Paolo Palmieri

Orcid: 0000-0002-9819-4880

Affiliations:
  • University College Cork, Department of Computer Science, Ireland (since 2017)
  • Cranfield University, Cranfield Defence and Security, Shrivenam, UK (2016 - 2017)
  • Bournemouth University, Department of Computing and Informatics, Poole, UK (2015 - 2016)
  • Delft University of Technology, The Netherlands (2013 - 2015)
  • Université Catholique de Louvain, Belgium (PhD 2013)


According to our database1, Paolo Palmieri authored at least 39 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Agent-based blockchain model for robust authentication and authorization in IoT-based healthcare systems.
J. Supercomput., March, 2024

Anonymous Multi-Receiver Certificateless Hybrid Signcryption for Broadcast Communication.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

2023
ID-CAKE: Identity-based Cluster Authentication and Key Exchange Scheme for Message Broadcasting and Batch Verification in VANETs.
IACR Cryptol. ePrint Arch., 2023

A Novel Approach to e-Voting with Group Identity Based Identification and Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2023

An Anonymous Multi-receiver Certificateless Hybrid Signcryption (AMCLHS) using mKEM-DEM for Broadcast Communication.
IACR Cryptol. ePrint Arch., 2023

A Multireceiver Certificateless Signcryption (MCLS) Scheme.
IACR Cryptol. ePrint Arch., 2023

Homomorphic Trapdoors for Identity-based and Group Signatures.
IACR Cryptol. ePrint Arch., 2023

Deep Learning-Based Rotational-XOR Distinguishers for AND-RX Block Ciphers: Evaluations on Simeck and Simon.
Proceedings of the Selected Areas in Cryptography - SAC 2023, 2023

Treating a different kind of patient: curing security weaknesses in digital health systems of the future.
Proceedings of the 9th International Workshop on Advances in Sensors and Interfaces, 2023

2022
Bloom filter variants for multiple sets: a comparative assessment.
J. Univers. Comput. Sci., 2022

Secure Search on Multi-key Homomorphically Encrypted Data with Finite Fields.
IACR Cryptol. ePrint Arch., 2022

Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and a Partial ML-Distinguisher.
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022

Two de-anonymization attacks on real-world location data based on a hidden Markov model.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

2021
Introduction to the special issue on privacy and security for location-based services and devices.
J. Inf. Secur. Appl., 2021

Reducing the Cost of Machine Learning Differential Attacks Using Bit Selection and aPartial ML-Distinguisher.
IACR Cryptol. ePrint Arch., 2021

Protecting artificial intelligence IPs: a survey of watermarking and fingerprinting for machine learning.
CAAI Trans. Intell. Technol., 2021

2020
A Survey of Advanced Encryption for Database Security: Primitives, Schemes, and Attacks.
Proceedings of the Foundations and Practice of Security - 13th International Symposium, 2020

A secure, distributed and scalable infrastructure for remote generation and use of cryptographic keys.
Proceedings of the 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2020

2019
A privacy-preserving protocol for indoor wi-fi localization.
Proceedings of the 16th ACM International Conference on Computing Frontiers, 2019

2018
Probabilistic Properties of the Spatial Bloom Filters and Their Relevance to Cryptographic Protocols.
IEEE Trans. Inf. Forensics Secur., 2018

Feather forking as a positive force: incentivising green energy production in a blockchain-based smart grid.
Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems, 2018

Hash-based signatures for the internet of things: position paper.
Proceedings of the 15th ACM International Conference on Computing Frontiers, 2018

2017
An Anonymous Inter-Network RoutingProtocol for the Internet of Things.
J. Cyber Secur. Mobil., 2017

Private inter-network routing for Wireless Sensor Networks and the Internet of Things.
Proceedings of the Computing Frontiers Conference, 2017

2016
Anonymity networks and access to information during conflicts: Towards a distributed network organisation.
Proceedings of the 8th International Conference on Cyber Conflict, 2016

Security analysis and exploitation of arduino devices in the internet of things.
Proceedings of the ACM International Conference on Computing Frontiers, CF'16, 2016

2015
Location privacy without mutual trust: The spatial Bloom filter.
Comput. Commun., 2015

Preserving Context Privacy in Distributed Hash Table Wireless Sensor Networks.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

Paying the Guard: An Entry-Guard-Based Payment System for Tor.
Proceedings of the Financial Cryptography and Data Security, 2015

2014
Passengers information in public transport and privacy: Can anonymous tickets prevent tracking?
Int. J. Inf. Manag., 2014

Spatial Bloom Filters: Enabling Privacy in Location-aware Applications.
IACR Cryptol. ePrint Arch., 2014

Key Management for Onion Routing in a True Peer to Peer Setting.
Proceedings of the Advances in Information and Computer Security, 2014

2013
Unconditional secure cooperation on real-world networks : the case of oblivious transfer.
PhD thesis, 2013

Building a privacy-preserving semantic overlay for Peer-to-Peer networks.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013

Unconditionally Secure Oblivious Transfer from Real Network Behavior.
Proceedings of the Advances in Information and Computer Security, 2013

2012
Location-aware Mobile Services for a Smart City: Design, Implementation and Deployment.
J. Theor. Appl. Electron. Commer. Res., 2012

2011
Secure Two-Party Computation over a Z-Channel.
Proceedings of the Provable Security - 5th International Conference, 2011

Implementing Information-Theoretically Secure Oblivious Transfer from Packet Reordering.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

2010
Building Oblivious Transfer on Channel Delays.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010


  Loading...