Alfredo De Santis

According to our database1, Alfredo De Santis authored at least 217 papers between 1986 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
One-pass lossless data hiding and compression of remote sensing data.
Future Generation Comp. Syst., 2019

2018
Integrity for an Event Notification Within the Industrial Internet of Things by Using Group Signatures.
IEEE Trans. Industrial Informatics, 2018

On the protection of consumer genomic data in the Internet of Living Things.
Computers & Security, 2018

Blockchain: A Panacea for Healthcare Cloud-Based Data Security and Privacy?
IEEE Cloud Computing, 2018

Data hiding using compressed archives.
Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, 2018

Probabilistic Secret Sharing.
Proceedings of the 43rd International Symposium on Mathematical Foundations of Computer Science, 2018

On the Equivalence of 2-Threshold Secret Sharing Schemes and Prefix Codes.
Proceedings of the Cyberspace Safety and Security - 10th International Symposium, 2018

2017
Exploiting Battery-Drain Vulnerabilities in Mobile Smart Devices.
T-SUSC, 2017

On-Board Format-Independent Security of Functional Magnetic Resonance Images.
ACM Trans. Embedded Comput. Syst., 2017

Guest Editorial Special Issue on Insider Threats to Information Security, Digital Espionage, and Counter-Intelligence.
IEEE Systems Journal, 2017

Supporting dynamic updates in storage clouds with the Akl-Taylor scheme.
Inf. Sci., 2017

A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants.
Future Generation Comp. Syst., 2017

Secure group communication schemes for dynamic heterogeneous distributed computing.
Future Generation Comp. Syst., 2017

Reducing Costs in HSM-Based Data Centers.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

One-Message Unilateral Entity Authentication Schemes.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Cryptographic Hierarchical Access Control for Dynamic Structures.
IEEE Trans. Information Forensics and Security, 2016

Hierarchical and Shared Access Control.
IEEE Trans. Information Forensics and Security, 2016

Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes.
IEEE Trans. Dependable Sec. Comput., 2016

Privacy-Aware Routing for Sharing Sensitive Information across Wide-Area Networks.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
A triadic closure and homophily-based recommendation system for online social networks.
World Wide Web, 2015

Anonymous protocols: Notions and equivalence.
Theor. Comput. Sci., 2015

Using HTML5 to prevent detection of drive-by-download web malware.
Security and Communication Networks, 2015

Secure and reliable data communication in developing regions and rural areas.
Pervasive and Mobile Computing, 2015

Modeling energy-efficient secure communications in multi-mode wireless mobile devices.
J. Comput. Syst. Sci., 2015

Cloud-based adaptive compression and secure management services for 3D healthcare data.
Future Generation Comp. Syst., 2015

A New Flexible Protocol for Docking Studies.
Proceedings of the Advances in Artificial Life, Evolutionary Computation and Systems Chemistry, 2015

Novel Algorithm for Efficient Distribution of Molecular Docking Calculations.
Proceedings of the Advances in Artificial Life, Evolutionary Computation and Systems Chemistry, 2015

Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

On the Protection of fMRI Images in Multi-domain Environments.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

Format-Independent Protection of DNA Microarray Images.
Proceedings of the 10th International Conference on P2P, 2015

Reversible Copyright Protection for DNA Microarray Images.
Proceedings of the 10th International Conference on P2P, 2015

2014
On the Relation of Random Grid and Deterministic Visual Cryptography.
IEEE Trans. Information Forensics and Security, 2014

A botnet-based command and control approach relying on swarm intelligence.
J. Network and Computer Applications, 2014

A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems.
International Journal of Parallel Programming, 2014

Key Indistinguishability vs. Strong Key Indistinguishability for Hierarchical Key Assignment Schemes.
IACR Cryptology ePrint Archive, 2014

Parallel Low-Complexity Lossless Coding of Three-Dimensional Medical Images.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

Hierarchical and Shared Key Assignment.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

Protection of Microscopy Images through Digital Watermarking Techniques.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

The Role of Trust and Co-partnership in the Societal Digital Security Culture Approach.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

A Collaborative Decision-Support System for Secure Analysis of Cranial Disorders.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

Friendship Recommendations in Online Social Networks.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014

An Efficient Protocol for Reliable Data Communication on Dataless Devices.
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014

