provable Data Possession at Untrusted Stores. IACR Cryptol. ePrint Arch. 2007: 202 (2007) - 2006
- [j7]Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger:
Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1): 1-30 (2006) - [j6]Giuseppe Ateniese, Chris Riley, Christian Scheideler:
Survivable Monitoring in Dynamic Networks. IEEE Trans. Mob. Comput. 5(9): 1242-1254 (2006) - [c24]Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Provably-secure time-bound hierarchical key assignment schemes. CCS 2006: 288-297 - [i12]Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes. IACR Cryptol. ePrint Arch. 2006: 225 (2006) - [i11]Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik:
Remarks on "Analysis of One Popular Group Signature Scheme" in Asiacrypt 2006. IACR Cryptol. ePrint Arch. 2006: 464 (2006) - [i10]Matthew Green, Giuseppe Ateniese:
Identity-Based Proxy Re-encryption. IACR Cryptol. ePrint Arch. 2006: 473 (2006) - 2005
- [c23]Reza Curtmola, Aniello Del Sorbo, Giuseppe Ateniese:
On the Performance and Analysis of DNS Security Extensions. CANS 2005: 288-303 - [c22]Giuseppe Ateniese, Jan Camenisch, Breno de Medeiros:
Untraceable RFID tags via insubvertible encryption. CCS 2005: 92-101 - [c21]Giuseppe Ateniese, Susan Hohenberger:
Proxy re-signatures: new definitions, algorithms, and applications. CCS 2005: 310-319 - [c20]Giuseppe Ateniese, Daniel H. Chou, Breno de Medeiros, Gene Tsudik:
Sanitizable Signatures. ESORICS 2005: 159-177 - [c19]Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger:
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. NDSS 2005 - [c18]Randal C. Burns, Zachary N. J. Peterson, Giuseppe Ateniese, Stephen Bono:
Verifiable audit trails for a versioning file system. StorageSS 2005: 44-50 - [i9]Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger:
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. IACR Cryptol. ePrint Arch. 2005: 28 (2005) - [i8]Giuseppe Ateniese, Jan Camenisch, Susan Hohenberger, Breno de Medeiros:
Practical Group Signatures without Random Oracles. IACR Cryptol. ePrint Arch. 2005: 385 (2005) - [i7]Giuseppe Ateniese, Susan Hohenberger:
Proxy Re-Signatures: New Definitions, Algorithms, and Applications. IACR Cryptol. ePrint Arch. 2005: 433 (2005) - 2004
- [j5]Giuseppe Ateniese:
Verifiable encryption of digital signatures and applications. ACM Trans. Inf. Syst. Secur. 7(1): 1-20 (2004) - [c17]Giuseppe Ateniese, Breno de Medeiros:
Identity-Based Chameleon Hash and Applications. Financial Cryptography 2004: 164-180 - [c16]Giuseppe Ateniese, Chris Riley, Christian Scheideler:
Survivable Monitoring in Dynamic Networks. IWIA 2004: 33-47 - [c15]Giuseppe Ateniese, Breno de Medeiros:
On the Key Exposure Problem in Chameleon Hashes. SCN 2004: 165-179 - [i6]Giuseppe Ateniese, Breno de Medeiros:
A Provably Secure Nyberg-Rueppel Signature Variant with Applications. IACR Cryptol. ePrint Arch. 2004: 93 (2004) - [i5]Giuseppe Ateniese, Breno de Medeiros:
On the Key Exposure Problem in Chameleon Hashes. IACR Cryptol. ePrint Arch. 2004: 243 (2004) - 2003
- [c14]Giuseppe Ateniese, Breno de Medeiros:
Efficient Group Signatures without Trapdoors. ASIACRYPT 2003: 246-268 - [i4]Giuseppe Ateniese, Breno de Medeiros:
Identity-based Chameleon Hash and Applications. IACR Cryptol. ePrint Arch. 2003: 167 (2003) - 2002
- [c13]Giuseppe Ateniese, Cristina Nita-Rotaru:
Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption. CT-RSA 2002: 182-199 - [c12]Giuseppe Ateniese, Dawn Xiaodong Song, Gene Tsudik:
Quasi-Efficient Revocation in Group Signatures. Financial Cryptography 2002: 183-197 - [c11]Giuseppe Ateniese, Reza Curtmola, Breno de Medeiros, Darren Davis:
Medical Information Privacy Assurance: Cryptographic and System Aspects. SCN 2002: 199-218 - [c10]Giuseppe Ateniese, Breno de Medeiros:
Anonymous E-prescriptions. WPES 2002: 19-31 - [i3]Giuseppe Ateniese, Breno de Medeiros:
Efficient Group Signatures without Trapdoors. IACR Cryptol. ePrint Arch. 2002: 173 (2002) - 2001
- [j4]Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson:
Extended capabilities for visual cryptography. Theor. Comput. Sci. 250(1-2): 143-161 (2001) - [c9]Giuseppe Ateniese, Stefan Mangard:
A new approach to DNS security (DNSSEC). CCS 2001: 86-95 - [c8]Giuseppe Ateniese, Breno de Medeiros, Michael T. Goodrich:
TRICERT: A Distributed Certified E-Mail Scheme. NDSS 2001 - [i2]Giuseppe Ateniese, Dawn Song, Gene Tsudik:
Quasi-Efficient Revocation of Group Signatures. IACR Cryptol. ePrint Arch. 2001: 101 (2001) - 2000
- [j3]Giuseppe Ateniese, Michael Steiner, Gene Tsudik:
New multiparty authentication services and key agreement protocols. IEEE J. Sel. Areas Commun. 18(4): 628-639 (2000) - [c7]Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik:
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. CRYPTO 2000: 255-270 - [c6]Jonathan Robert Stanton, Yair Amir, Damian Hasse, Giuseppe Ateniese, Yongdae Kim, Cristina Nita-Rotaru, Theo Schlossnagle, John L. Schultz, Gene Tsudik:
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments. ICDCS 2000: 330-343
1990 – 1999
- 1999
- [j2]Giuseppe Ateniese, Amir Herzberg, Hugo Krawczyk, Gene Tsudik:
Untraceable mobility or how to travel incognito. Comput. Networks 31(8): 871-884 (1999) - [c5]Giuseppe Ateniese:
Efficient Verifiable Encryption (and Fair Exchange) of Digital Signatures. CCS 1999: 138-146 - [c4]Giuseppe Ateniese, Gene Tsudik:
Some Open Issues and New Directions in Group Signatures. Financial Cryptography 1999: 196-211 - [c3]Giuseppe Ateniese, Gene Tsudik:
Group Signatures Á la carte. SODA 1999: 848-849 - 1998
- [c2]Giuseppe Ateniese, Michael Steiner, Gene Tsudik:
Authenticated Group Key Agreement and Friends. CCS 1998: 17-26 - 1996
- [j1]Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson:
Visual Cryptography for General Access Structures. Inf. Comput. 129(2): 86-106 (1996) - [c1]Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson:
Constructions and Bounds for Visual Cryptography. ICALP 1996: 416-428 - [i1]Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson:
Visual Cryptography for General Access Structures. Electron. Colloquium Comput. Complex. TR96 (1996)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint