BibTeX records: Giuseppe Ateniese

download as .bib file

@inproceedings{DBLP:conf/pkc/AtenieseCFPT23,
  author       = {Giuseppe Ateniese and
                  Long Chen and
                  Danilo Francati and
                  Dimitrios Papadopoulos and
                  Qiang Tang},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Verifiable Capacity-Bound Functions: {A} New Primitive from Kolmogorov
                  Complexity - (Revisiting Space-Based Security in the Adaptive Setting)},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  pages        = {63--93},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4\_3},
  doi          = {10.1007/978-3-031-31371-4\_3},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AtenieseCFPT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-07628,
  author       = {Dario Pasquini and
                  Giuseppe Ateniese and
                  Carmela Troncoso},
  title        = {Universal Neural-Cracking-Machines: Self-Configurable Password Models
                  from Auxiliary Data},
  journal      = {CoRR},
  volume       = {abs/2301.07628},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.07628},
  doi          = {10.48550/ARXIV.2301.07628},
  eprinttype    = {arXiv},
  eprint       = {2301.07628},
  timestamp    = {Thu, 19 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-07628.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-04378,
  author       = {Hanlin Zhang and
                  Benjamin L. Edelman and
                  Danilo Francati and
                  Daniele Venturi and
                  Giuseppe Ateniese and
                  Boaz Barak},
  title        = {Watermarks in the Sand: Impossibility of Strong Watermarking for Generative
                  Models},
  journal      = {CoRR},
  volume       = {abs/2311.04378},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.04378},
  doi          = {10.48550/ARXIV.2311.04378},
  eprinttype    = {arXiv},
  eprint       = {2311.04378},
  timestamp    = {Tue, 14 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-04378.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseBCFK23,
  author       = {Giuseppe Ateniese and
                  Foteini Baldimtsi and
                  Matteo Campanelli and
                  Danilo Francati and
                  Ioanna Karantaidou},
  title        = {Advancing Scalability in Decentralized Storage: {A} Novel Approach
                  to Proof-of-Replication via Polynomial Evaluation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1569},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1569},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseBCFK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhangEFVAB23,
  author       = {Hanlin Zhang and
                  Benjamin L. Edelman and
                  Danilo Francati and
                  Daniele Venturi and
                  Giuseppe Ateniese and
                  Boaz Barak},
  title        = {Watermarks in the Sand: Impossibility of Strong Watermarking for Generative
                  Models},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1776},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1776},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhangEFVAB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PasquiniFAK23,
  author       = {Dario Pasquini and
                  Danilo Francati and
                  Giuseppe Ateniese and
                  Evgenios M. Kornaropoulos},
  title        = {Breach Extraction Attacks: Exposing and Addressing the Leakage in
                  Second Generation Compromised Credential Checking Services},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1848},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1848},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/PasquiniFAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/XiaoWCMA22,
  author       = {Bin Xiao and
                  Fan Wu and
                  Francesco Chiti and
                  Mohammad Hossein Manshaei and
                  Giuseppe Ateniese},
  title        = {Guest Editorial: Introduction to the Special Section on Security and
                  Privacy for {AI} Models and Applications},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {9},
  number       = {1},
  pages        = {171--172},
  year         = {2022},
  url          = {https://doi.org/10.1109/TNSE.2021.3133123},
  doi          = {10.1109/TNSE.2021.3133123},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnse/XiaoWCMA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PasquiniFA22,
  author       = {Dario Pasquini and
                  Danilo Francati and
                  Giuseppe Ateniese},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Eluding Secure Aggregation in Federated Learning via Model Inconsistency},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {2429--2443},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560557},
  doi          = {10.1145/3548606.3560557},
  timestamp    = {Sat, 17 Dec 2022 01:15:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PasquiniFA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2022,
  editor       = {Giuseppe Ateniese and
                  Daniele Venturi},
  title        = {Applied Cryptography and Network Security - 20th International Conference,
                  {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13269},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-09234-3},
  doi          = {10.1007/978-3-031-09234-3},
  isbn         = {978-3-031-09233-6},
  timestamp    = {Tue, 21 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AtenieseFNV21,
  author       = {Giuseppe Ateniese and
                  Danilo Francati and
                  David Nu{\~{n}}ez and
                  Daniele Venturi},
  title        = {Match Me if You Can: Matchmaking Encryption and Its Applications},
  journal      = {J. Cryptol.},
  volume       = {34},
  number       = {3},
  pages        = {16},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00145-021-09381-4},
  doi          = {10.1007/S00145-021-09381-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AtenieseFNV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/AtenieseFMV21,
  author       = {Giuseppe Ateniese and
                  Danilo Francati and
                  Bernardo Magri and
                  Daniele Venturi},
  title        = {Immunization against complete subversion without random oracles},
  journal      = {Theor. Comput. Sci.},
  volume       = {859},
  pages        = {1--36},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.tcs.2021.01.002},
  doi          = {10.1016/J.TCS.2021.01.002},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/AtenieseFMV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PasquiniAB21,
  author       = {Dario Pasquini and
                  Giuseppe Ateniese and
                  Massimo Bernaschi},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Unleashing the Tiger: Inference Attacks on Split Learning},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {2113--2129},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3485259},
  doi          = {10.1145/3460120.3485259},
  timestamp    = {Tue, 16 Nov 2021 12:59:46 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PasquiniAB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/PasquiniGABC21,
  author       = {Dario Pasquini and
                  Ankit Gangwal and
                  Giuseppe Ateniese and
                  Massimo Bernaschi and
                  Mauro Conti},
  title        = {Improving Password Guessing via Representation Learning},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {1382--1399},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00016},
  doi          = {10.1109/SP40001.2021.00016},
  timestamp    = {Thu, 21 Sep 2023 15:57:26 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/PasquiniGABC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/PasquiniCAB21,
  author       = {Dario Pasquini and
                  Marco Cianfriglia and
                  Giuseppe Ateniese and
                  Massimo Bernaschi},
  editor       = {Michael D. Bailey and
                  Rachel Greenstadt},
  title        = {Reducing Bias in Modeling Real-world Password Strength via Deep Learning
                  and Dynamic Dictionaries},
  booktitle    = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13,
                  2021},
  pages        = {821--838},
  publisher    = {{USENIX} Association},
  year         = {2021},
  url          = {https://www.usenix.org/conference/usenixsecurity21/presentation/pasquini},
  timestamp    = {Mon, 20 Nov 2023 08:57:49 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/PasquiniCAB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-07380,
  author       = {Dario Pasquini and
                  Danilo Francati and
                  Giuseppe Ateniese},
  title        = {Eluding Secure Aggregation in Federated Learning via Model Inconsistency},
  journal      = {CoRR},
  volume       = {abs/2111.07380},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.07380},
  eprinttype    = {arXiv},
  eprint       = {2111.07380},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-07380.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseCFPT21,
  author       = {Giuseppe Ateniese and
                  Long Chen and
                  Danilo Francati and
                  Dimitrios Papadopoulos and
                  Qiang Tang},
  title        = {Verifiable Capacity-bound Functions: {A} New Primitive from Kolmogorov
                  Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {162},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/162},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseCFPT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/AtenieseMV20,
  author       = {Giuseppe Ateniese and
                  Bernardo Magri and
                  Daniele Venturi},
  title        = {Subversion-resilient signatures: Definitions, constructions and applications},
  journal      = {Theor. Comput. Sci.},
  volume       = {820},
  pages        = {91--122},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.tcs.2020.03.021},
  doi          = {10.1016/J.TCS.2020.03.021},
  timestamp    = {Tue, 21 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/AtenieseMV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccsscc/Ateniese20,
  author       = {Giuseppe Ateniese},
  title        = {Is {AI} Taking Over the World? No, but It's Making it Less Private},
  booktitle    = {Proceedings of the 8th International Workshop on Security in Blockchain
                  and Cloud Computing, SBC@AsiaCCS 2020, Virtual Online Conference,
                  October 6, 2020},
  pages        = {1},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3384942.3406872},
  doi          = {10.1145/3384942.3406872},
  timestamp    = {Mon, 16 Nov 2020 15:55:53 +0100},
  biburl       = {https://dblp.org/rec/conf/asiaccsscc/Ateniese20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/LuzioFA20,
  author       = {Adriano Di Luzio and
                  Danilo Francati and
                  Giuseppe Ateniese},
  editor       = {Stephan Krenn and
                  Haya Schulmann and
                  Serge Vaudenay},
  title        = {Arcula: {A} Secure Hierarchical Deterministic Wallet for Multi-asset
                  Blockchains},
  booktitle    = {Cryptology and Network Security - 19th International Conference, {CANS}
                  2020, Vienna, Austria, December 14-16, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12579},
  pages        = {323--343},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65411-5\_16},
  doi          = {10.1007/978-3-030-65411-5\_16},
  timestamp    = {Tue, 17 Oct 2023 10:41:56 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/LuzioFA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/PasquiniAB20,
  author       = {Dario Pasquini and
                  Giuseppe Ateniese and
                  Massimo Bernaschi},
  editor       = {Liqun Chen and
                  Ninghui Li and
                  Kaitai Liang and
                  Steve A. Schneider},
  title        = {Interpretable Probabilistic Password Strength Meters via Deep Learning},
  booktitle    = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research
                  in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18,
                  2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12308},
  pages        = {502--522},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58951-6\_25},
  doi          = {10.1007/978-3-030-58951-6\_25},
  timestamp    = {Fri, 02 Jul 2021 20:12:27 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/PasquiniAB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AtenieseCET20,
  author       = {Giuseppe Ateniese and
                  Long Chen and
                  Mohammad Etemad and
                  Qiang Tang},
  title        = {Proof of Storage-Time: Efficiently Checking Continuous Data Availability},
  booktitle    = {27th Annual Network and Distributed System Security Symposium, {NDSS}
                  2020, San Diego, California, USA, February 23-26, 2020},
  publisher    = {The Internet Society},
  year         = {2020},
  url          = {https://www.ndss-symposium.org/ndss-paper/proof-of-storage-time-efficiently-checking-continuous-data-availability/},
  timestamp    = {Mon, 01 Feb 2021 08:42:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/AtenieseCET20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2020asia,
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269},
  doi          = {10.1145/3320269},
  isbn         = {978-1-4503-6750-9},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2020asia.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2004-07179,
  author       = {Dario Pasquini and
                  Giuseppe Ateniese and
                  Massimo Bernaschi},
  title        = {Interpretable Probabilistic Password Strength Meters via Deep Learning},
  journal      = {CoRR},
  volume       = {abs/2004.07179},
  year         = {2020},
  url          = {https://arxiv.org/abs/2004.07179},
  eprinttype    = {arXiv},
  eprint       = {2004.07179},
  timestamp    = {Tue, 21 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2004-07179.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-12269,
  author       = {Dario Pasquini and
                  Marco Cianfriglia and
                  Giuseppe Ateniese and
                  Massimo Bernaschi},
  title        = {Reducing Bias in Modeling Real-world Password Strength via Deep Learning
                  and Dynamic Dictionaries},
  journal      = {CoRR},
  volume       = {abs/2010.12269},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.12269},
  eprinttype    = {arXiv},
  eprint       = {2010.12269},
  timestamp    = {Tue, 27 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-12269.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-02670,
  author       = {Dario Pasquini and
                  Giuseppe Ateniese and
                  Massimo Bernaschi},
  title        = {Unleashing the Tiger: Inference Attacks on Split Learning},
  journal      = {CoRR},
  volume       = {abs/2012.02670},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.02670},
  eprinttype    = {arXiv},
  eprint       = {2012.02670},
  timestamp    = {Wed, 09 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-02670.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseCET20,
  author       = {Giuseppe Ateniese and
                  Long Chen and
                  Mohammad Etemad and
                  Qiang Tang},
  title        = {Proof of Storage-Time: Efficiently Checking Continuous Data Availability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {840},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/840},
  timestamp    = {Wed, 20 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseCET20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/HitajGAP19,
  author       = {Briland Hitaj and
                  Paolo Gasti and
                  Giuseppe Ateniese and
                  Fernando P{\'{e}}rez{-}Cruz},
  editor       = {Robert H. Deng and
                  Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and
                  Mart{\'{\i}}n Ochoa and
                  Moti Yung},
  title        = {PassGAN: {A} Deep Learning Approach for Password Guessing},
  booktitle    = {Applied Cryptography and Network Security - 17th International Conference,
                  {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11464},
  pages        = {217--237},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21568-2\_11},
  doi          = {10.1007/978-3-030-21568-2\_11},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/HitajGAP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AtenieseFM019,
  author       = {Giuseppe Ateniese and
                  Danilo Francati and
                  Bernardo Magri and
                  Daniele Venturi},
  editor       = {Robert H. Deng and
                  Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and
                  Mart{\'{\i}}n Ochoa and
                  Moti Yung},
  title        = {Public Immunization Against Complete Subversion Without Random Oracles},
  booktitle    = {Applied Cryptography and Network Security - 17th International Conference,
                  {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11464},
  pages        = {465--485},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21568-2\_23},
  doi          = {10.1007/978-3-030-21568-2\_23},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/AtenieseFM019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AtenieseFN019,
  author       = {Giuseppe Ateniese and
                  Danilo Francati and
                  David Nu{\~{n}}ez and
                  Daniele Venturi},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Match Me if You Can: Matchmaking Encryption and Its Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11693},
  pages        = {701--731},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26951-7\_24},
  doi          = {10.1007/978-3-030-26951-7\_24},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/AtenieseFN019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-05919,
  author       = {Adriano Di Luzio and
                  Danilo Francati and
                  Giuseppe Ateniese},
  title        = {Arcula: {A} Secure Hierarchical Deterministic Wallet for Multi-asset
                  Blockchains},
  journal      = {CoRR},
  volume       = {abs/1906.05919},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.05919},
  eprinttype    = {arXiv},
  eprint       = {1906.05919},
  timestamp    = {Mon, 24 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-05919.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-04232,
  author       = {Dario Pasquini and
                  Ankit Gangwal and
                  Giuseppe Ateniese and
                  Massimo Bernaschi and
                  Mauro Conti},
  title        = {Improving Password Guessing via Representation Learning},
  journal      = {CoRR},
  volume       = {abs/1910.04232},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.04232},
  eprinttype    = {arXiv},
  eprint       = {1910.04232},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-04232.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-08515,
  author       = {Danilo Francati and
                  Giuseppe Ateniese and
                  Abdoulaye Faye and
                  Andrea Maria Milazzo and
                  Angelo Massimo Perillo and
                  Luca Schiatti and
                  Giuseppe Giordano},
  title        = {Audita: {A} Blockchain-based Auditing Framework for Off-chain Storage},
  journal      = {CoRR},
  volume       = {abs/1911.08515},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.08515},
  eprinttype    = {arXiv},
  eprint       = {1911.08515},
  timestamp    = {Tue, 03 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-08515.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuzioFA19,
  author       = {Adriano Di Luzio and
                  Danilo Francati and
                  Giuseppe Ateniese},
  title        = {Arcula: {A} Secure Hierarchical Deterministic Wallet for Multi-asset
                  Blockchains},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {704},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/704},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuzioFA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseFMV19,
  author       = {Giuseppe Ateniese and
                  Danilo Francati and
                  Bernardo Magri and
                  Daniele Venturi},
  title        = {Immunization against Complete Subversion without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1173},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1173},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseFMV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PasquiniGABC19,
  author       = {Dario Pasquini and
                  Ankit Gangwal and
                  Giuseppe Ateniese and
                  Massimo Bernaschi and
                  Mauro Conti},
  title        = {Improving Password Guessing via Representation Learning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1188},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1188},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PasquiniGABC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FrancatiAFMPSG19,
  author       = {Danilo Francati and
                  Giuseppe Ateniese and
                  Abdoulaye Faye and
                  Andrea Maria Milazzo and
                  Angelo Massimo Perillo and
                  Luca Schiatti and
                  Giuseppe Giordano},
  title        = {Audita: {A} Blockchain-based Auditing Framework for Off-chain Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1345},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1345},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FrancatiAFMPSG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/AtenieseFM18,
  author       = {Giuseppe Ateniese and
                  Katharina Fech and
                  Bernardo Magri},
  editor       = {Debrup Chakraborty and
                  Tetsu Iwata},
  title        = {A Family of {FDH} Signature Schemes Based on the Quadratic Residuosity
                  Assumption},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2018 - 19th International Conference
                  on Cryptology in India, New Delhi, India, December 9-12, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11356},
  pages        = {248--262},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05378-9\_14},
  doi          = {10.1007/978-3-030-05378-9\_14},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/AtenieseFM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/AtenieseKMT018,
  author       = {Giuseppe Ateniese and
                  Aggelos Kiayias and
                  Bernardo Magri and
                  Yiannis Tselekounis and
                  Daniele Venturi},
  editor       = {Joonsang Baek and
                  Willy Susilo and
                  Jongkil Kim},
  title        = {Secure Outsourcing of Cryptographic Circuits Manufacturing},
  booktitle    = {Provable Security - 12th International Conference, ProvSec 2018, Jeju,
                  South Korea, October 25-28, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11192},
  pages        = {75--93},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01446-9\_5},
  doi          = {10.1007/978-3-030-01446-9\_5},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/AtenieseKMT018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseFNV18,
  author       = {Giuseppe Ateniese and
                  Danilo Francati and
                  David Nu{\~{n}}ez and
                  Daniele Venturi},
  title        = {Match Me if You Can: Matchmaking Encryption and its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1094},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1094},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseFNV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tecs/AtenieseBCPS17,
  author       = {Giuseppe Ateniese and
                  Giuseppe Bianchi and
                  Angelo T. Capossele and
                  Chiara Petrioli and
                  Dora Spenza},
  title        = {Low-Cost Standard Signatures for Energy-Harvesting Wireless Sensor
                  Networks},
  journal      = {{ACM} Trans. Embed. Comput. Syst.},
  volume       = {16},
  number       = {3},
  pages        = {64:1--64:23},
  year         = {2017},
  url          = {https://doi.org/10.1145/2994603},
  doi          = {10.1145/2994603},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tecs/AtenieseBCPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuAAHSDM17,
  author       = {Yong Yu and
                  Man Ho Au and
                  Giuseppe Ateniese and
                  Xinyi Huang and
                  Willy Susilo and
                  Yuanshun Dai and
                  Geyong Min},
  title        = {Identity-Based Remote Data Integrity Checking With Perfect Data Privacy
                  Preserving for Cloud Storage},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {4},
  pages        = {767--778},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2016.2615853},
  doi          = {10.1109/TIFS.2016.2615853},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/YuAAHSDM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AtenieseGLPPT17,
  author       = {Giuseppe Ateniese and
                  Michael T. Goodrich and
                  Vassilios Lekakis and
                  Charalampos Papamanthou and
                  Evripidis Paraskevas and
                  Roberto Tamassia},
  editor       = {Dieter Gollmann and
                  Atsuko Miyaji and
                  Hiroaki Kikuchi},
  title        = {Accountable Storage},
  booktitle    = {Applied Cryptography and Network Security - 15th International Conference,
                  {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10355},
  pages        = {623--644},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61204-1\_31},
  doi          = {10.1007/978-3-319-61204-1\_31},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/AtenieseGLPPT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HitajAP17,
  author       = {Briland Hitaj and
                  Giuseppe Ateniese and
                  Fernando P{\'{e}}rez{-}Cruz},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Deep Models Under the {GAN:} Information Leakage from Collaborative
                  Deep Learning},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {603--618},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134012},
  doi          = {10.1145/3133956.3134012},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HitajAP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/AtenieseM0A17,
  author       = {Giuseppe Ateniese and
                  Bernardo Magri and
                  Daniele Venturi and
                  Ewerton R. Andrade},
  title        = {Redactable Blockchain - or - Rewriting History in Bitcoin and Friends},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2017, Paris, France, April 26-28, 2017},
  pages        = {111--126},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSP.2017.37},
  doi          = {10.1109/EUROSP.2017.37},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/AtenieseM0A17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/AtenieseBCPS17,
  author       = {Giuseppe Ateniese and
                  Giuseppe Bianchi and
                  Angelo T. Capossele and
                  Chiara Petrioli and
                  Dora Spenza},
  title        = {{HELIOS:} Outsourcing of Security Operations in Green Wireless Sensor
                  Networks},
  booktitle    = {85th {IEEE} Vehicular Technology Conference, {VTC} Spring 2017, Sydney,
                  Australia, June 4-7, 2017},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/VTCSpring.2017.8108500},
  doi          = {10.1109/VTCSPRING.2017.8108500},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/AtenieseBCPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HitajAP17,
  author       = {Briland Hitaj and
                  Giuseppe Ateniese and
                  Fernando P{\'{e}}rez{-}Cruz},
  title        = {Deep Models Under the {GAN:} Information Leakage from Collaborative
                  Deep Learning},
  journal      = {CoRR},
  volume       = {abs/1702.07464},
  year         = {2017},
  url          = {http://arxiv.org/abs/1702.07464},
  eprinttype    = {arXiv},
  eprint       = {1702.07464},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HitajAP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-00440,
  author       = {Briland Hitaj and
                  Paolo Gasti and
                  Giuseppe Ateniese and
                  Fernando P{\'{e}}rez{-}Cruz},
  title        = {PassGAN: {A} Deep Learning Approach for Password Guessing},
  journal      = {CoRR},
  volume       = {abs/1709.00440},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.00440},
  eprinttype    = {arXiv},
  eprint       = {1709.00440},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-00440.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/AtenieseDDV16,
  author       = {Giuseppe Ateniese and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Ivan Damg{\aa}rd and
                  Daniele Venturi},
  title        = {Entangled cloud storage},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {62},
  pages        = {104--118},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.future.2016.01.008},
  doi          = {10.1016/J.FUTURE.2016.01.008},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/AtenieseDDV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KruppSSFAN16,
  author       = {Johannes Krupp and
                  Dominique Schr{\"{o}}der and
                  Mark Simkin and
                  Dario Fiore and
                  Giuseppe Ateniese and
                  Stefan N{\"{u}}rnberger},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {Nearly Optimal Verifiable Data Streaming},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  pages        = {417--445},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7\_16},
  doi          = {10.1007/978-3-662-49384-7\_16},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KruppSSFAN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseKMTV16,
  author       = {Giuseppe Ateniese and
                  Aggelos Kiayias and
                  Bernardo Magri and
                  Yiannis Tselekounis and
                  Daniele Venturi},
  title        = {Secure Outsourcing of Circuit Manufacturing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {527},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/527},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseKMTV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseMVA16,
  author       = {Giuseppe Ateniese and
                  Bernardo Magri and
                  Daniele Venturi and
                  Ewerton R. Andrade},
  title        = {Redactable Blockchain - or - Rewriting History in Bitcoin and Friends},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {757},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/757},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseMVA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/AtenieseMSVVF15,
  author       = {Giuseppe Ateniese and
                  Luigi V. Mancini and
                  Angelo Spognardi and
                  Antonio Villani and
                  Domenico Vitali and
                  Giovanni Felici},
  title        = {Hacking smart machines with smarter ones: How to extract meaningful
                  data from machine learning classifiers},
  journal      = {Int. J. Secur. Networks},
  volume       = {10},
  number       = {3},
  pages        = {137--150},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJSN.2015.071829},
  doi          = {10.1504/IJSN.2015.071829},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/AtenieseMSVVF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/YuMA15,
  author       = {Yong Yu and
                  Yi Mu and
                  Giuseppe Ateniese},
  title        = {Recent Advances in Security and Privacy in Big Data},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {21},
  number       = {3},
  pages        = {365--368},
  year         = {2015},
  url          = {http://www.jucs.org/jucs\_21\_3/recent\_advances\_in\_security},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jucs/YuMA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AtenieseDDV15,
  author       = {Giuseppe Ateniese and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Ivan Damg{\aa}rd and
                  Daniele Venturi},
  editor       = {Feng Bao and
                  Steven Miller and
                  Sherman S. M. Chow and
                  Danfeng Yao},
  title        = {Entangled Encodings and Data Entanglement},
  booktitle    = {Proceedings of the 3rd International Workshop on Security in Cloud
                  Computing, SCC@ASIACCS '15, Singapore, Republic of Singapore, April
                  14, 2015},
  pages        = {3--12},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2732516.2732524},
  doi          = {10.1145/2732516.2732524},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AtenieseDDV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AtenieseMV15,
  author       = {Giuseppe Ateniese and
                  Bernardo Magri and
                  Daniele Venturi},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Subversion-Resilient Signature Schemes},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {364--375},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813635},
  doi          = {10.1145/2810103.2813635},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AtenieseMV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/AtenieseFK15,
  author       = {Giuseppe Ateniese and
                  Antonio Faonio and
                  Seny Kamara},
  editor       = {Jens Groth},
  title        = {Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs
                  of Storage},
  booktitle    = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
                  2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9496},
  pages        = {311--328},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27239-9\_19},
  doi          = {10.1007/978-3-319-27239-9\_19},
  timestamp    = {Wed, 18 Mar 2020 16:00:58 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/AtenieseFK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/AtenieseHMVV15,
  author       = {Giuseppe Ateniese and
                  Briland Hitaj and
                  Luigi Vincenzo Mancini and
                  Nino Vincenzo Verde and
                  Antonio Villani},
  editor       = {Meikang Qiu and
                  Shouhuai Xu and
                  Moti Yung and
                  Haibo Zhang},
  title        = {No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based
                  Encrypted Traffic to Track a User's Position},
  booktitle    = {Network and System Security - 9th International Conference, {NSS}
                  2015, New York, NY, USA, November 3-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9408},
  pages        = {46--59},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25645-0\_4},
  doi          = {10.1007/978-3-319-25645-0\_4},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/AtenieseHMVV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/WilsonA15,
  author       = {Duane Wilson and
                  Giuseppe Ateniese},
  editor       = {Meikang Qiu and
                  Shouhuai Xu and
                  Moti Yung and
                  Haibo Zhang},
  title        = {From Pretty Good to Great: Enhancing {PGP} Using Bitcoin and the Blockchain},
  booktitle    = {Network and System Security - 9th International Conference, {NSS}
                  2015, New York, NY, USA, November 3-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9408},
  pages        = {368--375},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25645-0\_25},
  doi          = {10.1007/978-3-319-25645-0\_25},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/WilsonA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AtenieseHMVV15,
  author       = {Giuseppe Ateniese and
                  Briland Hitaj and
                  Luigi V. Mancini and
                  Nino Vincenzo Verde and
                  Antonio Villani},
  title        = {No Place to Hide that Bytes won't Reveal: Sniffing Location-Based
                  Encrypted Traffic to Track User Position},
  journal      = {CoRR},
  volume       = {abs/1505.07774},
  year         = {2015},
  url          = {http://arxiv.org/abs/1505.07774},
  eprinttype    = {arXiv},
  eprint       = {1505.07774},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AtenieseHMVV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WilsonA15,
  author       = {Duane Wilson and
                  Giuseppe Ateniese},
  title        = {From Pretty Good To Great: Enhancing {PGP} using Bitcoin and the Blockchain},
  journal      = {CoRR},
  volume       = {abs/1508.04868},
  year         = {2015},
  url          = {http://arxiv.org/abs/1508.04868},
  eprinttype    = {arXiv},
  eprint       = {1508.04868},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WilsonA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KruppSSFAN15,
  author       = {Johannes Krupp and
                  Dominique Schr{\"{o}}der and
                  Mark Simkin and
                  Dario Fiore and
                  Giuseppe Ateniese and
                  Stefan N{\"{u}}rnberger},
  title        = {Nearly Optimal Verifiable Data Streaming (Full Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {333},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/333},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KruppSSFAN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseMV15,
  author       = {Giuseppe Ateniese and
                  Bernardo Magri and
                  Daniele Venturi},
  title        = {Subversion-Resilient Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {517},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/517},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseMV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseFK15,
  author       = {Giuseppe Ateniese and
                  Antonio Faonio and
                  Seny Kamara},
  title        = {Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs
                  of Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {920},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/920},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseFK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/AtenieseBBL14,
  author       = {Giuseppe Ateniese and
                  Roberto Baldoni and
                  Silvia Bonomi and
                  Giuseppe Antonio Di Luna},
  title        = {Fault-tolerant oblivious assignment with m slots in synchronous systems},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {74},
  number       = {7},
  pages        = {2648--2661},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jpdc.2014.02.008},
  doi          = {10.1016/J.JPDC.2014.02.008},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpdc/AtenieseBBL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AtenieseFMM14,
  author       = {Giuseppe Ateniese and
                  Antonio Faonio and
                  Bernardo Magri and
                  Breno de Medeiros},
  editor       = {Ioana Boureanu and
                  Philippe Owesarski and
                  Serge Vaudenay},
  title        = {Certified Bitcoins},
  booktitle    = {Applied Cryptography and Network Security - 12th International Conference,
                  {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8479},
  pages        = {80--96},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07536-5\_6},
  doi          = {10.1007/978-3-319-07536-5\_6},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/AtenieseFMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/VerdeAGMS14,
  author       = {Nino Vincenzo Verde and
                  Giuseppe Ateniese and
                  Emanuele Gabrielli and
                  Luigi Vincenzo Mancini and
                  Angelo Spognardi},
  title        = {No NAT'd User Left Behind: Fingerprinting Users behind {NAT} from
                  NetFlow Records Alone},
  booktitle    = {{IEEE} 34th International Conference on Distributed Computing Systems,
                  {ICDCS} 2014, Madrid, Spain, June 30 - July 3, 2014},
  pages        = {218--227},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICDCS.2014.30},
  doi          = {10.1109/ICDCS.2014.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/VerdeAGMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ZhengXA14,
  author       = {Qingji Zheng and
                  Shouhuai Xu and
                  Giuseppe Ateniese},
  title        = {{VABKS:} Verifiable attribute-based keyword search over outsourced
                  encrypted data},
  booktitle    = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014,
                  Toronto, Canada, April 27 - May 2, 2014},
  pages        = {522--530},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/INFOCOM.2014.6847976},
  doi          = {10.1109/INFOCOM.2014.6847976},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/ZhengXA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/WilsonA14,
  author       = {Duane C. Wilson and
                  Giuseppe Ateniese},
  editor       = {Sherman S. M. Chow and
                  Jan Camenisch and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {"To Share or not to Share" in Client-Side Encrypted Clouds},
  booktitle    = {Information Security - 17th International Conference, {ISC} 2014,
                  Hong Kong, China, October 12-14, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8783},
  pages        = {401--412},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13257-0\_24},
  doi          = {10.1007/978-3-319-13257-0\_24},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/WilsonA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/AtenieseBFG14,
  author       = {Giuseppe Ateniese and
                  Ilario Bonacina and
                  Antonio Faonio and
                  Nicola Galesi},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Proofs of Space: When Space Is of the Essence},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {538--557},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_31},
  doi          = {10.1007/978-3-319-10879-7\_31},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/AtenieseBFG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/VerdeAGMS14,
  author       = {Nino Vincenzo Verde and
                  Giuseppe Ateniese and
                  Emanuele Gabrielli and
                  Luigi Vincenzo Mancini and
                  Angelo Spognardi},
  title        = {No NAT'd User left Behind: Fingerprinting Users behind {NAT} from
                  NetFlow Records alone},
  journal      = {CoRR},
  volume       = {abs/1402.1940},
  year         = {2014},
  url          = {http://arxiv.org/abs/1402.1940},
  eprinttype    = {arXiv},
  eprint       = {1402.1940},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/VerdeAGMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/WilsonA14,
  author       = {Duane Wilson and
                  Giuseppe Ateniese},
  title        = {To Share or Not to Share in Client-Side Encrypted Clouds},
  journal      = {CoRR},
  volume       = {abs/1404.2697},
  year         = {2014},
  url          = {http://arxiv.org/abs/1404.2697},
  eprinttype    = {arXiv},
  eprint       = {1404.2697},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/WilsonA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseFMM14,
  author       = {Giuseppe Ateniese and
                  Antonio Faonio and
                  Bernardo Magri and
                  Breno de Medeiros},
  title        = {Certified Bitcoins},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {76},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/076},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseFMM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseGLPPT14,