Multimedia-based battery drain attacks for Android devices.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
Color visual cryptography schemes for black and white secret images.
Theor. Comput. Sci., 2013

An intelligent security architecture for distributed firewalling environments.
J. Ambient Intelligence and Humanized Computing, 2013

A note on time-bound hierarchical key assignment schemes.
Inf. Process. Lett., 2013

Network anomaly detection with the restricted Boltzmann machine.
Neurocomputing, 2013

On the Relation of Random Grid, Probabilistic and Deterministic Visual Cryptography.
IACR Cryptology ePrint Archive, 2013

On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines.
Appl. Soft Comput., 2013

Automated Production of Predetermined Digital Evidence.
IEEE Access, 2013

Key privacy and anonymous protocols.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

On Secure Data Management in Health-Care Environment.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Measure-Independent Characterization of Contrast Optimal Visual Cryptography Schemes.
Proceedings of the Information Theoretic Security - 7th International Conference, 2013

Forensically-Sound Methods to Collect Live Network Evidence.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

Analyzing the Internet Stability in Presence of Disasters.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

Fully Distributed Secure Video Surveillance Via Portable Device with User Awareness.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
"Metaproofs" (and their Cryptographic Applications).
IACR Cryptology ePrint Archive, 2012

Engineering a secure mobile messaging framework.
Computers & Security, 2012

An asynchronous covert channel using spam.
Computers & Mathematics with Applications, 2012

Device Tracking in Private Networks via NAPT Log Analysis.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

The Forensic Analysis of a False Digital Alibi.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

How to Forge a Digital Alibi on Mac OS X.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
On Ultralightweight RFID Authentication Protocols.
IEEE Trans. Dependable Sec. Comput., 2011

Hiding Information into OOXML Documents: New Steganographic Perspectives.
JoWUA, 2011

SAVI: a new system for advanced SQL visualization.
Proceedings of the SIGITE' 11 ACM Special Interest Group for Information Technology Education Conference, 2011

Characterizing and Classifying Card-Sharing Traffic through Wavelet Analysis.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

A Forensic Analysis of Images on Online Social Networks.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

On the Construction of a False Digital Alibi on the Android OS.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

E-mail-Based Covert Channels for Asynchronous Message Steganography.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Using Colors to Improve Visual Cryptography for Black and White Images.
Proceedings of the Information Theoretic Security - 5th International Conference, 2011

Steganography and Secure Communication on Online Social Networks and Online Photo Sharing.
Proceedings of the 2011 International Conference on Broadband, 2011

Automatic, Selective and Secure Deletion of Digital Evidence.
Proceedings of the 2011 International Conference on Broadband, 2011

A Novel Anti-forensics Technique for the Android OS.
Proceedings of the 2011 International Conference on Broadband, 2011

Automated Construction of a False Digital Alibi.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

New Steganographic Techniques for the OOXML File Format.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

2010
Variations on a theme by Akl and Taylor: Security and tradeoffs.
Theor. Comput. Sci., 2010

Security and privacy issues in the Portable Document Format.
Journal of Systems and Software, 2010

Managing key hierarchies for access control enforcement: Heuristic approaches.
Computers & Security, 2010

Cheating Immune Threshold Visual Secret Sharing.
Comput. J., 2010

Towards a Lawfully Secure and Privacy Preserving Video Surveillance System.
Proceedings of the E-Commerce and Web Technologies, 11th International Conference, 2010

An Extensible Framework for Efficient Secure SMS.
Proceedings of the CISIS 2010, 2010

An Enhanced Firewall Scheme for Dynamic and Adaptive Containment of Emerging Security Threats.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2009
Efficient Key Management for Enforcing Access Control in Outsourced Scenarios.
Proceedings of the Emerging Challenges for Security, 2009

Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants.
Proceedings of the Mathematical Foundations of Computer Science 2009, 2009

Do You Trust Your Phone?
Proceedings of the E-Commerce and Web Technologies, 10th International Conference, 2009

DISCERN: A collaborative visualization system for learning cryptographic protocols.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

2008
Visualization of cryptographic protocols with GRACE.
J. Vis. Lang. Comput., 2008

On Monotone Formula Composition of Perfect Zero-Knowledge Languages.
SIAM J. Comput., 2008

