Alessandro Sorniotti

According to our database1, Alessandro Sorniotti authored at least 53 papers between 2007 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
On the (In)Security of ElGamal in OpenPGP.
Commun. ACM, June, 2023

How to Bind Anonymous Credentials to Humans.
IACR Cryptol. ePrint Arch., 2023

A Framework for Practical Anonymous Credentials from Lattices.
IACR Cryptol. ePrint Arch., 2023

Go or No Go: Differential Fuzzing of Native and C Libraries.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

2021
IBM Digital Health Pass Whitepaper: A Privacy-Respectful Platform for Proving Health Status.
IACR Cryptol. ePrint Arch., 2021

GhostBuster: understanding and overcoming the pitfalls of transient execution vulnerability checkers.
Proceedings of the 28th IEEE International Conference on Software Analysis, 2021

Bypassing memory safety mechanisms through speculative control flow hijacks.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

StreamChain: Building a Low-Latency Permissioned Blockchain For Enterprise Use-Cases.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

2020
Multi-Shard Private Transactions for Permissioned Blockchains.
CoRR, 2020

2019
Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data.
IACR Cryptol. ePrint Arch., 2019

Two methods for exploiting speculative control flow hijacks.
Proceedings of the 13th USENIX Workshop on Offensive Technologies, 2019

Trusted Computing Meets Blockchain: Rollback Attacks and a Solution for Hyperledger Fabric.
Proceedings of the 38th Symposium on Reliable Distributed Systems, 2019

Model-Driven Engineering for Multi-party Interactions on a Blockchain - An Example.
Proceedings of the Service-Oriented Computing - ICSOC 2019 Workshops, 2019

Memory Categorization: Separating Attacker-Controlled Data.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2019

SMoTherSpectre: Exploiting Speculative Execution through Port Contention.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Endorsement in Hyperledger Fabric.
Proceedings of the IEEE International Conference on Blockchain, 2019

Speculator: a tool to analyze speculative execution attacks and mitigations.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
Blockchain and Trusted Computing: Problems, Pitfalls, and a Solution for Hyperledger Fabric.
CoRR, 2018

StreamChain: Do Blockchains Need Blocks?
Proceedings of the 2nd Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers, 2018

Scalable Key Management for Distributed Cloud Storage.
Proceedings of the 2018 IEEE International Conference on Cloud Engineering, 2018


2017
Permissioned Blockchains and Hyperledger Fabric.
ERCIM News, 2017

2016
Proof of ownership for deduplication systems: A secure, scalable, and efficient solution.
Comput. Commun., 2016

2015
TREDISEC: Trust-Aware REliable and Distributed Information SEcurity in the Cloud.
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015

2014
A Secure Data Deduplication Scheme for Cloud Storage.
Proceedings of the Financial Cryptography and Data Security, 2014

A tunable proof of ownership scheme for deduplication using Bloom filters.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Reconciling End-to-End Confidentiality and Data Reduction In Cloud Storage.
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014

2013
Policy-based Secure Deletion.
IACR Cryptol. ePrint Arch., 2013

An authentication flaw in browser-based Single Sign-On protocols: Impact and remediations.
Comput. Secur., 2013

Secure Logical Isolation for Multi-tenancy in cloud storage.
Proceedings of the IEEE 29th Symposium on Mass Storage Systems and Technologies, 2013

2012
On limitations of using cloud storage for data replication.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012

Robust data sharing with key-value stores.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

Boosting efficiency and security in proof of ownership for deduplication.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure?
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

Attack surface reduction for commodity OS kernels: trimmed garden plants may attract less bugs.
Proceedings of the Fourth European Workshop on System Security, 2011

2010
Protocoles pour Poignées de Main Secrètes. (Secret Handshake Protocols).
PhD thesis, 2010

A provably secure secret handshake with dynamic controlled matching.
Comput. Secur., 2010

Secret interest groups (SIGs) in social networks with an implementation on Facebook.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Privacy-aware policy matching.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Federated Secret Handshakes with Support for Revocation.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Searchable Encryption for Outsourced Data Analytics.
Proceedings of the Public Key Infrastructures, Services and Applications, 2010

2009
Efficient Access Control for Wireless Sensor Data.
Int. J. Wirel. Inf. Networks, 2009

Efficient Access Control forWireless Sensor Data.
Ad Hoc Sens. Wirel. Networks, 2009

RFID-based supply chain partner authentication and key agreement.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

A Security Pattern for Untraceable Secret Handshakes.
Proceedings of the Third International Conference on Emerging Security Information, 2009

Secret Handshakes with Revocation Support.
Proceedings of the Information, Security and Cryptology, 2009

Trustworthiness Assessment of Wireless Sensor Data for Business Applications.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

Access Control in Mobile and Ubiquitous Environments.
Proceedings of the Context-Aware Mobile and Ubiquitous Computing for Enhanced Usability, 2009

2008
Operational comparison of available bandwidth estimation tools.
Comput. Commun. Rev., 2008

Efficient access control for wireless sensor data.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

Encryption-based access control for building management.
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2008

Design guidelines for integration of wireless sensor networks with enterprise systems.
Proceedings of the 1st International Conference on MOBILe Wireless MiddleWARE, 2008

2007
Design Guidelines for an Internet-Scaled QoS Framework.
Proceedings of the Fourth European Conference on Universal Multiservice Networks (ECUMN 2007), 2007


  Loading...