  author       = {Giuseppe Ateniese and
                  Michael T. Goodrich and
                  Vassilios Lekakis and
                  Charalampos Papamanthou and
                  Evripidis Paraskevas and
                  Roberto Tamassia},
  title        = {Accountable Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {886},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/886},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseGLPPT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/AtenieseSFM13,
  author       = {Giuseppe Ateniese and
                  Alfredo De Santis and
                  Anna Lisa Ferrara and
                  Barbara Masucci},
  title        = {A note on time-bound hierarchical key assignment schemes},
  journal      = {Inf. Process. Lett.},
  volume       = {113},
  number       = {5-6},
  pages        = {151--155},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ipl.2013.01.006},
  doi          = {10.1016/J.IPL.2013.01.006},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/AtenieseSFM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AtenieseBCP13,
  author       = {Giuseppe Ateniese and
                  Giuseppe Bianchi and
                  Angelo Capossele and
                  Chiara Petrioli},
  title        = {Low-cost Standard Signatures in Wireless Sensor Networks: {A} Case
                  for Reviving Pre-computation Techniques?},
  booktitle    = {20th Annual Network and Distributed System Security Symposium, {NDSS}
                  2013, San Diego, California, USA, February 24-27, 2013},
  publisher    = {The Internet Society},
  year         = {2013},
  url          = {https://www.ndss-symposium.org/ndss2013/low-cost-standard-signatures-wireless-sensor-networks-case-reviving-pre-computation-techniques},
  timestamp    = {Mon, 01 Feb 2021 08:42:13 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/AtenieseBCP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AtenieseFMSVV13,
  author       = {Giuseppe Ateniese and
                  Giovanni Felici and
                  Luigi V. Mancini and
                  Angelo Spognardi and
                  Antonio Villani and
                  Domenico Vitali},
  title        = {Hacking Smart Machines with Smarter Ones: How to Extract Meaningful
                  Data from Machine Learning Classifiers},
  journal      = {CoRR},
  volume       = {abs/1306.4447},
  year         = {2013},
  url          = {http://arxiv.org/abs/1306.4447},
  eprinttype    = {arXiv},
  eprint       = {1306.4447},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/AtenieseFMSVV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhengXA13,
  author       = {Qingji Zheng and
                  Shouhuai Xu and
                  Giuseppe Ateniese},
  title        = {{VABKS:} Verifiable Attribute-based Keyword Search over Outsourced
                  Encrypted Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {462},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/462},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhengXA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseBFG13,
  author       = {Giuseppe Ateniese and
                  Ilario Bonacina and
                  Antonio Faonio and
                  Nicola Galesi},
  title        = {Proofs of Space: When Space is of the Essence},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {805},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/805},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseBFG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AtenieseSFM12,
  author       = {Giuseppe Ateniese and
                  Alfredo De Santis and
                  Anna Lisa Ferrara and
                  Barbara Masucci},
  title        = {Provably-Secure Time-Bound Hierarchical Key Assignment Schemes},
  journal      = {J. Cryptol.},
  volume       = {25},
  number       = {2},
  pages        = {243--270},
  year         = {2012},
  url          = {https://doi.org/10.1007/s00145-010-9094-6},
  doi          = {10.1007/S00145-010-9094-6},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AtenieseSFM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhengXA12,
  author       = {Qingji Zheng and
                  Shouhuai Xu and
                  Giuseppe Ateniese},
  editor       = {Ting Yu and
                  Srdjan Capkun and
                  Seny Kamara},
  title        = {Efficient query integrity for outsourced dynamic databases},
  booktitle    = {Proceedings of the 2012 {ACM} Workshop on Cloud computing security,
                  {CCSW} 2012, Raleigh, NC, USA, October 19, 2012},
  pages        = {71--82},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2381913.2381927},
  doi          = {10.1145/2381913.2381927},
  timestamp    = {Tue, 12 Apr 2022 13:28:49 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhengXA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/FilardoA12,
  author       = {Nathaniel Wesley Filardo and
                  Giuseppe Ateniese},
  editor       = {Mark Dermot Ryan and
                  Ben Smyth and
                  Guilin Wang},
  title        = {High-Entropy Visual Identification for Touch Screen Devices},
  booktitle    = {Information Security Practice and Experience - 8th International Conference,
                  {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7232},
  pages        = {182--198},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29101-2\_13},
  doi          = {10.1007/978-3-642-29101-2\_13},
  timestamp    = {Wed, 07 Dec 2022 23:12:45 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/FilardoA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sss/AtenieseBBL12,
  author       = {Giuseppe Ateniese and
                  Roberto Baldoni and
                  Silvia Bonomi and
                  Giuseppe Antonio Di Luna},
  editor       = {Andr{\'{e}}a W. Richa and
                  Christian Scheideler},
  title        = {Oblivious Assignment with m Slots},
  booktitle    = {Stabilization, Safety, and Security of Distributed Systems - 14th
                  International Symposium, {SSS} 2012, Toronto, Canada, October 1-4,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7596},
  pages        = {187--201},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33536-5\_19},
  doi          = {10.1007/978-3-642-33536-5\_19},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sss/AtenieseBBL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZhengXA12,
  author       = {Qingji Zheng and
                  Shouhuai Xu and
                  Giuseppe Ateniese},
  title        = {Efficient Query Integrity for Outsourced Dynamic Databases},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {493},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/493},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZhengXA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseDDV12,
  author       = {Giuseppe Ateniese and
                  {\"{O}}zg{\"{u}}r Dagdelen and
                  Ivan Damg{\aa}rd and
                  Daniele Venturi},
  title        = {Entangled Cloud Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {511},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/511},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseDDV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AtenieseBCHKKPS11,
  author       = {Giuseppe Ateniese and
                  Randal C. Burns and
                  Reza Curtmola and
                  Joseph Herring and
                  Osama Khan and
                  Lea Kissner and
                  Zachary N. J. Peterson and
                  Dawn Song},
  title        = {Remote data checking using provable data possession},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {1},
  pages        = {12:1--12:34},
  year         = {2011},
  url          = {https://doi.org/10.1145/1952982.1952994},
  doi          = {10.1145/1952982.1952994},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AtenieseBCHKKPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AtenieseCT11,
  author       = {Giuseppe Ateniese and
                  Emiliano De Cristofaro and
                  Gene Tsudik},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {(If) Size Matters: Size-Hiding Private Set Intersection},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {156--173},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_10},
  doi          = {10.1007/978-3-642-19379-8\_10},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AtenieseCT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FilardoA11,
  author       = {Nathaniel Wesley Filardo and
                  Giuseppe Ateniese},
  title        = {High-Entropy Visual Identification for Touch Screen Devices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {359},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/359},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FilardoA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/StantonMBA10,
  author       = {Paul T. Stanton and
                  Benjamin McKeown and
                  Randal C. Burns and
                  Giuseppe Ateniese},
  title        = {FastAD: an authenticated directory for billions of objects},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {44},
  number       = {1},
  pages        = {45--49},
  year         = {2010},
  url          = {https://doi.org/10.1145/1740390.1740401},
  doi          = {10.1145/1740390.1740401},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigops/StantonMBA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenCAB10,
  author       = {Bo Chen and
                  Reza Curtmola and
                  Giuseppe Ateniese and
                  Randal C. Burns},
  editor       = {Adrian Perrig and
                  Radu Sion},
  title        = {Remote data checking for network coding-based distributed storage
                  systems},
  booktitle    = {Proceedings of the 2nd {ACM} Cloud Computing Security Workshop, {CCSW}
                  2010, Chicago, IL, USA, October 8, 2010},
  pages        = {31--42},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866835.1866842},
  doi          = {10.1145/1866835.1866842},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ChenCAB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/GastiAB10,
  author       = {Paolo Gasti and
                  Giuseppe Ateniese and
                  Marina Blanton},
  editor       = {Ehab Al{-}Shaer and
                  Keith B. Frikken},
  title        = {Deniable cloud storage: sharing files via public-key deniability},
  booktitle    = {Proceedings of the 2010 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2010, Chicago, Illinois, USA, October 4, 2010},
  pages        = {31--42},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866919.1866925},
  doi          = {10.1145/1866919.1866925},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/GastiAB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseCT10,
  author       = {Giuseppe Ateniese and
