Giulia Traverso

According to our database1, Giulia Traverso authored at least 15 papers between 2015 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
An Area-Efficient SPHINCS<sup>+</sup> Post-Quantum Signature Coprocessor.
Proceedings of the IEEE International Parallel and Distributed Processing Symposium Workshops, 2021

2020
Anonymity and Rewards in Peer Rating Systems.
IACR Cryptol. ePrint Arch., 2020

SAFE: A Secure and Efficient Long-Term Distributed Storage System.
IACR Cryptol. ePrint Arch., 2020

2019
Long-Term Confidential Secret Sharing-Based Distributed Storage Systems.
PhD thesis, 2019

Selecting Secret Sharing Instantiations for Distributed Storage.
Proceedings of the 7th International Workshop on Security in Cloud Computing, 2019

2018
Sphinx: a Colluder-Resistant Trust Mechanism for Collaborative Intrusion Detection.
IEEE Access, 2018

Coalition-Resistant Peer Rating for Long-Term Confidentiality.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

2017
AS<sup>3</sup>: Adaptive Social Secret Sharing for Distributed Storage Systems.
IACR Cryptol. ePrint Arch., 2017

Performing Computations on Hierarchically Shared Secrets.
IACR Cryptol. ePrint Arch., 2017

Dynamic and Verifiable Hierarchical Secret Sharing.
IACR Cryptol. ePrint Arch., 2017

Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems.
IACR Cryptol. ePrint Arch., 2017

Evidence-Based Trust Mechanism Using Clustering Algorithms for Distributed Storage Systems (Short Paper).
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

2016
Homomorphic Signature Schemes - A Survey
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-32115-8, 2016

Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Perfectly secure steganography: hiding information in the quantum noise of a photograph.
CoRR, 2015


  Loading...