Antonio Nicolosi

Orcid: 0009-0002-6817-953X

Affiliations:
  • Stevens Institute of Technology, NJ, USA


According to our database1, Antonio Nicolosi authored at least 18 papers between 2003 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Learning Burnside Homomorphisms with Rounding and Pseudorandom Function.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2023

2015
Hardness of learning problems over Burnside groups of exponent 3.
Des. Codes Cryptogr., 2015

2014
A brief overview of the NEBULA future internet architecture.
Comput. Commun. Rev., 2014

2013
Broadcast Steganography.
IACR Cryptol. ePrint Arch., 2013


2011
Random Self-Reducibility Properties of Learning Problems over Burnside Groups of Exponent 3.
IACR Cryptol. ePrint Arch., 2011

HB<sup>N</sup>: An HB-like protocol secure against man-in-the-middle attacks.
IACR Cryptol. ePrint Arch., 2011

Generalized Learning Problems and Applications to Non-Commutative Cryptography.
IACR Cryptol. ePrint Arch., 2011

Verifying and enforcing network paths with icing.
Proceedings of the 2011 Conference on Emerging Networking Experiments and Technologies, 2011

2009
A Policy Framework for the Future Internet.
Proceedings of the Eight ACM Workshop on Hot Topics in Networks (HotNets-VIII), 2009

2008
Efficient bounded distance decoders for Barnes-Wall lattices.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

2007
Authentication Mechanisms for Open Distributed Systems.
PhD thesis, 2007

Traitor Tracing with Optimal Transmission Rate.
Proceedings of the Information Security, 10th International Conference, 2007

Efficient Private Techniques for Verifying Social Proximity.
Proceedings of the 6th International workshop on Peer-To-Peer Systems, 2007

2006
Non-interactive Zero-Knowledge from Homomorphic Encryption.
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006

2004
Secure Acknowledgment of Multicast Messages in Open Peer-to-Peer Networks.
Proceedings of the Peer-to-Peer Systems III, Third International Workshop, 2004

Anonymous Identification in Ad Hoc Groups.
Proceedings of the Advances in Cryptology, 2004

2003
Proactive Two-Party Signatures for User Authentication.
Proceedings of the Network and Distributed System Security Symposium, 2003


  Loading...