                  Emiliano De Cristofaro and
                  Gene Tsudik},
  title        = {(If) Size Matters: Size-Hiding Private Set Intersection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {220},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/220},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseCT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/AtenieseCJT09,
  author       = {Giuseppe Ateniese and
                  Jan Camenisch and
                  Marc Joye and
                  Gene Tsudik},
  title        = {Remarks on ''Analysis of one popular group signature scheme'' in Asiacrypt
                  2006},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {4},
  pages        = {320--322},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJACT.2009.028030},
  doi          = {10.1504/IJACT.2009.028030},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/AtenieseCJT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AtenieseKK09,
  author       = {Giuseppe Ateniese and
                  Seny Kamara and
                  Jonathan Katz},
  editor       = {Mitsuru Matsui},
  title        = {Proofs of Storage from Homomorphic Identification Protocols},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {319--333},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_19},
  doi          = {10.1007/978-3-642-10366-7\_19},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AtenieseKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AtenieseG09,
  author       = {Giuseppe Ateniese and
                  Paolo Gasti},
  editor       = {Marc Fischlin},
  title        = {Universally Anonymous {IBE} Based on the Quadratic Residuosity Assumption},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at
                  the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5473},
  pages        = {32--47},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00862-7\_3},
  doi          = {10.1007/978-3-642-00862-7\_3},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/AtenieseG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AtenieseBH09,
  author       = {Giuseppe Ateniese and
                  Karyn Benson and
                  Susan Hohenberger},
  editor       = {Marc Fischlin},
  title        = {Key-Private Proxy Re-encryption},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at
                  the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5473},
  pages        = {279--294},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00862-7\_19},
  doi          = {10.1007/978-3-642-00862-7\_19},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/AtenieseBH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseG09,
  author       = {Giuseppe Ateniese and
                  Paolo Gasti},
  title        = {Universally Anonymous {IBE} based on the Quadratic Residuosity Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {280},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/280},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/CurtmolaKBA08,
  author       = {Reza Curtmola and
                  Osama Khan and
                  Randal C. Burns and
                  Giuseppe Ateniese},
  title        = {{MR-PDP:} Multiple-Replica Provable Data Possession},
  booktitle    = {28th {IEEE} International Conference on Distributed Computing Systems
                  {(ICDCS} 2008), 17-20 June 2008, Beijing, China},
  pages        = {411--420},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICDCS.2008.68},
  doi          = {10.1109/ICDCS.2008.68},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/CurtmolaKBA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/AteniesePMT08,
  author       = {Giuseppe Ateniese and
                  Roberto Di Pietro and
                  Luigi V. Mancini and
                  Gene Tsudik},
  editor       = {Albert Levi and
                  Peng Liu and
                  Refik Molva},
  title        = {Scalable and efficient provable data possession},
  booktitle    = {4th International {ICST} Conference on Security and Privacy in Communication
                  Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008},
  pages        = {9},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1460877.1460889},
  doi          = {10.1145/1460877.1460889},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/AteniesePMT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AteniesePMT08,
  author       = {Giuseppe Ateniese and
                  Roberto Di Pietro and
                  Luigi V. Mancini and
                  Gene Tsudik},
  title        = {Scalable and Efficient Provable Data Possession},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {114},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/114},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AteniesePMT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseBH08,
  author       = {Giuseppe Ateniese and
                  Karyn Benson and
                  Susan Hohenberger},
  title        = {Key-Private Proxy Re-Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {463},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/463},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseBH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/GreenA07,
  author       = {Matthew Green and
                  Giuseppe Ateniese},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Identity-Based Proxy Re-encryption},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {288--306},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_19},
  doi          = {10.1007/978-3-540-72738-5\_19},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/GreenA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AtenieseBCHKPS07,
  author       = {Giuseppe Ateniese and
                  Randal C. Burns and
                  Reza Curtmola and
                  Joseph Herring and
                  Lea Kissner and
                  Zachary N. J. Peterson and
                  Dawn Xiaodong Song},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Provable data possession at untrusted stores},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {598--609},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315318},
  doi          = {10.1145/1315245.1315318},
  timestamp    = {Tue, 10 Nov 2020 20:00:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AtenieseBCHKPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fast/PetersonBAB07,
  author       = {Zachary N. J. Peterson and
                  Randal C. Burns and
                  Giuseppe Ateniese and
                  Stephen Bono},
  editor       = {Andrea C. Arpaci{-}Dusseau and
                  Remzi H. Arpaci{-}Dusseau},
  title        = {Design and Implementation of Verifiable Audit Trails for a Versioning
                  File System},
  booktitle    = {5th {USENIX} Conference on File and Storage Technologies, {FAST} 2007,
                  February 13-16, 2007, San Jose, CA, {USA}},
  pages        = {93--106},
  publisher    = {{USENIX}},
  year         = {2007},
  url          = {http://www.usenix.org/events/fast07/tech/peterson.html},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fast/PetersonBAB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AtenieseKB07,
  author       = {Giuseppe Ateniese and
                  Jonathan Kirsch and
                  Marina Blanton},
  title        = {Secret Handshakes with Dynamic and Fuzzy Matching},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2007, San Diego, California, USA, 28th February - 2nd March
                  2007},
  publisher    = {The Internet Society},
  year         = {2007},
  url          = {https://www.ndss-symposium.org/ndss2007/secret-handshakes-dynamic-and-fuzzy-matching/},
  timestamp    = {Mon, 01 Feb 2021 08:42:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/AtenieseKB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseBCHKPS07,
  author       = {Giuseppe Ateniese and
                  Randal C. Burns and
                  Reza Curtmola and
                  Joseph Herring and
                  Lea Kissner and
                  Zachary N. J. Peterson and
                  Dawn Song},
  title        = {Provable Data Possession at Untrusted Stores},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {202},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/202},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseBCHKPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AtenieseFGH06,
  author       = {Giuseppe Ateniese and
                  Kevin Fu and
                  Matthew Green and
                  Susan Hohenberger},
  title        = {Improved proxy re-encryption schemes with applications to secure distributed
                  storage},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {9},
  number       = {1},
  pages        = {1--30},
  year         = {2006},
  url          = {https://doi.org/10.1145/1127345.1127346},
  doi          = {10.1145/1127345.1127346},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/AtenieseFGH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/AtenieseRS06,
  author       = {Giuseppe Ateniese and
                  Chris Riley and
                  Christian Scheideler},
  title        = {Survivable Monitoring in Dynamic Networks},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {5},
  number       = {9},
  pages        = {1242--1254},
  year         = {2006},
  url          = {https://doi.org/10.1109/TMC.2006.138},
  doi          = {10.1109/TMC.2006.138},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/AtenieseRS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AtenieseSFM06,
  author       = {Giuseppe Ateniese and
                  Alfredo De Santis and
                  Anna Lisa Ferrara and
                  Barbara Masucci},
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {Provably-secure time-bound hierarchical key assignment schemes},
  booktitle    = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  pages        = {288--297},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405.1180441},
  doi          = {10.1145/1180405.1180441},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AtenieseSFM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseSFM06,
  author       = {Giuseppe Ateniese and
                  Alfredo De Santis and
                  Anna Lisa Ferrara and
                  Barbara Masucci},
  title        = {Provably-Secure Time-Bound Hierarchical Key Assignment Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {225},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/225},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseSFM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseCJT06,
  author       = {Giuseppe Ateniese and
                  Jan Camenisch and
                  Marc Joye and
                  Gene Tsudik},
  title        = {Remarks on "Analysis of One Popular Group Signature Scheme"
                  in Asiacrypt 2006},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {464},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/464},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseCJT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GreenA06,
