Alessandro Sorniotti

According to our database1, Alessandro Sorniotti authored at least 41 papers between 2007 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 





Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data.
IACR Cryptology ePrint Archive, 2019

SMoTherSpectre: exploiting speculative execution through port contention.
CoRR, 2019

StreamChain: Do Blockchains Need Blocks?
CoRR, 2018

Blockchain and Trusted Computing: Problems, Pitfalls, and a Solution for Hyperledger Fabric.
CoRR, 2018

Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains.
CoRR, 2018

StreamChain: Do Blockchains Need Blocks?
Proceedings of the 2nd Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, 2018

Scalable Key Management for Distributed Cloud Storage.
Proceedings of the 2018 IEEE International Conference on Cloud Engineering, 2018

Permissioned Blockchains and Hyperledger Fabric.
ERCIM News, 2017

Proof of ownership for deduplication systems: A secure, scalable, and efficient solution.
Computer Communications, 2016

TREDISEC: Trust-Aware REliable and Distributed Information SEcurity in the Cloud.
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015

A Secure Data Deduplication Scheme for Cloud Storage.
Proceedings of the Financial Cryptography and Data Security, 2014

A tunable proof of ownership scheme for deduplication using Bloom filters.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Reconciling End-to-End Confidentiality and Data Reduction In Cloud Storage.
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014

Policy-based Secure Deletion.
IACR Cryptology ePrint Archive, 2013

An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations.
Computers & Security, 2013

Secure Logical Isolation for Multi-tenancy in cloud storage.
Proceedings of the IEEE 29th Symposium on Mass Storage Systems and Technologies, 2013

Policy-based secure deletion.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

On limitations of using cloud storage for data replication.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012

Robust data sharing with key-value stores.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

Boosting efficiency and security in proof of ownership for deduplication.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure?
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

Attack surface reduction for commodity OS kernels: trimmed garden plants may attract less bugs.
Proceedings of the Fourth European Workshop on System Security, 2011

Protocoles pour Poignées de Main Secrètes. (Secret Handshake Protocols).
PhD thesis, 2010

A provably secure secret handshake with dynamic controlled matching.
Computers & Security, 2010

Secret interest groups (SIGs) in social networks with an implementation on Facebook.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Privacy-aware policy matching.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Federated Secret Handshakes with Support for Revocation.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Searchable Encryption for Outsourced Data Analytics.
Proceedings of the Public Key Infrastructures, Services and Applications, 2010

Efficient Access Control for Wireless Sensor Data.
IJWIN, 2009

Efficient Access Control forWireless Sensor Data.
Ad Hoc & Sensor Wireless Networks, 2009

RFID-based supply chain partner authentication and key agreement.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

A Security Pattern for Untraceable Secret Handshakes.
Proceedings of the Third International Conference on Emerging Security Information, 2009

A Provably Secure Secret Handshake with Dynamic Controlled Matching.
Proceedings of the Emerging Challenges for Security, 2009

Secret Handshakes with Revocation Support.
Proceedings of the Information, Security and Cryptology, 2009

Trustworthiness Assessment of Wireless Sensor Data for Business Applications.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

Operational comparison of available bandwidth estimation tools.
Computer Communication Review, 2008

Efficient access control for wireless sensor data.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

Encryption-based access control for building management.
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2008

Design guidelines for integration of wireless sensor networks with enterprise systems.
Proceedings of the 1st International Conference on MOBILe Wireless MiddleWARE, 2008

Design Guidelines for an Internet-Scaled QoS Framework.
Proceedings of the Fourth European Conference on Universal Multiservice Networks (ECUMN 2007), 2007