Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Giuseppe Ateniese
@inproceedings{DBLP:conf/pkc/AtenieseCFPT23, author = {Giuseppe Ateniese and Long Chen and Danilo Francati and Dimitrios Papadopoulos and Qiang Tang}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Verifiable Capacity-Bound Functions: {A} New Primitive from Kolmogorov Complexity - (Revisiting Space-Based Security in the Adaptive Setting)}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, pages = {63--93}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4\_3}, doi = {10.1007/978-3-031-31371-4\_3}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AtenieseCFPT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-07628, author = {Dario Pasquini and Giuseppe Ateniese and Carmela Troncoso}, title = {Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data}, journal = {CoRR}, volume = {abs/2301.07628}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.07628}, doi = {10.48550/ARXIV.2301.07628}, eprinttype = {arXiv}, eprint = {2301.07628}, timestamp = {Thu, 19 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-07628.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-04378, author = {Hanlin Zhang and Benjamin L. Edelman and Danilo Francati and Daniele Venturi and Giuseppe Ateniese and Boaz Barak}, title = {Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models}, journal = {CoRR}, volume = {abs/2311.04378}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.04378}, doi = {10.48550/ARXIV.2311.04378}, eprinttype = {arXiv}, eprint = {2311.04378}, timestamp = {Tue, 14 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-04378.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseBCFK23, author = {Giuseppe Ateniese and Foteini Baldimtsi and Matteo Campanelli and Danilo Francati and Ioanna Karantaidou}, title = {Advancing Scalability in Decentralized Storage: {A} Novel Approach to Proof-of-Replication via Polynomial Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1569}, year = {2023}, url = {https://eprint.iacr.org/2023/1569}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseBCFK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhangEFVAB23, author = {Hanlin Zhang and Benjamin L. Edelman and Danilo Francati and Daniele Venturi and Giuseppe Ateniese and Boaz Barak}, title = {Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1776}, year = {2023}, url = {https://eprint.iacr.org/2023/1776}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ZhangEFVAB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PasquiniFAK23, author = {Dario Pasquini and Danilo Francati and Giuseppe Ateniese and Evgenios M. Kornaropoulos}, title = {Breach Extraction Attacks: Exposing and Addressing the Leakage in Second Generation Compromised Credential Checking Services}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1848}, year = {2023}, url = {https://eprint.iacr.org/2023/1848}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/PasquiniFAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/XiaoWCMA22, author = {Bin Xiao and Fan Wu and Francesco Chiti and Mohammad Hossein Manshaei and Giuseppe Ateniese}, title = {Guest Editorial: Introduction to the Special Section on Security and Privacy for {AI} Models and Applications}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {9}, number = {1}, pages = {171--172}, year = {2022}, url = {https://doi.org/10.1109/TNSE.2021.3133123}, doi = {10.1109/TNSE.2021.3133123}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnse/XiaoWCMA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PasquiniFA22, author = {Dario Pasquini and Danilo Francati and Giuseppe Ateniese}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Eluding Secure Aggregation in Federated Learning via Model Inconsistency}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {2429--2443}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560557}, doi = {10.1145/3548606.3560557}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PasquiniFA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acns/2022, editor = {Giuseppe Ateniese and Daniele Venturi}, title = {Applied Cryptography and Network Security - 20th International Conference, {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13269}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-09234-3}, doi = {10.1007/978-3-031-09234-3}, isbn = {978-3-031-09233-6}, timestamp = {Tue, 21 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AtenieseFNV21, author = {Giuseppe Ateniese and Danilo Francati and David Nu{\~{n}}ez and Daniele Venturi}, title = {Match Me if You Can: Matchmaking Encryption and Its Applications}, journal = {J. Cryptol.}, volume = {34}, number = {3}, pages = {16}, year = {2021}, url = {https://doi.org/10.1007/s00145-021-09381-4}, doi = {10.1007/S00145-021-09381-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AtenieseFNV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/AtenieseFMV21, author = {Giuseppe Ateniese and Danilo Francati and Bernardo Magri and Daniele Venturi}, title = {Immunization against complete subversion without random oracles}, journal = {Theor. Comput. Sci.}, volume = {859}, pages = {1--36}, year = {2021}, url = {https://doi.org/10.1016/j.tcs.2021.01.002}, doi = {10.1016/J.TCS.2021.01.002}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/AtenieseFMV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PasquiniAB21, author = {Dario Pasquini and Giuseppe Ateniese and Massimo Bernaschi}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Unleashing the Tiger: Inference Attacks on Split Learning}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {2113--2129}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3485259}, doi = {10.1145/3460120.3485259}, timestamp = {Tue, 16 Nov 2021 12:59:46 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PasquiniAB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/PasquiniGABC21, author = {Dario Pasquini and Ankit Gangwal and Giuseppe Ateniese and Massimo Bernaschi and Mauro Conti}, title = {Improving Password Guessing via Representation Learning}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {1382--1399}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00016}, doi = {10.1109/SP40001.2021.00016}, timestamp = {Thu, 21 Sep 2023 15:57:26 +0200}, biburl = {https://dblp.org/rec/conf/sp/PasquiniGABC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/PasquiniCAB21, author = {Dario Pasquini and Marco Cianfriglia and Giuseppe Ateniese and Massimo Bernaschi}, editor = {Michael D. Bailey and Rachel Greenstadt}, title = {Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries}, booktitle = {30th {USENIX} Security Symposium, {USENIX} Security 2021, August 11-13, 2021}, pages = {821--838}, publisher = {{USENIX} Association}, year = {2021}, url = {https://www.usenix.org/conference/usenixsecurity21/presentation/pasquini}, timestamp = {Mon, 20 Nov 2023 08:57:49 +0100}, biburl = {https://dblp.org/rec/conf/uss/PasquiniCAB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-07380, author = {Dario Pasquini and Danilo Francati and Giuseppe Ateniese}, title = {Eluding Secure Aggregation in Federated Learning via Model Inconsistency}, journal = {CoRR}, volume = {abs/2111.07380}, year = {2021}, url = {https://arxiv.org/abs/2111.07380}, eprinttype = {arXiv}, eprint = {2111.07380}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-07380.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseCFPT21, author = {Giuseppe Ateniese and Long Chen and Danilo Francati and Dimitrios Papadopoulos and Qiang Tang}, title = {Verifiable Capacity-bound Functions: {A} New Primitive from Kolmogorov Complexity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {162}, year = {2021}, url = {https://eprint.iacr.org/2021/162}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseCFPT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/AtenieseMV20, author = {Giuseppe Ateniese and Bernardo Magri and Daniele Venturi}, title = {Subversion-resilient signatures: Definitions, constructions and applications}, journal = {Theor. Comput. Sci.}, volume = {820}, pages = {91--122}, year = {2020}, url = {https://doi.org/10.1016/j.tcs.2020.03.021}, doi = {10.1016/J.TCS.2020.03.021}, timestamp = {Tue, 21 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/AtenieseMV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccsscc/Ateniese20, author = {Giuseppe Ateniese}, title = {Is {AI} Taking Over the World? No, but It's Making it Less Private}, booktitle = {Proceedings of the 8th International Workshop on Security in Blockchain and Cloud Computing, SBC@AsiaCCS 2020, Virtual Online Conference, October 6, 2020}, pages = {1}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3384942.3406872}, doi = {10.1145/3384942.3406872}, timestamp = {Mon, 16 Nov 2020 15:55:53 +0100}, biburl = {https://dblp.org/rec/conf/asiaccsscc/Ateniese20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/LuzioFA20, author = {Adriano Di Luzio and Danilo Francati and Giuseppe Ateniese}, editor = {Stephan Krenn and Haya Schulmann and Serge Vaudenay}, title = {Arcula: {A} Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains}, booktitle = {Cryptology and Network Security - 19th International Conference, {CANS} 2020, Vienna, Austria, December 14-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12579}, pages = {323--343}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65411-5\_16}, doi = {10.1007/978-3-030-65411-5\_16}, timestamp = {Tue, 17 Oct 2023 10:41:56 +0200}, biburl = {https://dblp.org/rec/conf/cans/LuzioFA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/PasquiniAB20, author = {Dario Pasquini and Giuseppe Ateniese and Massimo Bernaschi}, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {Interpretable Probabilistic Password Strength Meters via Deep Learning}, booktitle = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12308}, pages = {502--522}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58951-6\_25}, doi = {10.1007/978-3-030-58951-6\_25}, timestamp = {Fri, 02 Jul 2021 20:12:27 +0200}, biburl = {https://dblp.org/rec/conf/esorics/PasquiniAB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/AtenieseCET20, author = {Giuseppe Ateniese and Long Chen and Mohammad Etemad and Qiang Tang}, title = {Proof of Storage-Time: Efficiently Checking Continuous Data Availability}, booktitle = {27th Annual Network and Distributed System Security Symposium, {NDSS} 2020, San Diego, California, USA, February 23-26, 2020}, publisher = {The Internet Society}, year = {2020}, url = {https://www.ndss-symposium.org/ndss-paper/proof-of-storage-time-efficiently-checking-continuous-data-availability/}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/AtenieseCET20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2020asia, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269}, doi = {10.1145/3320269}, isbn = {978-1-4503-6750-9}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2020asia.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2004-07179, author = {Dario Pasquini and Giuseppe Ateniese and Massimo Bernaschi}, title = {Interpretable Probabilistic Password Strength Meters via Deep Learning}, journal = {CoRR}, volume = {abs/2004.07179}, year = {2020}, url = {https://arxiv.org/abs/2004.07179}, eprinttype = {arXiv}, eprint = {2004.07179}, timestamp = {Tue, 21 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2004-07179.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-12269, author = {Dario Pasquini and Marco Cianfriglia and Giuseppe Ateniese and Massimo Bernaschi}, title = {Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries}, journal = {CoRR}, volume = {abs/2010.12269}, year = {2020}, url = {https://arxiv.org/abs/2010.12269}, eprinttype = {arXiv}, eprint = {2010.12269}, timestamp = {Tue, 27 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-12269.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-02670, author = {Dario Pasquini and Giuseppe Ateniese and Massimo Bernaschi}, title = {Unleashing the Tiger: Inference Attacks on Split Learning}, journal = {CoRR}, volume = {abs/2012.02670}, year = {2020}, url = {https://arxiv.org/abs/2012.02670}, eprinttype = {arXiv}, eprint = {2012.02670}, timestamp = {Wed, 09 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-02670.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseCET20, author = {Giuseppe Ateniese and Long Chen and Mohammad Etemad and Qiang Tang}, title = {Proof of Storage-Time: Efficiently Checking Continuous Data Availability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {840}, year = {2020}, url = {https://eprint.iacr.org/2020/840}, timestamp = {Wed, 20 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseCET20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/HitajGAP19, author = {Briland Hitaj and Paolo Gasti and Giuseppe Ateniese and Fernando P{\'{e}}rez{-}Cruz}, editor = {Robert H. Deng and Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and Mart{\'{\i}}n Ochoa and Moti Yung}, title = {PassGAN: {A} Deep Learning Approach for Password Guessing}, booktitle = {Applied Cryptography and Network Security - 17th International Conference, {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11464}, pages = {217--237}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21568-2\_11}, doi = {10.1007/978-3-030-21568-2\_11}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/HitajGAP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/AtenieseFM019, author = {Giuseppe Ateniese and Danilo Francati and Bernardo Magri and Daniele Venturi}, editor = {Robert H. Deng and Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and Mart{\'{\i}}n Ochoa and Moti Yung}, title = {Public Immunization Against Complete Subversion Without Random Oracles}, booktitle = {Applied Cryptography and Network Security - 17th International Conference, {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11464}, pages = {465--485}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21568-2\_23}, doi = {10.1007/978-3-030-21568-2\_23}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/AtenieseFM019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AtenieseFN019, author = {Giuseppe Ateniese and Danilo Francati and David Nu{\~{n}}ez and Daniele Venturi}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Match Me if You Can: Matchmaking Encryption and Its Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11693}, pages = {701--731}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26951-7\_24}, doi = {10.1007/978-3-030-26951-7\_24}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/AtenieseFN019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-05919, author = {Adriano Di Luzio and Danilo Francati and Giuseppe Ateniese}, title = {Arcula: {A} Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains}, journal = {CoRR}, volume = {abs/1906.05919}, year = {2019}, url = {http://arxiv.org/abs/1906.05919}, eprinttype = {arXiv}, eprint = {1906.05919}, timestamp = {Mon, 24 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-05919.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-04232, author = {Dario Pasquini and Ankit Gangwal and Giuseppe Ateniese and Massimo Bernaschi and Mauro Conti}, title = {Improving Password Guessing via Representation Learning}, journal = {CoRR}, volume = {abs/1910.04232}, year = {2019}, url = {http://arxiv.org/abs/1910.04232}, eprinttype = {arXiv}, eprint = {1910.04232}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-04232.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-08515, author = {Danilo Francati and Giuseppe Ateniese and Abdoulaye Faye and Andrea Maria Milazzo and Angelo Massimo Perillo and Luca Schiatti and Giuseppe Giordano}, title = {Audita: {A} Blockchain-based Auditing Framework for Off-chain Storage}, journal = {CoRR}, volume = {abs/1911.08515}, year = {2019}, url = {http://arxiv.org/abs/1911.08515}, eprinttype = {arXiv}, eprint = {1911.08515}, timestamp = {Tue, 03 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-08515.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuzioFA19, author = {Adriano Di Luzio and Danilo Francati and Giuseppe Ateniese}, title = {Arcula: {A} Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {704}, year = {2019}, url = {https://eprint.iacr.org/2019/704}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuzioFA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseFMV19, author = {Giuseppe Ateniese and Danilo Francati and Bernardo Magri and Daniele Venturi}, title = {Immunization against Complete Subversion without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1173}, year = {2019}, url = {https://eprint.iacr.org/2019/1173}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseFMV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PasquiniGABC19, author = {Dario Pasquini and Ankit Gangwal and Giuseppe Ateniese and Massimo Bernaschi and Mauro Conti}, title = {Improving Password Guessing via Representation Learning}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1188}, year = {2019}, url = {https://eprint.iacr.org/2019/1188}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PasquiniGABC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FrancatiAFMPSG19, author = {Danilo Francati and Giuseppe Ateniese and Abdoulaye Faye and Andrea Maria Milazzo and Angelo Massimo Perillo and Luca Schiatti and Giuseppe Giordano}, title = {Audita: {A} Blockchain-based Auditing Framework for Off-chain Storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1345}, year = {2019}, url = {https://eprint.iacr.org/2019/1345}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FrancatiAFMPSG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/AtenieseFM18, author = {Giuseppe Ateniese and Katharina Fech and Bernardo Magri}, editor = {Debrup Chakraborty and Tetsu Iwata}, title = {A Family of {FDH} Signature Schemes Based on the Quadratic Residuosity Assumption}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2018 - 19th International Conference on Cryptology in India, New Delhi, India, December 9-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11356}, pages = {248--262}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05378-9\_14}, doi = {10.1007/978-3-030-05378-9\_14}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/AtenieseFM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/AtenieseKMT018, author = {Giuseppe Ateniese and Aggelos Kiayias and Bernardo Magri and Yiannis Tselekounis and Daniele Venturi}, editor = {Joonsang Baek and Willy Susilo and Jongkil Kim}, title = {Secure Outsourcing of Cryptographic Circuits Manufacturing}, booktitle = {Provable Security - 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11192}, pages = {75--93}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01446-9\_5}, doi = {10.1007/978-3-030-01446-9\_5}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/AtenieseKMT018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseFNV18, author = {Giuseppe Ateniese and Danilo Francati and David Nu{\~{n}}ez and Daniele Venturi}, title = {Match Me if You Can: Matchmaking Encryption and its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1094}, year = {2018}, url = {https://eprint.iacr.org/2018/1094}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseFNV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/AtenieseBCPS17, author = {Giuseppe Ateniese and Giuseppe Bianchi and Angelo T. Capossele and Chiara Petrioli and Dora Spenza}, title = {Low-Cost Standard Signatures for Energy-Harvesting Wireless Sensor Networks}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {16}, number = {3}, pages = {64:1--64:23}, year = {2017}, url = {https://doi.org/10.1145/2994603}, doi = {10.1145/2994603}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tecs/AtenieseBCPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YuAAHSDM17, author = {Yong Yu and Man Ho Au and Giuseppe Ateniese and Xinyi Huang and Willy Susilo and Yuanshun Dai and Geyong Min}, title = {Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {4}, pages = {767--778}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2016.2615853}, doi = {10.1109/TIFS.2016.2615853}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/YuAAHSDM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/AtenieseGLPPT17, author = {Giuseppe Ateniese and Michael T. Goodrich and Vassilios Lekakis and Charalampos Papamanthou and Evripidis Paraskevas and Roberto Tamassia}, editor = {Dieter Gollmann and Atsuko Miyaji and Hiroaki Kikuchi}, title = {Accountable Storage}, booktitle = {Applied Cryptography and Network Security - 15th International Conference, {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10355}, pages = {623--644}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61204-1\_31}, doi = {10.1007/978-3-319-61204-1\_31}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/AtenieseGLPPT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HitajAP17, author = {Briland Hitaj and Giuseppe Ateniese and Fernando P{\'{e}}rez{-}Cruz}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Deep Models Under the {GAN:} Information Leakage from Collaborative Deep Learning}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {603--618}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134012}, doi = {10.1145/3133956.3134012}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HitajAP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/AtenieseM0A17, author = {Giuseppe Ateniese and Bernardo Magri and Daniele Venturi and Ewerton R. Andrade}, title = {Redactable Blockchain - or - Rewriting History in Bitcoin and Friends}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2017, Paris, France, April 26-28, 2017}, pages = {111--126}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSP.2017.37}, doi = {10.1109/EUROSP.2017.37}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/AtenieseM0A17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/AtenieseBCPS17, author = {Giuseppe Ateniese and Giuseppe Bianchi and Angelo T. Capossele and Chiara Petrioli and Dora Spenza}, title = {{HELIOS:} Outsourcing of Security Operations in Green Wireless Sensor Networks}, booktitle = {85th {IEEE} Vehicular Technology Conference, {VTC} Spring 2017, Sydney, Australia, June 4-7, 2017}, pages = {1--7}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/VTCSpring.2017.8108500}, doi = {10.1109/VTCSPRING.2017.8108500}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/vtc/AtenieseBCPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HitajAP17, author = {Briland Hitaj and Giuseppe Ateniese and Fernando P{\'{e}}rez{-}Cruz}, title = {Deep Models Under the {GAN:} Information Leakage from Collaborative Deep Learning}, journal = {CoRR}, volume = {abs/1702.07464}, year = {2017}, url = {http://arxiv.org/abs/1702.07464}, eprinttype = {arXiv}, eprint = {1702.07464}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HitajAP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-00440, author = {Briland Hitaj and Paolo Gasti and Giuseppe Ateniese and Fernando P{\'{e}}rez{-}Cruz}, title = {PassGAN: {A} Deep Learning Approach for Password Guessing}, journal = {CoRR}, volume = {abs/1709.00440}, year = {2017}, url = {http://arxiv.org/abs/1709.00440}, eprinttype = {arXiv}, eprint = {1709.00440}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-00440.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/AtenieseDDV16, author = {Giuseppe Ateniese and {\"{O}}zg{\"{u}}r Dagdelen and Ivan Damg{\aa}rd and Daniele Venturi}, title = {Entangled cloud storage}, journal = {Future Gener. Comput. Syst.}, volume = {62}, pages = {104--118}, year = {2016}, url = {https://doi.org/10.1016/j.future.2016.01.008}, doi = {10.1016/J.FUTURE.2016.01.008}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/AtenieseDDV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KruppSSFAN16, author = {Johannes Krupp and Dominique Schr{\"{o}}der and Mark Simkin and Dario Fiore and Giuseppe Ateniese and Stefan N{\"{u}}rnberger}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Nearly Optimal Verifiable Data Streaming}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9614}, pages = {417--445}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49384-7\_16}, doi = {10.1007/978-3-662-49384-7\_16}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KruppSSFAN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseKMTV16, author = {Giuseppe Ateniese and Aggelos Kiayias and Bernardo Magri and Yiannis Tselekounis and Daniele Venturi}, title = {Secure Outsourcing of Circuit Manufacturing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {527}, year = {2016}, url = {http://eprint.iacr.org/2016/527}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseKMTV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseMVA16, author = {Giuseppe Ateniese and Bernardo Magri and Daniele Venturi and Ewerton R. Andrade}, title = {Redactable Blockchain - or - Rewriting History in Bitcoin and Friends}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {757}, year = {2016}, url = {http://eprint.iacr.org/2016/757}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseMVA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/AtenieseMSVVF15, author = {Giuseppe Ateniese and Luigi V. Mancini and Angelo Spognardi and Antonio Villani and Domenico Vitali and Giovanni Felici}, title = {Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers}, journal = {Int. J. Secur. Networks}, volume = {10}, number = {3}, pages = {137--150}, year = {2015}, url = {https://doi.org/10.1504/IJSN.2015.071829}, doi = {10.1504/IJSN.2015.071829}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/AtenieseMSVVF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/YuMA15, author = {Yong Yu and Yi Mu and Giuseppe Ateniese}, title = {Recent Advances in Security and Privacy in Big Data}, journal = {J. Univers. Comput. Sci.