Giorgia Azzurra Marson

Orcid: 0000-0001-5264-7285

According to our database1, Giorgia Azzurra Marson authored at least 25 papers between 2012 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
A Lightweight Secure Aggregation Protocol for Federated Learning Applications.
Proceedings of the 45th IEEE International Conference on Distributed Computing Systems, 2025

2024
Larger-scale Nakamoto-style Blockchains Don't Necessarily Offer Better Security.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Closing the Gap: Achieving Better Accuracy-Robustness Tradeoffs against Query-Based Attacks.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
LISA: LIghtweight single-server Secure Aggregation with a public source of randomness.
CoRR, 2023

Short Paper: Estimating Patch Propagation Times Across Blockchain Forks.
Proceedings of the Financial Cryptography and Data Security, 2023

2022
PoTS: A Secure Proof of TEE-Stake for Permissionless Blockchains.
IEEE Trans. Serv. Comput., 2022

Estimating Patch Propagation Times across (Blockchain) Forks.
CoRR, 2022

DLT-based End-to-end Inter-domain Transport Network Slice with SLA Management Using Cloud-based SDN Controllers: Demo Session.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2022

2021
BaFFLe: Backdoor Detection via Feedback-based Federated Learning.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

On the Synchronization Power of Token Smart Contracts.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

Mitosis: Practically Scaling Permissioned Blockchains.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
On the Security of Randomized Defenses Against Adversarial Samples.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2018
Mix'n'Squeeze: Thwarting Adaptive Adversarial Samples Using Randomized Squeezing.
CoRR, 2018

A Cryptographic Look at Multi-party Channels.
Proceedings of the 31st IEEE Computer Security Foundations Symposium, 2018

2017
Real-World Aspects of Secure Channels: Fragmentation, Causality, and Forward Security.
PhD thesis, 2017

With one it is easy, with many it gets complicated: Understanding Channel Security for Groups.
IACR Cryptol. ePrint Arch., 2017

Security Notions for Bidirectional Channels.
IACR Cryptol. ePrint Arch., 2017

2016
An Efficient Lattice-Based Signature Scheme with Provably Secure Instantiation.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2016, 2016

2015
Data Is a Stream: Security of Stream-Based Channels.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
Unpicking PLAID - A Cryptographic Analysis of an ISO-Standards-Track Authentication Protocol.
Proceedings of the Security Standardisation Research - First International Conference, 2014

Even More Practical Secure Logging: Tree-Based Seekable Sequential Key Generators.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
A Cryptographic Analysis of OPACITY.
IACR Cryptol. ePrint Arch., 2013

Practical Secure Logging: Seekable Sequential Key Generators.
Proceedings of the Computer Security - ESORICS 2013, 2013

A Cryptographic Analysis of OPACITY - (Extended Abstract).
Proceedings of the Computer Security - ESORICS 2013, 2013

2012
On the Non-malleability of the Fiat-Shamir Transform.
Proceedings of the Progress in Cryptology, 2012


  Loading...