  author       = {Matthew Green and
                  Giuseppe Ateniese},
  title        = {Identity-Based Proxy Re-encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {473},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/473},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GreenA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/CurtmolaSA05,
  author       = {Reza Curtmola and
                  Aniello Del Sorbo and
                  Giuseppe Ateniese},
  editor       = {Yvo Desmedt and
                  Huaxiong Wang and
                  Yi Mu and
                  Yongqing Li},
  title        = {On the Performance and Analysis of {DNS} Security Extensions},
  booktitle    = {Cryptology and Network Security, 4th International Conference, {CANS}
                  2005, Xiamen, China, December 14-16, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3810},
  pages        = {288--303},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11599371\_24},
  doi          = {10.1007/11599371\_24},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/CurtmolaSA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AtenieseCM05,
  author       = {Giuseppe Ateniese and
                  Jan Camenisch and
                  Breno de Medeiros},
  editor       = {Vijay Atluri and
                  Catherine Meadows and
                  Ari Juels},
  title        = {Untraceable {RFID} tags via insubvertible encryption},
  booktitle    = {Proceedings of the 12th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  pages        = {92--101},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102120.1102134},
  doi          = {10.1145/1102120.1102134},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AtenieseCM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AtenieseH05,
  author       = {Giuseppe Ateniese and
                  Susan Hohenberger},
  editor       = {Vijay Atluri and
                  Catherine Meadows and
                  Ari Juels},
  title        = {Proxy re-signatures: new definitions, algorithms, and applications},
  booktitle    = {Proceedings of the 12th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  pages        = {310--319},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102120.1102161},
  doi          = {10.1145/1102120.1102161},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AtenieseH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AtenieseCMT05,
  author       = {Giuseppe Ateniese and
                  Daniel H. Chou and
                  Breno de Medeiros and
                  Gene Tsudik},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Sanitizable Signatures},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {159--177},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_10},
  doi          = {10.1007/11555827\_10},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AtenieseCMT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AtenieseFGH05,
  author       = {Giuseppe Ateniese and
                  Kevin Fu and
                  Matthew Green and
                  Susan Hohenberger},
  title        = {Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed
                  Storage},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2005, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2005},
  url          = {https://www.ndss-symposium.org/ndss2005/improved-proxy-re-encryption-schemes-applications-secure-distributed-storage/},
  timestamp    = {Mon, 01 Feb 2021 08:42:12 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/AtenieseFGH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/storagess/BurnsPAB05,
  author       = {Randal C. Burns and
                  Zachary N. J. Peterson and
                  Giuseppe Ateniese and
                  Stephen Bono},
  editor       = {Vijay Atluri and
                  Pierangela Samarati and
                  William Yurcik and
                  Larry Brumbaugh and
                  Yuanyuan Zhou},
  title        = {Verifiable audit trails for a versioning file system},
  booktitle    = {Proceedings of the 2005 {ACM} Workshop On Storage Security And Survivability,
                  StorageSS 2005, Fairfax, VA, USA, November 11, 2005},
  pages        = {44--50},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1103780.1103787},
  doi          = {10.1145/1103780.1103787},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/storagess/BurnsPAB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseFGH05,
  author       = {Giuseppe Ateniese and
                  Kevin Fu and
                  Matthew Green and
                  Susan Hohenberger},
  title        = {Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed
                  Storage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {28},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/028},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseFGH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseCHM05,
  author       = {Giuseppe Ateniese and
                  Jan Camenisch and
                  Susan Hohenberger and
                  Breno de Medeiros},
  title        = {Practical Group Signatures without Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {385},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/385},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseCHM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseH05,
  author       = {Giuseppe Ateniese and
                  Susan Hohenberger},
  title        = {Proxy Re-Signatures: New Definitions, Algorithms, and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {433},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/433},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Ateniese04,
  author       = {Giuseppe Ateniese},
  title        = {Verifiable encryption of digital signatures and applications},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {7},
  number       = {1},
  pages        = {1--20},
  year         = {2004},
  url          = {https://doi.org/10.1145/984334.984335},
  doi          = {10.1145/984334.984335},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/Ateniese04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AtenieseM04,
  author       = {Giuseppe Ateniese and
                  Breno de Medeiros},
  editor       = {Ari Juels},
  title        = {Identity-Based Chameleon Hash and Applications},
  booktitle    = {Financial Cryptography, 8th International Conference, {FC} 2004, Key
                  West, FL, USA, February 9-12, 2004. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3110},
  pages        = {164--180},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27809-2\_19},
  doi          = {10.1007/978-3-540-27809-2\_19},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/AtenieseM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwia/AtenieseRS04,
  author       = {Giuseppe Ateniese and
                  Chris Riley and
                  Christian Scheideler},
  editor       = {John L. Cole and
                  Stephen D. Wolthusen},
  title        = {Survivable Monitoring in Dynamic Networks},
  booktitle    = {Proceedings of the Second {IEEE} International Workshop on Information
                  Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}},
  pages        = {33--47},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/IWIA.2004.1288036},
  doi          = {10.1109/IWIA.2004.1288036},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwia/AtenieseRS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/AtenieseM04,
  author       = {Giuseppe Ateniese and
                  Breno de Medeiros},
  editor       = {Carlo Blundo and
                  Stelvio Cimato},
  title        = {On the Key Exposure Problem in Chameleon Hashes},
  booktitle    = {Security in Communication Networks, 4th International Conference,
                  {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3352},
  pages        = {165--179},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30598-9\_12},
  doi          = {10.1007/978-3-540-30598-9\_12},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/AtenieseM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseM04,
  author       = {Giuseppe Ateniese and
                  Breno de Medeiros},
  title        = {A Provably Secure Nyberg-Rueppel Signature Variant with Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {93},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/093},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseM04a,
  author       = {Giuseppe Ateniese and
                  Breno de Medeiros},
  title        = {On the Key Exposure Problem in Chameleon Hashes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {243},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/243},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseM04a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AtenieseM03,
  author       = {Giuseppe Ateniese and
                  Breno de Medeiros},
  editor       = {Chi{-}Sung Laih},
  title        = {Efficient Group Signatures without Trapdoors},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, November 30 - December 4, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2894},
  pages        = {246--268},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40061-5\_15},
  doi          = {10.1007/978-3-540-40061-5\_15},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AtenieseM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseM03,
  author       = {Giuseppe Ateniese and
                  Breno de Medeiros},
  title        = {Identity-based Chameleon Hash and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {167},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/167},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AtenieseN02,
  author       = {Giuseppe Ateniese and
                  Cristina Nita{-}Rotaru},
  editor       = {Bart Preneel},
  title        = {Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at
                  the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2271},
  pages        = {182--199},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45760-7\_13},
  doi          = {10.1007/3-540-45760-7\_13},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/AtenieseN02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AtenieseST02,
  author       = {Giuseppe Ateniese and
                  Dawn Xiaodong Song and
                  Gene Tsudik},
  editor       = {Matt Blaze},
  title        = {Quasi-Efficient Revocation in Group Signatures},
  booktitle    = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton,
                  Bermuda, March 11-14, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2357},
  pages        = {183--197},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36504-4\_14},
  doi          = {10.1007/3-540-36504-4\_14},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/AtenieseST02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/AtenieseCMD02,
  author       = {Giuseppe Ateniese and
                  Reza Curtmola and