An attack on a payment scheme.
Inf. Sci., 2008

From Weaknesses to Secret Disclosure in a Recent Ultra-Lightweight RFID Authentication Protocol.
IACR Cryptology ePrint Archive, 2008

An internet role-game for the laboratory of network security course.
Proceedings of the 13th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2008

Weaknesses in a Recent Ultra-Lightweight RFID Authentication Protocol.
Proceedings of the Progress in Cryptology, 2008

2007
New results on non-perfect sharing of multiple secrets.
Journal of Systems and Software, 2007

Taking advantages of a disadvantage: Digital forensics and steganography using document metadata.
Journal of Systems and Software, 2007

On Unconditionally Secure Distributed Oblivious Transfer.
J. Cryptology, 2007

New constructions for provably-secure time-bound hierarchical key assignment schemes.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Efficient Provably-Secure Hierarchical Key Assignment Schemes.
Proceedings of the Mathematical Foundations of Computer Science 2007, 2007

Optimising SD and LSD in Presence of Non-uniform Probabilities of Revocation.
Proceedings of the Information Theoretic Security - Second International Conference, 2007

Modified Original Smart Cards and Smart Card Clone Countermeasures.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
On Self-Healing Key Distribution Schemes.
IEEE Trans. Information Theory, 2006

Neural Network Techniques for Proactive Password Checking.
IEEE Trans. Dependable Sec. Comput., 2006

Visual cryptography schemes with optimal pixel expansion.
Theor. Comput. Sci., 2006

Enforcing the security of a time-bound hierarchical key assignment scheme.
Inf. Sci., 2006

Visual Cryptography Schemes with Optimal Pixel Expansion.
IACR Cryptology ePrint Archive, 2006

Unconditionally secure key assignment schemes.
Discrete Applied Mathematics, 2006

Probabilistic Visual Cryptography Schemes.
Comput. J., 2006

Cheating Immune (2, n)-Threshold Visual Secret Sharing.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

SPEECH: Secure Personal End-to-End Communication with Handheld.
Proceedings of the ISSE 2006, 2006

Provably-secure time-bound hierarchical key assignment schemes.
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30, 2006

2005
Security of public-key cryptosystems based on Chebyshev polynomials.
IEEE Trans. on Circuits and Systems, 2005

Overcoming the obfuscation of Java programs by identifier renaming.
Journal of Systems and Software, 2005

Ideal contrast visual cryptography schemes with reversing.
Inf. Process. Lett., 2005

Optimal Colored Threshold Visual Cryptography Schemes.
Des. Codes Cryptography, 2005

A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy.
Proceedings of the Coding and Cryptography, International Workshop, 2005

2004
Randomness in secret sharing and visual cryptography schemes.
Theor. Comput. Sci., 2004

A blocker-proof conditional access system.
IEEE Trans. Consumer Electronics, 2004

HYPPOCRATES: a new proactive password checker.
Journal of Systems and Software, 2004

Cryptographic key assignment schemes for any access control policy.
Inf. Process. Lett., 2004

A simple algorithm for the constrained sequence problems.
Inf. Process. Lett., 2004

Anonymous Membership Broadcast Schemes.
Des. Codes Cryptography, 2004

Design of Self-Healing Key Distribution Schemes.
Des. Codes Cryptography, 2004

Colored Visual Cryptography Without Color Darkening.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004

On NC1 Boolean Circuit Composition of Non-interactive Perfect Zero-Knowledge.
Proceedings of the Mathematical Foundations of Computer Science 2004, 2004

Definitions and Bounds for Self-Healing Key Distribution Schemes.
Proceedings of the Automata, Languages and Programming: 31st International Colloquium, 2004

2003
Contrast Optimal Threshold Visual Cryptography Schemes.
SIAM J. Discrete Math., 2003

2002
New Results on Unconditionally Secure Distributed Oblivious Transfer.
Proceedings of the Selected Areas in Cryptography, 2002

Randomness-Optimal Characterization of Two NP Proof Systems.
Proceedings of the Randomization and Approximation Techniques, 6th International Workshop, 2002

A Novel Approach to Proactive Password Checking.
Proceedings of the Infrastructure Security, International Conference, 2002

2001
Bounds on entropy in a guessing game.
IEEE Trans. Information Theory, 2001

Extended capabilities for visual cryptography.
Theor. Comput. Sci., 2001

A t-private k-database information retrieval scheme.
Int. J. Inf. Sec., 2001

Improved Schemes for Visual Cryptography.
Des. Codes Cryptography, 2001

Secret Sharing and Visual Cryptography Schemes.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

Hyppocrates.
Proceedings of the Information Security, 4th International Conference, 2001

Robust Non-interactive Zero Knowledge.
Proceedings of the Advances in Cryptology, 2001

2000
On secret set schemes.
Inf. Process. Lett., 2000

Visual cryptography for grey level images.
Inf. Process. Lett., 2000

Randomness in Visual Cryptography.
Proceedings of the STACS 2000, 2000

Necessary and Sufficient Assumptions for Non-iterative Zero-Knowledge Proofs of Knowledge for All NP Relations.
Proceedings of the Automata, Languages and Programming, 27th International Colloquium, 2000

1999
Multiple ramp schemes.
IEEE Trans. Information Theory, 1999

On the Contrast in Visual Cryptography Schemes.
J. Cryptology, 1999

On a Fallacious Bound for Authentication Codes.
J. Cryptology, 1999

A Lower Bound on the Encoding Length in Lossy Transmission.
Inf. Sci., 1999

The Graph Clustering Problem has a Perfect Zero-Knowledge Interactive Proof.
Inf. Process. Lett., 1999

Probability of Shares in Secret Sharing Schemes.
Inf. Process. Lett., 1999

Randomness Complexity of Private Computation.
Computational Complexity, 1999

Non-Interactive Zero-Knowledge: A Low-Randomness Characterization of NP.
Proceedings of the Automata, 1999

1998
On Secret Sharing Schemes.
Inf. Process. Lett., 1998

The Graph Clustering Problem has a Perfect Zero-Knowledge Proof.
IACR Cryptology ePrint Archive, 1998

The Graph Clustering Problem has a Perfect Zero-Knowledge Proof
Electronic Colloquium on Computational Complexity (ECCC), 1998

On Lower Bounds for the Redundancy of Optimal Codes.
Des. Codes Cryptography, 1998

On the Data Expansion of the Huffman Compression Algorithm.
Comput. J., 1998

Visual cryptography schemes with perfect reconstruction of black pixels.
Computers & Graphics, 1998

Image Density is Complete for Non-Interactive-SZK (Extended Abstract).
Proceedings of the Automata, Languages and Programming, 25th International Colloquium, 1998

Communication-Efficient Anonymous Group Identification.
Proceedings of the CCS '98, 1998

1997
A new bound for the data expansion of Huffman codes.
IEEE Trans. Information Theory, 1997

Lower Bounds for Robust Secret Sharing Schemes.
Inf. Process. Lett., 1997

Guest editorial.
European Transactions on Telecommunications, 1997

Tight Bounds on the Information Rate of Secret Sharing Schemes.
Des. Codes Cryptography, 1997

Catastrophic Faults in Reconfigurable Systolic Linear Arrays.
Discrete Applied Mathematics, 1997

Randomness-Efficient Non-Interactive Zero-Knowledge (Extended Abstract).
Proceedings of the Automata, Languages and Programming, 24th International Colloquium, 1997

1996
New Lower Bounds on the Cost of Binary Search Trees.
Theor. Comput. Sci., 1996

On the Information Rate of Secret Sharing Schemes.
Theor. Comput. Sci., 1996

The Power of Preprocessing in Zero-Knowledge Proofs of Knowledge.
J. Cryptology, 1996

On the Redundancy Achieved by Huffman Codes.
Inf. Sci., 1996

Randomness in Distribution Protocols.
Inf. Comput., 1996

Visual Cryptography for General Access Structures.
Inf. Comput., 1996

On the Contrast in Visual Cryptography Schemes.
IACR Cryptology ePrint Archive, 1996

Visual Cryptography for General Access Structures
Electronic Colloquium on Computational Complexity (ECCC), 1996

Constructions and Bounds for Visual Cryptography.
Proceedings of the Automata, Languages and Programming, 23rd International Colloquium, 1996

1995
Zero-Knowledge Arguments and Public-Key Cryptography
Inf. Comput., August, 1995

New bounds on the information rate of secret sharing schemes.
IEEE Trans. Information Theory, 1995

On the Number of Random Bits in Totally Private Computation.
Proceedings of the Automata, Languages and Programming, 22nd International Colloquium, 1995

1994
Binary prefix codes ending in a "1".
IEEE Trans. Information Theory, 1994

The Knowledge Complexity of Quadratic Residuosity Languages.
Theor. Comput. Sci., 1994

Tight Upper and Lower Bounds on the Path Length of Binary Trees.
SIAM J. Comput., 1994

How to share a function securely.
Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, 1994

Randomness in Distributed Protocols.
Proceedings of the Automata, Languages and Programming, 21st International Colloquium, 1994

On Monotone Formula Closure of SZK
Proceedings of the 35th Annual Symposium on Foundations of Computer Science, 1994

Multi-Secret Sharing Schemes.
Proceedings of the Advances in Cryptology, 1994

Zero-Knowledge Proofs of Computational Power in the Shared String Model.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

1993
On Binary Search Trees.
Inf. Process. Lett., 1993

Efficient Sharing of Many Secrets.
Proceedings of the STACS 93, 1993

Secret Sharing Schemes with Veto Capabilities.
Proceedings of the Algebraic Coding, 1993

Size of Shares and Probability of Cheating in Threshold Schemes.
Proceedings of the Advances in Cryptology, 1993

Secret Sharing and Perfect Zero Knowledge.
Proceedings of the Advances in Cryptology, 1993

Fully Dynamic Secret Sharing Schemes.
Proceedings of the Advances in Cryptology, 1993

1992
On the construction of statistically synchronizable codes.
IEEE Trans. Information Theory, 1992

On the redundancy of optimal codes with limited word length.
IEEE Trans. Information Theory, 1992

Communication Efficient Zero-Knowledge Proofs of Knowledge (With Applications to Electronic Cash).
Proceedings of the STACS 92, 1992

One-Message Statistical Zero-Knowledge Proofs and Space-Bounded Verifier.
Proceedings of the Automata, Languages and Programming, 19th International Colloquium, 1992

Zero-Knowledge Proofs of Knowledge Without Interaction (Extended Abstract)
Proceedings of the 33rd Annual Symposium on Foundations of Computer Science, 1992

Graph Decompositions and Secret Sharing Schemes.
Proceedings of the Advances in Cryptology, 1992

Perfectly-Secure Key Distribution for Dynamic Conferences.
Proceedings of the Advances in Cryptology, 1992

On the Information Rate of Secret Sharing Schemes (Extended Abstract).
Proceedings of the Advances in Cryptology, 1992

1991
New bounds on the redundancy of Huffman codes.
IEEE Trans. Information Theory, 1991

A note on D-ary Huffman codes.
IEEE Trans. Information Theory, 1991

Noninteractive Zero-Knowledge.
SIAM J. Comput., 1991

Tight Bounds on the Path Length of Binary Trees.
Proceedings of the STACS 91, 1991

An Optimal Algorithm for the Construction of Optimal Prefix Codes with Given Fringe.
Proceedings of the IEEE Data Compression Conference, 1991

On the Size of Shares for Secret Sharing Schemes.
Proceedings of the Advances in Cryptology, 1991

1990
On the Design of Provably Secure Cryptographic Hash Functions.
Proceedings of the Advances in Cryptology, 1990

Public-Randomness in Public Key Cryptography.
Proceedings of the Advances in Cryptology, 1990

Minimum codeword length and redundancy of Huffman codes.
Proceedings of the EUROCODE '90, 1990

Crptograpic Applications of the Non-Interactive Metaproof and Many-Prover Systems.
Proceedings of the Advances in Cryptology, 1990

1989
Tight upper bounds on the redundancy of Huffman codes.
IEEE Trans. Information Theory, 1989

1988
Bounds on the entropy series.
IEEE Trans. Information Theory, 1988

Learning Probabilistic Prediction Functions (Extended Abstract)
Proceedings of the 29th Annual Symposium on Foundations of Computer Science, 1988

Non-Interactive Zero-Knowledge with Preprocessing.
Proceedings of the Advances in Cryptology, 1988

Learning Probabilistic Prediction Functions.
Proceedings of the First Annual Workshop on Computational Learning Theory, 1988

1987
Non-Interactive Zero-Knowledge Proof Systems.
Proceedings of the Advances in Cryptology, 1987

1986
Regular universal codeword sets.
IEEE Trans. Information Theory, 1986


  Loading...