Giuseppe Ateniese

According to our database1, Giuseppe Ateniese
  • authored at least 109 papers between 1996 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage.
IEEE Trans. Information Forensics and Security, 2017

Low-Cost Standard Signatures for Energy-Harvesting Wireless Sensor Networks.
ACM Trans. Embedded Comput. Syst., 2017

PassGAN: A Deep Learning Approach for Password Guessing.
CoRR, 2017

Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning.
CoRR, 2017

HELIOS: Outsourcing of Security Operations in Green Wireless Sensor Networks.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

Redactable Blockchain - or - Rewriting History in Bitcoin and Friends.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Accountable Storage.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Redactable Blockchain - or - Rewriting History in Bitcoin and Friends.
IACR Cryptology ePrint Archive, 2016

Secure Outsourcing of Circuit Manufacturing.
IACR Cryptology ePrint Archive, 2016

Entangled cloud storage.
Future Generation Comp. Syst., 2016

Nearly Optimal Verifiable Data Streaming.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

2015
Recent Advances in Security and Privacy in Big Data.
J. UCS, 2015

Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers.
IJSN, 2015

Nearly Optimal Verifiable Data Streaming (Full Version).
IACR Cryptology ePrint Archive, 2015

Subversion-Resilient Signature Schemes.
IACR Cryptology ePrint Archive, 2015

Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage.
IACR Cryptology ePrint Archive, 2015

From Pretty Good To Great: Enhancing PGP using Bitcoin and the Blockchain.
CoRR, 2015

No Place to Hide that Bytes won't Reveal: Sniffing Location-Based Encrypted Traffic to Track User Position.
CoRR, 2015

From Pretty Good to Great: Enhancing PGP Using Bitcoin and the Blockchain.
Proceedings of the Network and System Security - 9th International Conference, 2015

No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position.
Proceedings of the Network and System Security - 9th International Conference, 2015

Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage.
Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015

Subversion-Resilient Signature Schemes.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Entangled Encodings and Data Entanglement.
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015

2014
Fault-tolerant oblivious assignment with m slots in synchronous systems.
J. Parallel Distrib. Comput., 2014

Accountable Storage.
IACR Cryptology ePrint Archive, 2014

Certified Bitcoins.
IACR Cryptology ePrint Archive, 2014

To Share or Not to Share in Client-Side Encrypted Clouds.
CoRR, 2014

No NAT'd User left Behind: Fingerprinting Users behind NAT from NetFlow Records alone.
CoRR, 2014

Proofs of Space: When Space Is of the Essence.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014

"To Share or not to Share" in Client-Side Encrypted Clouds.
Proceedings of the Information Security - 17th International Conference, 2014

VABKS: Verifiable attribute-based keyword search over outsourced encrypted data.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

No NAT'd User Left Behind: Fingerprinting Users behind NAT from NetFlow Records Alone.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

Certified Bitcoins.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
A note on time-bound hierarchical key assignment schemes.
Inf. Process. Lett., 2013

VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data.
IACR Cryptology ePrint Archive, 2013

Proofs of Space: When Space is of the Essence.
IACR Cryptology ePrint Archive, 2013

Hacking Smart Machines with Smarter Ones: How to Extract Meaningful Data from Machine Learning Classifiers.
CoRR, 2013

Low-cost Standard Signatures in Wireless Sensor Networks: A Case for Reviving Pre-computation Techniques?
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

2012
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes.
J. Cryptology, 2012

Efficient Query Integrity for Outsourced Dynamic Databases.
IACR Cryptology ePrint Archive, 2012

Entangled Cloud Storage.
IACR Cryptology ePrint Archive, 2012

Oblivious Assignment with m Slots.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2012

High-Entropy Visual Identification for Touch Screen Devices.
Proceedings of the Information Security Practice and Experience, 2012

Efficient query integrity for outsourced dynamic databases.
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012

2011
Remote data checking using provable data possession.
ACM Trans. Inf. Syst. Secur., 2011

High-Entropy Visual Identification for Touch Screen Devices.
IACR Cryptology ePrint Archive, 2011

(If) Size Matters: Size-Hiding Private Set Intersection.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

2010
FastAD: an authenticated directory for billions of objects.
Operating Systems Review, 2010

(If) Size Matters: Size-Hiding Private Set Intersection.
IACR Cryptology ePrint Archive, 2010

Deniable cloud storage: sharing files via public-key deniability.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

Remote data checking for network coding-based distributed storage systems.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010

2009
Remarks on ''Analysis of one popular group signature scheme'' in Asiacrypt 2006.
IJACT, 2009

Universally Anonymous IBE based on the Quadratic Residuosity Assumption.
IACR Cryptology ePrint Archive, 2009

Universally Anonymous IBE Based on the Quadratic Residuosity Assumption.
Proceedings of the Topics in Cryptology, 2009

Key-Private Proxy Re-encryption.
Proceedings of the Topics in Cryptology, 2009

Proofs of Storage from Homomorphic Identification Protocols.
Proceedings of the Advances in Cryptology, 2009

2008
Scalable and Efficient Provable Data Possession.
IACR Cryptology ePrint Archive, 2008

Key-Private Proxy Re-Encryption.
IACR Cryptology ePrint Archive, 2008

Scalable and efficient provable data possession.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

MR-PDP: Multiple-Replica Provable Data Possession.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

2007
Provable Data Possession at Untrusted Stores.
IACR Cryptology ePrint Archive, 2007

Secret Handshakes with Dynamic and Fuzzy Matching.
Proceedings of the Network and Distributed System Security Symposium, 2007

Design and Implementation of Verifiable Audit Trails for a Versioning File System.
Proceedings of the 5th USENIX Conference on File and Storage Technologies, 2007

Provable data possession at untrusted stores.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Identity-Based Proxy Re-encryption.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
Survivable Monitoring in Dynamic Networks.
IEEE Trans. Mob. Comput., 2006

Improved proxy re-encryption schemes with applications to secure distributed storage.
ACM Trans. Inf. Syst. Secur., 2006

Identity-Based Proxy Re-encryption.
IACR Cryptology ePrint Archive, 2006

Provably-Secure Time-Bound Hierarchical Key Assignment Schemes.
IACR Cryptology ePrint Archive, 2006

Remarks on "Analysis of One Popular Group Signature Scheme" in Asiacrypt 2006.
IACR Cryptology ePrint Archive, 2006

Provably-secure time-bound hierarchical key assignment schemes.
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30, 2006

2005
Proxy Re-Signatures: New Definitions, Algorithms, and Applications.
IACR Cryptology ePrint Archive, 2005

Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage.
IACR Cryptology ePrint Archive, 2005

Practical Group Signatures without Random Oracles.
IACR Cryptology ePrint Archive, 2005

Verifiable audit trails for a versioning file system.
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005

Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage.
Proceedings of the Network and Distributed System Security Symposium, 2005

Sanitizable Signatures.
Proceedings of the Computer Security, 2005

Proxy re-signatures: new definitions, algorithms, and applications.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

Untraceable RFID tags via insubvertible encryption.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

On the Performance and Analysis of DNS Security Extensions.
Proceedings of the Cryptology and Network Security, 4th International Conference, 2005

2004
Verifiable encryption of digital signatures and applications.
ACM Trans. Inf. Syst. Secur., 2004

On the Key Exposure Problem in Chameleon Hashes.
IACR Cryptology ePrint Archive, 2004

A Provably Secure Nyberg-Rueppel Signature Variant with Applications.
IACR Cryptology ePrint Archive, 2004

On the Key Exposure Problem in Chameleon Hashes.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004

Survivable Monitoring in Dynamic Networks.
Proceedings of the Second IEEE International Workshop on Information Assurance (IWIA'04), 2004

Identity-Based Chameleon Hash and Applications.
Proceedings of the Financial Cryptography, 2004

2003
Identity-based Chameleon Hash and Applications.
IACR Cryptology ePrint Archive, 2003

Efficient Group Signatures without Trapdoors.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

2002
Efficient Group Signatures without Trapdoors.
IACR Cryptology ePrint Archive, 2002

Anonymous E-prescriptions.
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, 2002

Medical Information Privacy Assurance: Cryptographic and System Aspects.
Proceedings of the Security in Communication Networks, Third International Conference, 2002

Quasi-Efficient Revocation in Group Signatures.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption.
Proceedings of the Topics in Cryptology, 2002

2001
Extended capabilities for visual cryptography.
Theor. Comput. Sci., 2001

Quasi-Efficient Revocation of Group Signatures.
IACR Cryptology ePrint Archive, 2001

TRICERT: A Distributed Certified E-Mail Scheme.
Proceedings of the Network and Distributed System Security Symposium, 2001

A new approach to DNS security (DNSSEC).
Proceedings of the CCS 2001, 2001

2000
New multiparty authentication services and key agreement protocols.
IEEE Journal on Selected Areas in Communications, 2000

Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000

A Practical and Provably Secure Coalition-Resistant Group Signature Scheme.
Proceedings of the Advances in Cryptology, 2000

1999
Untraceable mobility or how to travel incognito.
Computer Networks, 1999

Group Signatures Á la carte.
Proceedings of the Tenth Annual ACM-SIAM Symposium on Discrete Algorithms, 1999

Some Open Issues and New Directions in Group Signatures.
Proceedings of the Financial Cryptography, 1999

Efficient Verifiable Encryption (and Fair Exchange) of Digital Signatures.
Proceedings of the CCS '99, 1999

1998
Authenticated Group Key Agreement and Friends.
Proceedings of the CCS '98, 1998

1996
Visual Cryptography for General Access Structures.
Inf. Comput., 1996

Visual Cryptography for General Access Structures
Electronic Colloquium on Computational Complexity (ECCC), 1996

Constructions and Bounds for Visual Cryptography.
Proceedings of the Automata, Languages and Programming, 23rd International Colloquium, 1996


  Loading...