                  Breno de Medeiros and
                  Darren Davis},
  editor       = {Stelvio Cimato and
                  Clemente Galdi and
                  Giuseppe Persiano},
  title        = {Medical Information Privacy Assurance: Cryptographic and System Aspects},
  booktitle    = {Security in Communication Networks, Third International Conference,
                  {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2576},
  pages        = {199--218},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36413-7\_15},
  doi          = {10.1007/3-540-36413-7\_15},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/AtenieseCMD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/AtenieseM02,
  author       = {Giuseppe Ateniese and
                  Breno de Medeiros},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati},
  title        = {Anonymous E-prescriptions},
  booktitle    = {Proceedings of the 2002 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2002, Washington, DC, USA, November 21, 2002},
  pages        = {19--31},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/644527.644530},
  doi          = {10.1145/644527.644530},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/AtenieseM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseM02,
  author       = {Giuseppe Ateniese and
                  Breno de Medeiros},
  title        = {Efficient Group Signatures without Trapdoors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {173},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/173},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/AtenieseBSS01,
  author       = {Giuseppe Ateniese and
                  Carlo Blundo and
                  Alfredo De Santis and
                  Douglas R. Stinson},
  title        = {Extended capabilities for visual cryptography},
  journal      = {Theor. Comput. Sci.},
  volume       = {250},
  number       = {1-2},
  pages        = {143--161},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0304-3975(99)00127-9},
  doi          = {10.1016/S0304-3975(99)00127-9},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/AtenieseBSS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AtenieseM01,
  author       = {Giuseppe Ateniese and
                  Stefan Mangard},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {A new approach to {DNS} security {(DNSSEC)}},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {86--95},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.501996},
  doi          = {10.1145/501983.501996},
  timestamp    = {Tue, 10 Nov 2020 20:00:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AtenieseM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/AtenieseMG01,
  author       = {Giuseppe Ateniese and
                  Breno de Medeiros and
                  Michael T. Goodrich},
  title        = {{TRICERT:} {A} Distributed Certified E-Mail Scheme},
  booktitle    = {Proceedings of the Network and Distributed System Security Symposium,
                  {NDSS} 2001, San Diego, California, {USA}},
  publisher    = {The Internet Society},
  year         = {2001},
  url          = {https://www.ndss-symposium.org/ndss2001/tricert-distributed-certified-e-mail-scheme/},
  timestamp    = {Mon, 01 Feb 2021 08:42:22 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/AtenieseMG01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseST01,
  author       = {Giuseppe Ateniese and
                  Dawn Song and
                  Gene Tsudik},
  title        = {Quasi-Efficient Revocation of Group Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {101},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/101},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AtenieseST01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/AtenieseST00,
  author       = {Giuseppe Ateniese and
                  Michael Steiner and
                  Gene Tsudik},
  title        = {New multiparty authentication services and key agreement protocols},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {18},
  number       = {4},
  pages        = {628--639},
  year         = {2000},
  url          = {https://doi.org/10.1109/49.839937},
  doi          = {10.1109/49.839937},
  timestamp    = {Sat, 23 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/AtenieseST00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AtenieseCJT00,
  author       = {Giuseppe Ateniese and
                  Jan Camenisch and
                  Marc Joye and
                  Gene Tsudik},
  editor       = {Mihir Bellare},
  title        = {A Practical and Provably Secure Coalition-Resistant Group Signature
                  Scheme},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1880},
  pages        = {255--270},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44598-6\_16},
  doi          = {10.1007/3-540-44598-6\_16},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AtenieseCJT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/StantonAHAKNSST00,
  author       = {Jonathan Robert Stanton and
                  Yair Amir and
                  Damian Hasse and
                  Giuseppe Ateniese and
                  Yongdae Kim and
                  Cristina Nita{-}Rotaru and
                  Theo Schlossnagle and
                  John L. Schultz and
                  Gene Tsudik},
  title        = {Secure Group Communication in Asynchronous Networks with Failures:
                  Integration and Experiments},
  booktitle    = {Proceedings of the 20th International Conference on Distributed Computing
                  Systems, Taipei, Taiwan, April 10-13, 2000},
  pages        = {330--343},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ICDCS.2000.840945},
  doi          = {10.1109/ICDCS.2000.840945},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/StantonAHAKNSST00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/AtenieseHKT99,
  author       = {Giuseppe Ateniese and
                  Amir Herzberg and
                  Hugo Krawczyk and
                  Gene Tsudik},
  title        = {Untraceable mobility or how to travel incognito},
  journal      = {Comput. Networks},
  volume       = {31},
  number       = {8},
  pages        = {871--884},
  year         = {1999},
  url          = {https://doi.org/10.1016/S1389-1286(98)00021-8},
  doi          = {10.1016/S1389-1286(98)00021-8},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/AtenieseHKT99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Ateniese99,
  author       = {Giuseppe Ateniese},
  editor       = {Juzar Motiwalla and
                  Gene Tsudik},
  title        = {Efficient Verifiable Encryption (and Fair Exchange) of Digital Signatures},
  booktitle    = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and
                  Communications Security, Singapore, November 1-4, 1999},
  pages        = {138--146},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/319709.319728},
  doi          = {10.1145/319709.319728},
  timestamp    = {Tue, 10 Nov 2020 20:00:25 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Ateniese99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AtenieseT99,
  author       = {Giuseppe Ateniese and
                  Gene Tsudik},
  editor       = {Matthew K. Franklin},
  title        = {Some Open Issues and New Directions in Group Signatures},
  booktitle    = {Financial Cryptography, Third International Conference, FC'99, Anguilla,
                  British West Indies, February 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1648},
  pages        = {196--211},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48390-X\_15},
  doi          = {10.1007/3-540-48390-X\_15},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/AtenieseT99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soda/AtenieseT99,
  author       = {Giuseppe Ateniese and
                  Gene Tsudik},
  editor       = {Robert Endre Tarjan and
                  Tandy J. Warnow},
  title        = {Group Signatures \emph{{\'{A}} la carte}},
  booktitle    = {Proceedings of the Tenth Annual {ACM-SIAM} Symposium on Discrete Algorithms,
                  17-19 January 1999, Baltimore, Maryland, {USA}},
  pages        = {848--849},
  publisher    = {{ACM/SIAM}},
  year         = {1999},
  url          = {http://dl.acm.org/citation.cfm?id=314500.314964},
  timestamp    = {Thu, 05 Jul 2018 07:29:57 +0200},
  biburl       = {https://dblp.org/rec/conf/soda/AtenieseT99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AtenieseST98,
  author       = {Giuseppe Ateniese and
                  Michael Steiner and
                  Gene Tsudik},
  editor       = {Li Gong and
                  Michael K. Reiter},
  title        = {Authenticated Group Key Agreement and Friends},
  booktitle    = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
                  Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  pages        = {17--26},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/288090.288097},
  doi          = {10.1145/288090.288097},
  timestamp    = {Tue, 10 Nov 2020 20:00:11 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AtenieseST98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/AtenieseBSS96,
  author       = {Giuseppe Ateniese and
                  Carlo Blundo and
                  Alfredo De Santis and
                  Douglas R. Stinson},
  title        = {Visual Cryptography for General Access Structures},
  journal      = {Inf. Comput.},
  volume       = {129},
  number       = {2},
  pages        = {86--106},
  year         = {1996},
  url          = {https://doi.org/10.1006/inco.1996.0076},
  doi          = {10.1006/INCO.1996.0076},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iandc/AtenieseBSS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/AtenieseBSS96,
  author       = {Giuseppe Ateniese and
                  Carlo Blundo and
                  Alfredo De Santis and
                  Douglas R. Stinson},
  editor       = {Friedhelm Meyer auf der Heide and
                  Burkhard Monien},
  title        = {Constructions and Bounds for Visual Cryptography},
  booktitle    = {Automata, Languages and Programming, 23rd International Colloquium,
                  ICALP96, Paderborn, Germany, 8-12 July 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1099},
  pages        = {416--428},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61440-0\_147},
  doi          = {10.1007/3-540-61440-0\_147},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/AtenieseBSS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/ECCC-TR96-012,
  author       = {Giuseppe Ateniese and
                  Carlo Blundo and
                  Alfredo De Santis and
                  Douglas R. Stinson},
  title        = {Visual Cryptography for General Access Structures},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR96-012}},
  year         = {1996},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/1996/TR96-012/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR96-012},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/ECCC-TR96-012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics