Alfredo De Santis
Orcid: 0000-0001-8962-1919
According to our database1,
Alfredo De Santis
authored at least 232 papers
between 1986 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Inf. Theory, October, 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024
Proceedings of the IEEE International Symposium on Information Theory, 2024
2023
J. Inf. Secur. Appl., June, 2023
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023
2022
ACM Trans. Internet Techn., 2022
2021
Theor. Comput. Sci., 2021
Proceedings of the Italian Conference on Cybersecurity, 2021
2020
Distributed Group Key Management for Event Notification Confidentiality Among Sensors.
IEEE Trans. Dependable Secur. Comput., 2020
Securing visual search queries in ubiquitous scenarios empowered by smart personal devices.
Inf. Sci., 2020
2019
IEEE Trans. Big Data, 2019
Using generative adversarial networks for improving classification effectiveness in credit card fraud detection.
Inf. Sci., 2019
Future Gener. Comput. Syst., 2019
2018
Integrity for an Event Notification Within the Industrial Internet of Things by Using Group Signatures.
IEEE Trans. Ind. Informatics, 2018
Comput. Secur., 2018
IEEE Cloud Comput., 2018
Proceedings of the 2018 Conference on Research in Adaptive and Convergent Systems, 2018
Proceedings of the 43rd International Symposium on Mathematical Foundations of Computer Science, 2018
Proceedings of the Cyberspace Safety and Security - 10th International Symposium, 2018
2017
IEEE Trans. Sustain. Comput., 2017
ACM Trans. Embed. Comput. Syst., 2017
Guest Editorial Special Issue on Insider Threats to Information Security, Digital Espionage, and Counter-Intelligence.
IEEE Syst. J., 2017
Inf. Sci., 2017
A collaborative clinical analysis service based on theory of evidence, fuzzy linguistic sets and prospect theory and its application to craniofacial disorders in infants.
Future Gener. Comput. Syst., 2017
Future Gener. Comput. Syst., 2017
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes.
IEEE Trans. Dependable Secur. Comput., 2016
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
A triadic closure and homophily-based recommendation system for online social networks.
World Wide Web, 2015
Secur. Commun. Networks, 2015
Pervasive Mob. Comput., 2015
Modeling energy-efficient secure communications in multi-mode wireless mobile devices.
J. Comput. Syst. Sci., 2015
Cloud-based adaptive compression and secure management services for 3D healthcare data.
Future Gener. Comput. Syst., 2015
Proceedings of the Advances in Artificial Life, Evolutionary Computation and Systems Chemistry, 2015
Proceedings of the Advances in Artificial Life, Evolutionary Computation and Systems Chemistry, 2015
Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
Proceedings of the 10th International Conference on P2P, 2015
Proceedings of the 10th International Conference on P2P, 2015
2014
IEEE Trans. Inf. Forensics Secur., 2014
Measure-independent characterization of contrast optimal visual cryptography schemes.
J. Syst. Softw., 2014
J. Netw. Comput. Appl., 2014
A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems.
Int. J. Parallel Program., 2014
Key Indistinguishability vs. Strong Key Indistinguishability for Hierarchical Key Assignment Schemes.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014
Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014
The Role of Trust and Co-partnership in the Societal Digital Security Culture Approach.
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014
Proceedings of the 2014 International Conference on Intelligent Networking and Collaborative Systems, 2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014
An Efficient and Transparent One-Time Authentication Protocol with Non-interactive Key Scheduling and Update.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
2013
Theor. Comput. Sci., 2013
J. Ambient Intell. Humaniz. Comput., 2013
Neurocomputing, 2013
IACR Cryptol. ePrint Arch., 2013
On the detection of card-sharing traffic through wavelet analysis and Support Vector Machines.
Appl. Soft Comput., 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
An Energy-Aware Framework for Reliable and Secure End-to-End Ubiquitous Data Communications.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013
Proceedings of the Security Engineering and Intelligence Informatics, 2013
Proceedings of the Security Engineering and Intelligence Informatics, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012
2011
IEEE Trans. Dependable Secur. Comput., 2011
Theor. Comput. Sci., 2011
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011
Proceedings of the SIGITE' 11 ACM Special Interest Group for Information Technology Education Conference, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the Information Theoretic Security - 5th International Conference, 2011
Steganography and Secure Communication on Online Social Networks and Online Photo Sharing.
Proceedings of the 2011 International Conference on Broadband, 2011
Proceedings of the 2011 International Conference on Broadband, 2011
Proceedings of the 2011 International Conference on Broadband, 2011
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011
2010
Theor. Comput. Sci., 2010
Comput. Secur., 2010
Proceedings of the E-Commerce and Web Technologies, 11th International Conference, 2010
Proceedings of the CISIS 2010, 2010
An Enhanced Firewall Scheme for Dynamic and Adaptive Containment of Emerging Security Threats.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
2009
Proceedings of the Emerging Challenges for Security, 2009
Proceedings of the Mathematical Foundations of Computer Science 2009, 2009
Proceedings of the E-Commerce and Web Technologies, 10th International Conference, 2009
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009
2008
New constructions for provably-secure time-bound hierarchical key assignment schemes.
Theor. Comput. Sci., 2008
SIAM J. Comput., 2008
From Weaknesses to Secret Disclosure in a Recent Ultra-Lightweight RFID Authentication Protocol.
IACR Cryptol. ePrint Arch., 2008
Proceedings of the 13th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2008
Proceedings of the Progress in Cryptology, 2008
2007
Taking advantages of a disadvantage: Digital forensics and steganography using document metadata.
J. Syst. Softw., 2007
Proceedings of the Information Theoretic Security - Second International Conference, 2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007
2006
IEEE Trans. Dependable Secur. Comput., 2006
Inf. Sci., 2006
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
Proceedings of the ISSE 2006, 2006
2005
IEEE Trans. Circuits Syst. I Regul. Pap., 2005
J. Syst. Softw., 2005
Proceedings of the Coding and Cryptography, International Workshop, 2005
2004
Theor. Comput. Sci., 2004
Inf. Process. Lett., 2004
On NC<sup>1</sup> Boolean Circuit Composition of Non-interactive Perfect Zero-Knowledge.
Proceedings of the Mathematical Foundations of Computer Science 2004, 2004
Proceedings of the Automata, Languages and Programming: 31st International Colloquium, 2004
2003
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003
2002
Proceedings of the Selected Areas in Cryptography, 2002
Proceedings of the Randomization and Approximation Techniques, 6th International Workshop, 2002
Proceedings of the Infrastructure Security, International Conference, 2002
2001
Improved Schemes for Visual Cryptography.
Des. Codes Cryptogr., 2001
Secret Sharing and Visual Cryptography Schemes.
Proceedings of the Trusted Information: The New Decade Challenge, 2001
Proceedings of the Information Security, 4th International Conference, 2001
Proceedings of the Advances in Cryptology, 2001
2000
Necessary and Sufficient Assumptions for Non-iterative Zero-Knowledge Proofs of Knowledge for All NP Relations.
Proceedings of the Automata, Languages and Programming, 27th International Colloquium, 2000
1999
Inf. Process. Lett., 1999
Proceedings of the Automata, 1999
1998
Electron. Colloquium Comput. Complex., 1998
Comput. Graph., 1998
Proceedings of the Automata, Languages and Programming, 25th International Colloquium, 1998
Proceedings of the CCS '98, 1998
1997
Des. Codes Cryptogr., 1997
Discret. Appl. Math., 1997
Proceedings of the Automata, Languages and Programming, 24th International Colloquium, 1997
1996
The Power of Preprocessing in Zero-Knowledge Proofs of Knowledge.
J. Cryptol., 1996
Electron. Colloquium Comput. Complex., 1996
Proceedings of the Automata, Languages and Programming, 23rd International Colloquium, 1996
1995
IEEE Trans. Inf. Theory, 1995
Proceedings of the Automata, Languages and Programming, 22nd International Colloquium, 1995
1994
Theor. Comput. Sci., 1994
SIAM J. Comput., 1994
Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, 1994
Proceedings of the Automata, Languages and Programming, 21st International Colloquium, 1994
Proceedings of the 35th Annual Symposium on Foundations of Computer Science, 1994
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994
1993
Proceedings of the Algebraic Coding, 1993
Proceedings of the Advances in Cryptology, 1993
Proceedings of the Advances in Cryptology, 1993
1992
IEEE Trans. Inf. Theory, 1992
IEEE Trans. Inf. Theory, 1992
Communication Efficient Zero-Knowledge Proofs of Knowledge (With Applications to Electronic Cash).
Proceedings of the STACS 92, 1992
Proceedings of the Automata, Languages and Programming, 19th International Colloquium, 1992
Proceedings of the 33rd Annual Symposium on Foundations of Computer Science, 1992
Proceedings of the Advances in Cryptology, 1992
1991
Proceedings of the IEEE Data Compression Conference, 1991
1990
Proceedings of the Advances in Cryptology, 1990
Proceedings of the Advances in Cryptology, 1990
Proceedings of the EUROCODE '90, 1990
Proceedings of the Advances in Cryptology, 1990
1989
1988
Proceedings of the 29th Annual Symposium on Foundations of Computer Science, 1988
Proceedings of the Advances in Cryptology, 1988
Proceedings of the First Annual Workshop on Computational Learning Theory, 1988
1987
Proceedings of the Advances in Cryptology, 1987
1986