}, volume = {21}, number = {3}, pages = {365--368}, year = {2015}, url = {http://www.jucs.org/jucs\_21\_3/recent\_advances\_in\_security}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jucs/YuMA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AtenieseDDV15, author = {Giuseppe Ateniese and {\"{O}}zg{\"{u}}r Dagdelen and Ivan Damg{\aa}rd and Daniele Venturi}, editor = {Feng Bao and Steven Miller and Sherman S. M. Chow and Danfeng Yao}, title = {Entangled Encodings and Data Entanglement}, booktitle = {Proceedings of the 3rd International Workshop on Security in Cloud Computing, SCC@ASIACCS '15, Singapore, Republic of Singapore, April 14, 2015}, pages = {3--12}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2732516.2732524}, doi = {10.1145/2732516.2732524}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AtenieseDDV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AtenieseMV15, author = {Giuseppe Ateniese and Bernardo Magri and Daniele Venturi}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Subversion-Resilient Signature Schemes}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {364--375}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813635}, doi = {10.1145/2810103.2813635}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AtenieseMV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/AtenieseFK15, author = {Giuseppe Ateniese and Antonio Faonio and Seny Kamara}, editor = {Jens Groth}, title = {Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage}, booktitle = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC} 2015, Oxford, UK, December 15-17, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9496}, pages = {311--328}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27239-9\_19}, doi = {10.1007/978-3-319-27239-9\_19}, timestamp = {Wed, 18 Mar 2020 16:00:58 +0100}, biburl = {https://dblp.org/rec/conf/ima/AtenieseFK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/AtenieseHMVV15, author = {Giuseppe Ateniese and Briland Hitaj and Luigi Vincenzo Mancini and Nino Vincenzo Verde and Antonio Villani}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {46--59}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_4}, doi = {10.1007/978-3-319-25645-0\_4}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/nss/AtenieseHMVV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/WilsonA15, author = {Duane Wilson and Giuseppe Ateniese}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {From Pretty Good to Great: Enhancing {PGP} Using Bitcoin and the Blockchain}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {368--375}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_25}, doi = {10.1007/978-3-319-25645-0\_25}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/WilsonA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AtenieseHMVV15, author = {Giuseppe Ateniese and Briland Hitaj and Luigi V. Mancini and Nino Vincenzo Verde and Antonio Villani}, title = {No Place to Hide that Bytes won't Reveal: Sniffing Location-Based Encrypted Traffic to Track User Position}, journal = {CoRR}, volume = {abs/1505.07774}, year = {2015}, url = {http://arxiv.org/abs/1505.07774}, eprinttype = {arXiv}, eprint = {1505.07774}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AtenieseHMVV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WilsonA15, author = {Duane Wilson and Giuseppe Ateniese}, title = {From Pretty Good To Great: Enhancing {PGP} using Bitcoin and the Blockchain}, journal = {CoRR}, volume = {abs/1508.04868}, year = {2015}, url = {http://arxiv.org/abs/1508.04868}, eprinttype = {arXiv}, eprint = {1508.04868}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WilsonA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KruppSSFAN15, author = {Johannes Krupp and Dominique Schr{\"{o}}der and Mark Simkin and Dario Fiore and Giuseppe Ateniese and Stefan N{\"{u}}rnberger}, title = {Nearly Optimal Verifiable Data Streaming (Full Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {333}, year = {2015}, url = {http://eprint.iacr.org/2015/333}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KruppSSFAN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseMV15, author = {Giuseppe Ateniese and Bernardo Magri and Daniele Venturi}, title = {Subversion-Resilient Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {517}, year = {2015}, url = {http://eprint.iacr.org/2015/517}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseMV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseFK15, author = {Giuseppe Ateniese and Antonio Faonio and Seny Kamara}, title = {Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {920}, year = {2015}, url = {http://eprint.iacr.org/2015/920}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseFK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/AtenieseBBL14, author = {Giuseppe Ateniese and Roberto Baldoni and Silvia Bonomi and Giuseppe Antonio Di Luna}, title = {Fault-tolerant oblivious assignment with m slots in synchronous systems}, journal = {J. Parallel Distributed Comput.}, volume = {74}, number = {7}, pages = {2648--2661}, year = {2014}, url = {https://doi.org/10.1016/j.jpdc.2014.02.008}, doi = {10.1016/J.JPDC.2014.02.008}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpdc/AtenieseBBL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/AtenieseFMM14, author = {Giuseppe Ateniese and Antonio Faonio and Bernardo Magri and Breno de Medeiros}, editor = {Ioana Boureanu and Philippe Owesarski and Serge Vaudenay}, title = {Certified Bitcoins}, booktitle = {Applied Cryptography and Network Security - 12th International Conference, {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8479}, pages = {80--96}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07536-5\_6}, doi = {10.1007/978-3-319-07536-5\_6}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/AtenieseFMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/VerdeAGMS14, author = {Nino Vincenzo Verde and Giuseppe Ateniese and Emanuele Gabrielli and Luigi Vincenzo Mancini and Angelo Spognardi}, title = {No NAT'd User Left Behind: Fingerprinting Users behind {NAT} from NetFlow Records Alone}, booktitle = {{IEEE} 34th International Conference on Distributed Computing Systems, {ICDCS} 2014, Madrid, Spain, June 30 - July 3, 2014}, pages = {218--227}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICDCS.2014.30}, doi = {10.1109/ICDCS.2014.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/VerdeAGMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ZhengXA14, author = {Qingji Zheng and Shouhuai Xu and Giuseppe Ateniese}, title = {{VABKS:} Verifiable attribute-based keyword search over outsourced encrypted data}, booktitle = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014, Toronto, Canada, April 27 - May 2, 2014}, pages = {522--530}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INFOCOM.2014.6847976}, doi = {10.1109/INFOCOM.2014.6847976}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ZhengXA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/WilsonA14, author = {Duane C. Wilson and Giuseppe Ateniese}, editor = {Sherman S. M. Chow and Jan Camenisch and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {"To Share or not to Share" in Client-Side Encrypted Clouds}, booktitle = {Information Security - 17th International Conference, {ISC} 2014, Hong Kong, China, October 12-14, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8783}, pages = {401--412}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13257-0\_24}, doi = {10.1007/978-3-319-13257-0\_24}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/WilsonA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/AtenieseBFG14, author = {Giuseppe Ateniese and Ilario Bonacina and Antonio Faonio and Nicola Galesi}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Proofs of Space: When Space Is of the Essence}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {538--557}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_31}, doi = {10.1007/978-3-319-10879-7\_31}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/AtenieseBFG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/VerdeAGMS14, author = {Nino Vincenzo Verde and Giuseppe Ateniese and Emanuele Gabrielli and Luigi Vincenzo Mancini and Angelo Spognardi}, title = {No NAT'd User left Behind: Fingerprinting Users behind {NAT} from NetFlow Records alone}, journal = {CoRR}, volume = {abs/1402.1940}, year = {2014}, url = {http://arxiv.org/abs/1402.1940}, eprinttype = {arXiv}, eprint = {1402.1940}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/VerdeAGMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/WilsonA14, author = {Duane Wilson and Giuseppe Ateniese}, title = {To Share or Not to Share in Client-Side Encrypted Clouds}, journal = {CoRR}, volume = {abs/1404.2697}, year = {2014}, url = {http://arxiv.org/abs/1404.2697}, eprinttype = {arXiv}, eprint = {1404.2697}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/WilsonA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseFMM14, author = {Giuseppe Ateniese and Antonio Faonio and Bernardo Magri and Breno de Medeiros}, title = {Certified Bitcoins}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {76}, year = {2014}, url = {http://eprint.iacr.org/2014/076}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseFMM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseGLPPT14, author = {Giuseppe Ateniese and Michael T. Goodrich and Vassilios Lekakis and Charalampos Papamanthou and Evripidis Paraskevas and Roberto Tamassia}, title = {Accountable Storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {886}, year = {2014}, url = {http://eprint.iacr.org/2014/886}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseGLPPT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/AtenieseSFM13, author = {Giuseppe Ateniese and Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci}, title = {A note on time-bound hierarchical key assignment schemes}, journal = {Inf. Process. Lett.