According to our database1, Alessandro Sorniotti authored at least 41 papers between 2007 and 2019.
Legend:Book In proceedings Article PhD thesis Other
Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data.
IACR Cryptology ePrint Archive, 2019
SMoTherSpectre: exploiting speculative execution through port contention.
StreamChain: Do Blockchains Need Blocks?
Blockchain and Trusted Computing: Problems, Pitfalls, and a Solution for Hyperledger Fabric.
Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains.
StreamChain: Do Blockchains Need Blocks?
Proceedings of the 2nd Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, 2018
Scalable Key Management for Distributed Cloud Storage.
Proceedings of the 2018 IEEE International Conference on Cloud Engineering, 2018
Hyperledger fabric: a distributed operating system for permissioned blockchains.
Proceedings of the Thirteenth EuroSys Conference, 2018
Permissioned Blockchains and Hyperledger Fabric.
ERCIM News, 2017
Proof of ownership for deduplication systems: A secure, scalable, and efficient solution.
Computer Communications, 2016
TREDISEC: Trust-Aware REliable and Distributed Information SEcurity in the Cloud.
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015
A Secure Data Deduplication Scheme for Cloud Storage.
Proceedings of the Financial Cryptography and Data Security, 2014
A tunable proof of ownership scheme for deduplication using Bloom filters.
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Reconciling End-to-End Confidentiality and Data Reduction In Cloud Storage.
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014
Policy-based Secure Deletion.
IACR Cryptology ePrint Archive, 2013
An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations.
Computers & Security, 2013
Secure Logical Isolation for Multi-tenancy in cloud storage.
Proceedings of the IEEE 29th Symposium on Mass Storage Systems and Technologies, 2013
Policy-based secure deletion.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
On limitations of using cloud storage for data replication.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012
Robust data sharing with key-value stores.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012
Boosting efficiency and security in proof of ownership for deduplication.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure?
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011
Attack surface reduction for commodity OS kernels: trimmed garden plants may attract less bugs.
Proceedings of the Fourth European Workshop on System Security, 2011
Protocoles pour Poignées de Main Secrètes. (Secret Handshake Protocols).
PhD thesis, 2010
A provably secure secret handshake with dynamic controlled matching.
Computers & Security, 2010
Secret interest groups (SIGs) in social networks with an implementation on Facebook.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Privacy-aware policy matching.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010
Federated Secret Handshakes with Support for Revocation.
Proceedings of the Information and Communications Security - 12th International Conference, 2010
Searchable Encryption for Outsourced Data Analytics.
Proceedings of the Public Key Infrastructures, Services and Applications, 2010
Efficient Access Control for Wireless Sensor Data.
Efficient Access Control forWireless Sensor Data.
Ad Hoc & Sensor Wireless Networks, 2009
RFID-based supply chain partner authentication and key agreement.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
A Security Pattern for Untraceable Secret Handshakes.
Proceedings of the Third International Conference on Emerging Security Information, 2009
A Provably Secure Secret Handshake with Dynamic Controlled Matching.
Proceedings of the Emerging Challenges for Security, 2009
Secret Handshakes with Revocation Support.
Proceedings of the Information, Security and Cryptology, 2009
Trustworthiness Assessment of Wireless Sensor Data for Business Applications.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009
Operational comparison of available bandwidth estimation tools.
Computer Communication Review, 2008
Efficient access control for wireless sensor data.
Proceedings of the IEEE 19th International Symposium on Personal, 2008
Encryption-based access control for building management.
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2008
Design guidelines for integration of wireless sensor networks with enterprise systems.
Proceedings of the 1st International Conference on MOBILe Wireless MiddleWARE, 2008
Design Guidelines for an Internet-Scaled QoS Framework.
Proceedings of the Fourth European Conference on Universal Multiservice Networks (ECUMN 2007), 2007