Barbara Masucci

Orcid: 0000-0002-1570-8576

According to our database1, Barbara Masucci authored at least 45 papers between 1999 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
New Results on Distributed Secret Sharing Protocols.
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023

2019
Energy Awareness and Secure Communication Protocols: The Era of Green Cybersecurity.
Proceedings of the Security in Computing and Communications - 7th International Symposium, 2019

2017
On-Board Format-Independent Security of Functional Magnetic Resonance Images.
ACM Trans. Embed. Comput. Syst., 2017

Supporting dynamic updates in storage clouds with the Akl-Taylor scheme.
Inf. Sci., 2017

One-Message Unilateral Entity Authentication Schemes.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Cryptographic Hierarchical Access Control for Dynamic Structures.
IEEE Trans. Inf. Forensics Secur., 2016

Hierarchical and Shared Access Control.
IEEE Trans. Inf. Forensics Secur., 2016

Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes.
IEEE Trans. Dependable Secur. Comput., 2016

On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
On the Equivalence of Two Security Notions for Hierarchical Key Assignment Schemes in the Unconditional Setting.
IEEE Trans. Dependable Secur. Comput., 2015

Novel Insider Threat Techniques: Automation and Generation of Ad Hoc Digital Evidence.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

2014
Key Indistinguishability vs. Strong Key Indistinguishability for Hierarchical Key Assignment Schemes.
IACR Cryptol. ePrint Arch., 2014

On the Unconditional Security of Hierarchical Key Assignment Schemes.
CoRR, 2014

Hierarchical and Shared Key Assignment.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

2013
A note on time-bound hierarchical key assignment schemes.
Inf. Process. Lett., 2013

2012
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes.
J. Cryptol., 2012

2011
Efficient provably-secure hierarchical key assignment schemes.
Theor. Comput. Sci., 2011

2010
Variations on a theme by Akl and Taylor: Security and tradeoffs.
Theor. Comput. Sci., 2010

2009
Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants.
Proceedings of the Mathematical Foundations of Computer Science 2009, 2009

2008
New constructions for provably-secure time-bound hierarchical key assignment schemes.
Theor. Comput. Sci., 2008

An attack on a payment scheme.
Inf. Sci., 2008

2007
New results on non-perfect sharing of multiple secrets.
J. Syst. Softw., 2007

2006
Enforcing the security of a time-bound hierarchical key assignment scheme.
Inf. Sci., 2006

Sharing Multiple Secrets: Models, Schemes and Analysis.
Des. Codes Cryptogr., 2006

Unconditionally secure key assignment schemes.
Discret. Appl. Math., 2006

2005
Ideal contrast visual cryptography schemes with reversing.
Inf. Process. Lett., 2005

A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy.
Proceedings of the Coding and Cryptography, International Workshop, 2005

Design and Implementation of an Inline Certified E-mail Service.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

2004
Cryptographic key assignment schemes for any access control policy.
Inf. Process. Lett., 2004

Anonymous Membership Broadcast Schemes.
Des. Codes Cryptogr., 2004

A Linear Algebraic Approach to Metering Schemes.
Des. Codes Cryptogr., 2004

2003
An Information-Theoretic Approach to the Access Control Problem.
Proceedings of the Theoretical Computer Science, 8th Italian Conference, 2003

2002
A note on optimal metering schemes.
Inf. Process. Lett., 2002

Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes.
Des. Codes Cryptogr., 2002

Bounds and constructions for metering schemes.
Commun. Inf. Syst., 2002

2001
Efficient metering schemes with pricing.
IEEE Trans. Inf. Theory, 2001

2000
On secret set schemes.
Inf. Process. Lett., 2000

Constructions and Bounds for Unconditionally Secure Commitment Schemes.
IACR Cryptol. ePrint Arch., 2000

Metering Schemes with Pricing.
Proceedings of the Distributed Computing, 14th International Conference, 2000

Dynamic Multi-threshold Metering Schemes.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000

Metering Schemes for General Access Structures.
Proceedings of the Computer Security, 2000

1999
Multiple ramp schemes.
IEEE Trans. Inf. Theory, 1999

Randomness in Multi-Secret Sharing Schemes.
J. Univers. Comput. Sci., 1999

A Note on the Randomness in Dynamic Threshold Schemes.
J. Comput. Secur., 1999

A Lower Bound on the Encoding Length in Lossy Transmission.
Inf. Sci., 1999


  Loading...