}, volume = {113}, number = {5-6}, pages = {151--155}, year = {2013}, url = {https://doi.org/10.1016/j.ipl.2013.01.006}, doi = {10.1016/J.IPL.2013.01.006}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/AtenieseSFM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/AtenieseBCP13, author = {Giuseppe Ateniese and Giuseppe Bianchi and Angelo Capossele and Chiara Petrioli}, title = {Low-cost Standard Signatures in Wireless Sensor Networks: {A} Case for Reviving Pre-computation Techniques?}, booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS} 2013, San Diego, California, USA, February 24-27, 2013}, publisher = {The Internet Society}, year = {2013}, url = {https://www.ndss-symposium.org/ndss2013/low-cost-standard-signatures-wireless-sensor-networks-case-reviving-pre-computation-techniques}, timestamp = {Mon, 01 Feb 2021 08:42:13 +0100}, biburl = {https://dblp.org/rec/conf/ndss/AtenieseBCP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/AtenieseFMSVV13, author = {Giuseppe Ateniese and Giovanni Felici and Luigi V. Mancini and Angelo Spognardi and Antonio Villani and Domenico Vitali}, title = {Hacking Smart Machines with Smarter Ones: How to Extract Meaningful Data from Machine Learning Classifiers}, journal = {CoRR}, volume = {abs/1306.4447}, year = {2013}, url = {http://arxiv.org/abs/1306.4447}, eprinttype = {arXiv}, eprint = {1306.4447}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/AtenieseFMSVV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhengXA13, author = {Qingji Zheng and Shouhuai Xu and Giuseppe Ateniese}, title = {{VABKS:} Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {462}, year = {2013}, url = {http://eprint.iacr.org/2013/462}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhengXA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseBFG13, author = {Giuseppe Ateniese and Ilario Bonacina and Antonio Faonio and Nicola Galesi}, title = {Proofs of Space: When Space is of the Essence}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {805}, year = {2013}, url = {http://eprint.iacr.org/2013/805}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseBFG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AtenieseSFM12, author = {Giuseppe Ateniese and Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci}, title = {Provably-Secure Time-Bound Hierarchical Key Assignment Schemes}, journal = {J. Cryptol.}, volume = {25}, number = {2}, pages = {243--270}, year = {2012}, url = {https://doi.org/10.1007/s00145-010-9094-6}, doi = {10.1007/S00145-010-9094-6}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AtenieseSFM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhengXA12, author = {Qingji Zheng and Shouhuai Xu and Giuseppe Ateniese}, editor = {Ting Yu and Srdjan Capkun and Seny Kamara}, title = {Efficient query integrity for outsourced dynamic databases}, booktitle = {Proceedings of the 2012 {ACM} Workshop on Cloud computing security, {CCSW} 2012, Raleigh, NC, USA, October 19, 2012}, pages = {71--82}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2381913.2381927}, doi = {10.1145/2381913.2381927}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhengXA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/FilardoA12, author = {Nathaniel Wesley Filardo and Giuseppe Ateniese}, editor = {Mark Dermot Ryan and Ben Smyth and Guilin Wang}, title = {High-Entropy Visual Identification for Touch Screen Devices}, booktitle = {Information Security Practice and Experience - 8th International Conference, {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7232}, pages = {182--198}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29101-2\_13}, doi = {10.1007/978-3-642-29101-2\_13}, timestamp = {Wed, 07 Dec 2022 23:12:45 +0100}, biburl = {https://dblp.org/rec/conf/ispec/FilardoA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sss/AtenieseBBL12, author = {Giuseppe Ateniese and Roberto Baldoni and Silvia Bonomi and Giuseppe Antonio Di Luna}, editor = {Andr{\'{e}}a W. Richa and Christian Scheideler}, title = {Oblivious Assignment with m Slots}, booktitle = {Stabilization, Safety, and Security of Distributed Systems - 14th International Symposium, {SSS} 2012, Toronto, Canada, October 1-4, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7596}, pages = {187--201}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33536-5\_19}, doi = {10.1007/978-3-642-33536-5\_19}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sss/AtenieseBBL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZhengXA12, author = {Qingji Zheng and Shouhuai Xu and Giuseppe Ateniese}, title = {Efficient Query Integrity for Outsourced Dynamic Databases}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {493}, year = {2012}, url = {http://eprint.iacr.org/2012/493}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZhengXA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseDDV12, author = {Giuseppe Ateniese and {\"{O}}zg{\"{u}}r Dagdelen and Ivan Damg{\aa}rd and Daniele Venturi}, title = {Entangled Cloud Storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {511}, year = {2012}, url = {http://eprint.iacr.org/2012/511}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseDDV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AtenieseBCHKKPS11, author = {Giuseppe Ateniese and Randal C. Burns and Reza Curtmola and Joseph Herring and Osama Khan and Lea Kissner and Zachary N. J. Peterson and Dawn Song}, title = {Remote data checking using provable data possession}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {1}, pages = {12:1--12:34}, year = {2011}, url = {https://doi.org/10.1145/1952982.1952994}, doi = {10.1145/1952982.1952994}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AtenieseBCHKKPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AtenieseCT11, author = {Giuseppe Ateniese and Emiliano De Cristofaro and Gene Tsudik}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {(If) Size Matters: Size-Hiding Private Set Intersection}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {156--173}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_10}, doi = {10.1007/978-3-642-19379-8\_10}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AtenieseCT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FilardoA11, author = {Nathaniel Wesley Filardo and Giuseppe Ateniese}, title = {High-Entropy Visual Identification for Touch Screen Devices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {359}, year = {2011}, url = {http://eprint.iacr.org/2011/359}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FilardoA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/StantonMBA10, author = {Paul T. Stanton and Benjamin McKeown and Randal C. Burns and Giuseppe Ateniese}, title = {FastAD: an authenticated directory for billions of objects}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {44}, number = {1}, pages = {45--49}, year = {2010}, url = {https://doi.org/10.1145/1740390.1740401}, doi = {10.1145/1740390.1740401}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigops/StantonMBA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChenCAB10, author = {Bo Chen and Reza Curtmola and Giuseppe Ateniese and Randal C. Burns}, editor = {Adrian Perrig and Radu Sion}, title = {Remote data checking for network coding-based distributed storage systems}, booktitle = {Proceedings of the 2nd {ACM} Cloud Computing Security Workshop, {CCSW} 2010, Chicago, IL, USA, October 8, 2010}, pages = {31--42}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866835.1866842}, doi = {10.1145/1866835.1866842}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChenCAB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/GastiAB10, author = {Paolo Gasti and Giuseppe Ateniese and Marina Blanton}, editor = {Ehab Al{-}Shaer and Keith B. Frikken}, title = {Deniable cloud storage: sharing files via public-key deniability}, booktitle = {Proceedings of the 2010 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2010, Chicago, Illinois, USA, October 4, 2010}, pages = {31--42}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866919.1866925}, doi = {10.1145/1866919.1866925}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/GastiAB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseCT10, author = {Giuseppe Ateniese and Emiliano De Cristofaro and Gene Tsudik}, title = {(If) Size Matters: Size-Hiding Private Set Intersection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {220}, year = {2010}, url = {http://eprint.iacr.org/2010/220}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseCT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/AtenieseCJT09, author = {Giuseppe Ateniese and Jan Camenisch and Marc Joye and Gene Tsudik}, title = {Remarks on ''Analysis of one popular group signature scheme'' in Asiacrypt 2006}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {4}, pages = {320--322}, year = {2009}, url = {https://doi.org/10.1504/IJACT.2009.028030}, doi = {10.1504/IJACT.2009.028030}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/AtenieseCJT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AtenieseKK09, author = {Giuseppe Ateniese and Seny Kamara and Jonathan Katz}, editor = {Mitsuru Matsui}, title = {Proofs of Storage from Homomorphic Identification Protocols}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {319--333}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_19}, doi = {10.1007/978-3-642-10366-7\_19}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AtenieseKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/AtenieseG09, author = {Giuseppe Ateniese and Paolo Gasti}, editor = {Marc Fischlin}, title = {Universally Anonymous {IBE} Based on the Quadratic Residuosity Assumption}, booktitle = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5473}, pages = {32--47}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00862-7\_3}, doi = {10.1007/978-3-642-00862-7\_3}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/AtenieseG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/AtenieseBH09, author = {Giuseppe Ateniese and Karyn Benson and Susan Hohenberger}, editor = {Marc Fischlin}, title = {Key-Private Proxy Re-encryption}, booktitle = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5473}, pages = {279--294}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00862-7\_19}, doi = {10.1007/978-3-642-00862-7\_19}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/AtenieseBH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseG09, author = {Giuseppe Ateniese and Paolo Gasti}, title = {Universally Anonymous {IBE} based on the Quadratic Residuosity Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {280}, year = {2009}, url = {http://eprint.iacr.org/2009/280}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/CurtmolaKBA08, author = {Reza Curtmola and Osama Khan and Randal C. Burns and Giuseppe Ateniese}, title = {{MR-PDP:} Multiple-Replica Provable Data Possession}, booktitle = {28th {IEEE} International Conference on Distributed Computing Systems {(ICDCS} 2008), 17-20 June 2008, Beijing, China}, pages = {411--420}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICDCS.2008.68}, doi = {10.1109/ICDCS.2008.68}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/CurtmolaKBA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/AteniesePMT08, author = {Giuseppe Ateniese and Roberto Di Pietro and Luigi V. Mancini and Gene Tsudik}, editor = {Albert Levi and Peng Liu and Refik Molva}, title = {Scalable and efficient provable data possession}, booktitle = {4th International {ICST} Conference on Security and Privacy in Communication Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008}, pages = {9}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1460877.1460889}, doi = {10.1145/1460877.1460889}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/AteniesePMT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AteniesePMT08, author = {Giuseppe Ateniese and Roberto Di Pietro and Luigi V. Mancini and Gene Tsudik}, title = {Scalable and Efficient Provable Data Possession}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {114}, year = {2008}, url = {http://eprint.iacr.org/2008/114}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AteniesePMT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseBH08, author = {Giuseppe Ateniese and Karyn Benson and Susan Hohenberger}, title = {Key-Private Proxy Re-Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {463}, year = {2008}, url = {http://eprint.iacr.org/2008/463}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseBH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/GreenA07, author = {Matthew Green and Giuseppe Ateniese}, editor = {Jonathan Katz and Moti Yung}, title = {Identity-Based Proxy Re-encryption}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {288--306}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_19}, doi = {10.1007/978-3-540-72738-5\_19}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/GreenA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AtenieseBCHKPS07, author = {Giuseppe Ateniese and Randal C. Burns and Reza Curtmola and Joseph Herring and Lea Kissner and Zachary N. J. Peterson and Dawn Xiaodong Song}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Provable data possession at untrusted stores}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {598--609}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315318}, doi = {10.1145/1315245.1315318}, timestamp = {Tue, 10 Nov 2020 20:00:14 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AtenieseBCHKPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fast/PetersonBAB07, author = {Zachary N. J. Peterson and Randal C. Burns and Giuseppe Ateniese and Stephen Bono}, editor = {Andrea C. Arpaci{-}Dusseau and Remzi H. Arpaci{-}Dusseau}, title = {Design and Implementation of Verifiable Audit Trails for a Versioning File System}, booktitle = {5th {USENIX} Conference on File and Storage Technologies, {FAST} 2007, February 13-16, 2007, San Jose, CA, {USA}}, pages = {93--106}, publisher = {{USENIX}}, year = {2007}, url = {http://www.usenix.org/events/fast07/tech/peterson.html}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fast/PetersonBAB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/AtenieseKB07, author = {Giuseppe Ateniese and Jonathan Kirsch and Marina Blanton}, title = {Secret Handshakes with Dynamic and Fuzzy Matching}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2007, San Diego, California, USA, 28th February - 2nd March 2007}, publisher = {The Internet Society}, year = {2007}, url = {https://www.ndss-symposium.org/ndss2007/secret-handshakes-dynamic-and-fuzzy-matching/}, timestamp = {Mon, 01 Feb 2021 08:42:16 +0100}, biburl = {https://dblp.org/rec/conf/ndss/AtenieseKB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseBCHKPS07, author = {Giuseppe Ateniese and Randal C. Burns and Reza Curtmola and Joseph Herring and Lea Kissner and Zachary N. J. Peterson and Dawn Song}, title = {Provable Data Possession at Untrusted Stores}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {202}, year = {2007}, url = {http://eprint.iacr.org/2007/202}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseBCHKPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AtenieseFGH06, author = {Giuseppe Ateniese and Kevin Fu and Matthew Green and Susan Hohenberger}, title = {Improved proxy re-encryption schemes with applications to secure distributed storage}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {9}, number = {1}, pages = {1--30}, year = {2006}, url = {https://doi.org/10.1145/1127345.1127346}, doi = {10.1145/1127345.1127346}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/AtenieseFGH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/AtenieseRS06, author = {Giuseppe Ateniese and Chris Riley and Christian Scheideler}, title = {Survivable Monitoring in Dynamic Networks}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {5}, number = {9}, pages = {1242--1254}, year = {2006}, url = {https://doi.org/10.1109/TMC.2006.138}, doi = {10.1109/TMC.2006.138}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/AtenieseRS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AtenieseSFM06, author = {Giuseppe Ateniese and Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci}, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {Provably-secure time-bound hierarchical key assignment schemes}, booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, pages = {288--297}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405.1180441}, doi = {10.1145/1180405.1180441}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AtenieseSFM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseSFM06, author = {Giuseppe Ateniese and Alfredo De Santis and Anna Lisa Ferrara and Barbara Masucci}, title = {Provably-Secure Time-Bound Hierarchical Key Assignment Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {225}, year = {2006}, url = {http://eprint.iacr.org/2006/225}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseSFM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseCJT06, author = {Giuseppe Ateniese and Jan Camenisch and Marc Joye and Gene Tsudik}, title = {Remarks on "Analysis of One Popular Group Signature Scheme" in Asiacrypt 2006}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {464}, year = {2006}, url = {http://eprint.iacr.org/2006/464}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseCJT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GreenA06, author = {Matthew Green and Giuseppe Ateniese}, title = {Identity-Based Proxy Re-encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {473}, year = {2006}, url = {http://eprint.iacr.org/2006/473}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GreenA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/CurtmolaSA05, author = {Reza Curtmola and Aniello Del Sorbo and Giuseppe Ateniese}, editor = {Yvo Desmedt and Huaxiong Wang and Yi Mu and Yongqing Li}, title = {On the Performance and Analysis of {DNS} Security Extensions}, booktitle = {Cryptology and Network Security, 4th International Conference, {CANS} 2005, Xiamen, China, December 14-16, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3810}, pages = {288--303}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599371\_24}, doi = {10.1007/11599371\_24}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/CurtmolaSA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AtenieseCM05, author = {Giuseppe Ateniese and Jan Camenisch and Breno de Medeiros}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Untraceable {RFID} tags via insubvertible encryption}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {92--101}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102134}, doi = {10.1145/1102120.1102134}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AtenieseCM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AtenieseH05, author = {Giuseppe Ateniese and Susan Hohenberger}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Proxy re-signatures: new definitions, algorithms, and applications}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {310--319}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102161}, doi = {10.1145/1102120.1102161}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AtenieseH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AtenieseCMT05, author = {Giuseppe Ateniese and Daniel H. Chou and Breno de Medeiros and Gene Tsudik}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Sanitizable Signatures}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {159--177}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_10}, doi = {10.1007/11555827\_10}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AtenieseCMT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/AtenieseFGH05, author = {Giuseppe Ateniese and Kevin Fu and Matthew Green and Susan Hohenberger}, title = {Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2005, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2005}, url = {https://www.ndss-symposium.org/ndss2005/improved-proxy-re-encryption-schemes-applications-secure-distributed-storage/}, timestamp = {Mon, 01 Feb 2021 08:42:12 +0100}, biburl = {https://dblp.org/rec/conf/ndss/AtenieseFGH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/storagess/BurnsPAB05, author = {Randal C. Burns and Zachary N. J. Peterson and Giuseppe Ateniese and Stephen Bono}, editor = {Vijay Atluri and Pierangela Samarati and William Yurcik and Larry Brumbaugh and Yuanyuan Zhou}, title = {Verifiable audit trails for a versioning file system}, booktitle = {Proceedings of the 2005 {ACM} Workshop On Storage Security And Survivability, StorageSS 2005, Fairfax, VA, USA, November 11, 2005}, pages = {44--50}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1103780.1103787}, doi = {10.1145/1103780.1103787}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/storagess/BurnsPAB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseFGH05, author = {Giuseppe Ateniese and Kevin Fu and Matthew Green and Susan Hohenberger}, title = {Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {28}, year = {2005}, url = {http://eprint.iacr.org/2005/028}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseFGH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseCHM05, author = {Giuseppe Ateniese and Jan Camenisch and Susan Hohenberger and Breno de Medeiros}, title = {Practical Group Signatures without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {385}, year = {2005}, url = {http://eprint.iacr.org/2005/385}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseCHM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseH05, author = {Giuseppe Ateniese and Susan Hohenberger}, title = {Proxy Re-Signatures: New Definitions, Algorithms, and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {433}, year = {2005}, url = {http://eprint.iacr.org/2005/433}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Ateniese04, author = {Giuseppe Ateniese}, title = {Verifiable encryption of digital signatures and applications}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {7}, number = {1}, pages = {1--20}, year = {2004}, url = {https://doi.org/10.1145/984334.984335}, doi = {10.1145/984334.984335}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/Ateniese04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AtenieseM04, author = {Giuseppe Ateniese and Breno de Medeiros}, editor = {Ari Juels}, title = {Identity-Based Chameleon Hash and Applications}, booktitle = {Financial Cryptography, 8th International Conference, {FC} 2004, Key West, FL, USA, February 9-12, 2004. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3110}, pages = {164--180}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27809-2\_19}, doi = {10.1007/978-3-540-27809-2\_19}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/AtenieseM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwia/AtenieseRS04, author = {Giuseppe Ateniese and Chris Riley and Christian Scheideler}, editor = {John L. Cole and Stephen D. Wolthusen}, title = {Survivable Monitoring in Dynamic Networks}, booktitle = {Proceedings of the Second {IEEE} International Workshop on Information Assurance (IWIA'04), April 8-9, 2004, Charlotte, North Carolina, {USA}}, pages = {33--47}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/IWIA.2004.1288036}, doi = {10.1109/IWIA.2004.1288036}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwia/AtenieseRS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/AtenieseM04, author = {Giuseppe Ateniese and Breno de Medeiros}, editor = {Carlo Blundo and Stelvio Cimato}, title = {On the Key Exposure Problem in Chameleon Hashes}, booktitle = {Security in Communication Networks, 4th International Conference, {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3352}, pages = {165--179}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30598-9\_12}, doi = {10.1007/978-3-540-30598-9\_12}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/AtenieseM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseM04, author = {Giuseppe Ateniese and Breno de Medeiros}, title = {A Provably Secure Nyberg-Rueppel Signature Variant with Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {93}, year = {2004}, url = {http://eprint.iacr.org/2004/093}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseM04a, author = {Giuseppe Ateniese and Breno de Medeiros}, title = {On the Key Exposure Problem in Chameleon Hashes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {243}, year = {2004}, url = {http://eprint.iacr.org/2004/243}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseM04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AtenieseM03, author = {Giuseppe Ateniese and Breno de Medeiros}, editor = {Chi{-}Sung Laih}, title = {Efficient Group Signatures without Trapdoors}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2894}, pages = {246--268}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40061-5\_15}, doi = {10.1007/978-3-540-40061-5\_15}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AtenieseM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseM03, author = {Giuseppe Ateniese and Breno de Medeiros}, title = {Identity-based Chameleon Hash and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {167}, year = {2003}, url = {http://eprint.iacr.org/2003/167}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/AtenieseN02, author = {Giuseppe Ateniese and Cristina Nita{-}Rotaru}, editor = {Bart Preneel}, title = {Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption}, booktitle = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2271}, pages = {182--199}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45760-7\_13}, doi = {10.1007/3-540-45760-7\_13}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/AtenieseN02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AtenieseST02, author = {Giuseppe Ateniese and Dawn Xiaodong Song and Gene Tsudik}, editor = {Matt Blaze}, title = {Quasi-Efficient Revocation in Group Signatures}, booktitle = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton, Bermuda, March 11-14, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2357}, pages = {183--197}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36504-4\_14}, doi = {10.1007/3-540-36504-4\_14}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/AtenieseST02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/AtenieseCMD02, author = {Giuseppe Ateniese and Reza Curtmola and Breno de Medeiros and Darren Davis}, editor = {Stelvio Cimato and Clemente Galdi and Giuseppe Persiano}, title = {Medical Information Privacy Assurance: Cryptographic and System Aspects}, booktitle = {Security in Communication Networks, Third International Conference, {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2576}, pages = {199--218}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36413-7\_15}, doi = {10.1007/3-540-36413-7\_15}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/AtenieseCMD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/AtenieseM02, author = {Giuseppe Ateniese and Breno de Medeiros}, editor = {Sushil Jajodia and Pierangela Samarati}, title = {Anonymous E-prescriptions}, booktitle = {Proceedings of the 2002 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2002, Washington, DC, USA, November 21, 2002}, pages = {19--31}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/644527.644530}, doi = {10.1145/644527.644530}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/AtenieseM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseM02, author = {Giuseppe Ateniese and Breno de Medeiros}, title = {Efficient Group Signatures without Trapdoors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {173}, year = {2002}, url = {http://eprint.iacr.org/2002/173}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/AtenieseBSS01, author = {Giuseppe Ateniese and Carlo Blundo and Alfredo De Santis and Douglas R. Stinson}, title = {Extended capabilities for visual cryptography}, journal = {Theor. Comput. Sci.}, volume = {250}, number = {1-2}, pages = {143--161}, year = {2001}, url = {https://doi.org/10.1016/S0304-3975(99)00127-9}, doi = {10.1016/S0304-3975(99)00127-9}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/AtenieseBSS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AtenieseM01, author = {Giuseppe Ateniese and Stefan Mangard}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {A new approach to {DNS} security {(DNSSEC)}}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {86--95}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.501996}, doi = {10.1145/501983.501996}, timestamp = {Tue, 10 Nov 2020 20:00:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AtenieseM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/AtenieseMG01, author = {Giuseppe Ateniese and Breno de Medeiros and Michael T. Goodrich}, title = {{TRICERT:} {A} Distributed Certified E-Mail Scheme}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2001, San Diego, California, {USA}}, publisher = {The Internet Society}, year = {2001}, url = {https://www.ndss-symposium.org/ndss2001/tricert-distributed-certified-e-mail-scheme/}, timestamp = {Mon, 01 Feb 2021 08:42:22 +0100}, biburl = {https://dblp.org/rec/conf/ndss/AtenieseMG01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AtenieseST01, author = {Giuseppe Ateniese and Dawn Song and Gene Tsudik}, title = {Quasi-Efficient Revocation of Group Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {101}, year = {2001}, url = {http://eprint.iacr.org/2001/101}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AtenieseST01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/AtenieseST00, author = {Giuseppe Ateniese and Michael Steiner and Gene Tsudik}, title = {New multiparty authentication services and key agreement protocols}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {18}, number = {4}, pages = {628--639}, year = {2000}, url = {https://doi.org/10.1109/49.839937}, doi = {10.1109/49.839937}, timestamp = {Sat, 23 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/AtenieseST00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AtenieseCJT00, author = {Giuseppe Ateniese and Jan Camenisch and Marc Joye and Gene Tsudik}, editor = {Mihir Bellare}, title = {A Practical and Provably Secure Coalition-Resistant Group Signature Scheme}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {255--270}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_16}, doi = {10.1007/3-540-44598-6\_16}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AtenieseCJT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/StantonAHAKNSST00, author = {Jonathan Robert Stanton and Yair Amir and Damian Hasse and Giuseppe Ateniese and Yongdae Kim and Cristina Nita{-}Rotaru and Theo Schlossnagle and John L. Schultz and Gene Tsudik}, title = {Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments}, booktitle = {Proceedings of the 20th International Conference on Distributed Computing Systems, Taipei, Taiwan, April 10-13, 2000}, pages = {330--343}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ICDCS.2000.840945}, doi = {10.1109/ICDCS.2000.840945}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/StantonAHAKNSST00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/AtenieseHKT99, author = {Giuseppe Ateniese and Amir Herzberg and Hugo Krawczyk and Gene Tsudik}, title = {Untraceable mobility or how to travel incognito}, journal = {Comput. Networks}, volume = {31}, number = {8}, pages = {871--884}, year = {1999}, url = {https://doi.org/10.1016/S1389-1286(98)00021-8}, doi = {10.1016/S1389-1286(98)00021-8}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/AtenieseHKT99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Ateniese99, author = {Giuseppe Ateniese}, editor = {Juzar Motiwalla and Gene Tsudik}, title = {Efficient Verifiable Encryption (and Fair Exchange) of Digital Signatures}, booktitle = {{CCS} '99, Proceedings of the 6th {ACM} Conference on Computer and Communications Security, Singapore, November 1-4, 1999}, pages = {138--146}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/319709.319728}, doi = {10.1145/319709.319728}, timestamp = {Tue, 10 Nov 2020 20:00:25 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Ateniese99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AtenieseT99, author = {Giuseppe Ateniese and Gene Tsudik}, editor = {Matthew K. Franklin}, title = {Some Open Issues and New Directions in Group Signatures}, booktitle = {Financial Cryptography, Third International Conference, FC'99, Anguilla, British West Indies, February 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1648}, pages = {196--211}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48390-X\_15}, doi = {10.1007/3-540-48390-X\_15}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/AtenieseT99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soda/AtenieseT99, author = {Giuseppe Ateniese and Gene Tsudik}, editor = {Robert Endre Tarjan and Tandy J. Warnow}, title = {Group Signatures \emph{{\'{A}} la carte}}, booktitle = {Proceedings of the Tenth Annual {ACM-SIAM} Symposium on Discrete Algorithms, 17-19 January 1999, Baltimore, Maryland, {USA}}, pages = {848--849}, publisher = {{ACM/SIAM}}, year = {1999}, url = {http://dl.acm.org/citation.cfm?id=314500.314964}, timestamp = {Thu, 05 Jul 2018 07:29:57 +0200}, biburl = {https://dblp.org/rec/conf/soda/AtenieseT99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AtenieseST98, author = {Giuseppe Ateniese and Michael Steiner and Gene Tsudik}, editor = {Li Gong and Michael K. Reiter}, title = {Authenticated Group Key Agreement and Friends}, booktitle = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and Communications Security, San Francisco, CA, USA, November 3-5, 1998}, pages = {17--26}, publisher = {{ACM}}, year = {1998}, url = {https://doi.org/10.1145/288090.288097}, doi = {10.1145/288090.288097}, timestamp = {Tue, 10 Nov 2020 20:00:11 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AtenieseST98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/AtenieseBSS96, author = {Giuseppe Ateniese and Carlo Blundo and Alfredo De Santis and Douglas R. Stinson}, title = {Visual Cryptography for General Access Structures}, journal = {Inf. Comput.}, volume = {129}, number = {2}, pages = {86--106}, year = {1996}, url = {https://doi.org/10.1006/inco.1996.0076}, doi = {10.1006/INCO.1996.0076}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iandc/AtenieseBSS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/AtenieseBSS96, author = {Giuseppe Ateniese and Carlo Blundo and Alfredo De Santis and Douglas R. Stinson}, editor = {Friedhelm Meyer auf der Heide and Burkhard Monien}, title = {Constructions and Bounds for Visual Cryptography}, booktitle = {Automata, Languages and Programming, 23rd International Colloquium, ICALP96, Paderborn, Germany, 8-12 July 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1099}, pages = {416--428}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61440-0\_147}, doi = {10.1007/3-540-61440-0\_147}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/AtenieseBSS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/ECCC-TR96-012, author = {Giuseppe Ateniese and Carlo Blundo and Alfredo De Santis and Douglas R. Stinson}, title = {Visual Cryptography for General Access Structures}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR96-012}}, year = {1996}, url = {https://eccc.weizmann.ac.il/eccc-reports/1996/TR96-012/index.html}, eprinttype = {ECCC}, eprint = {TR96-012}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/ECCC-TR96-012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.