Roberto De Prisco

Orcid: 0000-0003-0559-6897

According to our database1, Roberto De Prisco authored at least 101 papers between 1993 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Bounds and Protocols for Graph-Based Distributed Secret Sharing.
IEEE Trans. Dependable Secur. Comput., 2024

2023
An improved privacy attack on smartphones exploiting the accelerometer.
J. Inf. Secur. Appl., June, 2023

Improved Protocols for Distributed Secret Sharing.
IEEE Trans. Dependable Secur. Comput., 2023

Blockchain Data Replication.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Toward a Compliant Token-Based e-Voting System with SSI-Granted Eligibility.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Text-Independent Voice Recognition based on Siamese Networks and Fusion Embeddings.
Proceedings of the Italian Conference on Cyber Security (ITASEC 2023), 2023

2022
Creative DNA computing: splicing systems for music composition.
Soft Comput., 2022

Gossamer: weaknesses and performance.
Int. J. Inf. Sec., 2022

An adaptive meta-heuristic for music plagiarism detection based on text similarity and clustering.
Data Min. Knowl. Discov., 2022

How originality looks like. Integrating visualization and meta-heuristics to dissect music plagiarism.
Proceedings of the 26th International Conference Information Visualisation, 2022

2021
Secret sharing schemes for infinite sets of participants: A new design technique.
Theor. Comput. Sci., 2021

Providing music service in Ambient Intelligence: experiments with gym users.
Expert Syst. Appl., 2021

Graph embedding of music structures for machine learning approaches.
Proceedings of the 25th International Conference Information Visualisation, 2021

An Accelerometer-based Privacy Attack on Smartphones.
Proceedings of the Italian Conference on Cybersecurity, 2021

A trust module for the interaction with virtual characters.
Proceedings of the 7th International Conference on Systems and Informatics, 2021

Ultra-lightweight Authentication.
Proceedings of the Security of Ubiquitous Computing Systems, 2021

2020
Design of an outdoor position certification authority.
Int. J. Embed. Syst., 2020

EvoComposer: An Evolutionary Algorithm for 4-Voice Music Compositions.
Evol. Comput., 2020

Human-Machine Teaming in Music: anchored narrative-graph Visualization and Machine Learning.
Proceedings of the 24th International Conference on Information Visualisation, 2020

2019
The Conundrum of Success in Music: Playing it or Talking About it?
IEEE Access, 2019

2018
Reducing costs in HSM-based data centers.
J. High Speed Networks, 2018

Design Weaknesses in Recent Ultralightweight RFID Authentication Protocols.
Proceedings of the ICT Systems Security and Privacy Protection, 2018

Probabilistic Secret Sharing.
Proceedings of the 43rd International Symposium on Mathematical Foundations of Computer Science, 2018

Evaluation Study of Visualisations for Harmonic Analysis of 4-Part Music.
Proceedings of the 22nd International Conference Information Visualisation, 2018

On the Equivalence of 2-Threshold Secret Sharing Schemes and Prefix Codes.
Proceedings of the Cyberspace Safety and Security - 10th International Symposium, 2018

An Efficient and Reliable Two-Level Lightweight Authentication Protocol.
Proceedings of the Cyberspace Safety and Security - 10th International Symposium, 2018

2017
Coordinated cooperative task computing using crash-prone processors with unreliable multicast.
J. Parallel Distributed Comput., 2017

Understanding the structure of musical compositions: Is visualization an effective approach?
Inf. Vis., 2017

Splicing music composition.
Inf. Sci., 2017

Splicing-Inspired Recognition and Composition of Musical Collectives Styles.
Proceedings of the Theory and Practice of Natural Computing - 6th International Conference, 2017

Music Plagiarism at a Glance: Metrics of Similarity and Visualizations.
Proceedings of the 21st International Conference Information Visualisation, 2017

BAND: A mobile-based collaboration system for composing and playing music.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

A computational intelligence text-based detection system of music plagiarism.
Proceedings of the 4th International Conference on Systems and Informatics, 2017

Fuzzy vectorial-based similarity detection of music plagiarism.
Proceedings of the 2017 IEEE International Conference on Fuzzy Systems, 2017

A Kind of Bio-inspired Learning of mUsic stylE.
Proceedings of the Computational Intelligence in Music, Sound, Art and Design, 2017

2016
Secure computation without computers.
Theor. Comput. Sci., 2016

Visual Cryptography - Models, Issues, Applications and New Directions.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2016

Visualization of Music Plagiarism: Analysis and Evaluation.
Proceedings of the 20th International Conference Information Visualisation, 2016

Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography.
Proceedings of the Information Theoretic Security - 9th International Conference, 2016

An Evolutionary Composer for Real-Time Background Music.
Proceedings of the Evolutionary and Biologically Inspired Music, Sound, Art and Design, 2016

Natural User Interfaces to Support and Enhance Real-Time Music Performance.
Proceedings of the International Working Conference on Advanced Visual Interfaces, 2016

2015
Chorale Music Splicing System: An Algorithmic Music Composer Inspired by Molecular Splicing.
Proceedings of the Evolutionary and Biologically Inspired Music, Sound, Art and Design, 2015

2014
On the Relation of Random Grid and Deterministic Visual Cryptography.
IEEE Trans. Inf. Forensics Secur., 2014

Measure-independent characterization of contrast optimal visual cryptography schemes.
J. Syst. Softw., 2014

A botnet-based command and control approach relying on swarm intelligence.
J. Netw. Comput. Appl., 2014

Coordinated Cooperative Work Using Undependable Processors with Unreliable Broadcast.
Proceedings of the 22nd Euromicro International Conference on Parallel, 2014

2013
Color visual cryptography schemes for black and white secret images.
Theor. Comput. Sci., 2013

On the Relation of Random Grid, Probabilistic and Deterministic Visual Cryptography.
IACR Cryptol. ePrint Arch., 2013

Secure two-party computation: a visual way.
IACR Cryptol. ePrint Arch., 2013

2012
A Differential Evolution Algorithm Assisted by ANFIS for Music Fingering.
Proceedings of the Swarm and Evolutionary Computation, 2012

Musica Parlata: a methodology to teach music to blind people.
Proceedings of the 14th International ACM SIGACCESS Conference on Computers and Accessibility, 2012

How to Forge a Digital Alibi on Mac OS X.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
A multi-objective differential evolution algorithm for 4-voice compositions.
Proceedings of the 2011 IEEE Symposium on Differential Evolution, 2011

Using Colors to Improve Visual Cryptography for Black and White Images.
Proceedings of the Information Theoretic Security - 5th International Conference, 2011

A hybrid computational intelligence approach for automatic music composition.
Proceedings of the FUZZ-IEEE 2011, 2011

A Genetic Algorithm for Dodecaphonic Compositions.
Proceedings of the Applications of Evolutionary Computation, 2011

A Customizable Recognizer for Orchestral Conducting Gestures Based on Neural Networks.
Proceedings of the Applications of Evolutionary Computation, 2011

2010
Cheating Immune Threshold Visual Secret Sharing.
Comput. J., 2010

EvoBassComposer: a multi-objective genetic algorithm for 4-voice compositions.
Proceedings of the Genetic and Evolutionary Computation Conference, 2010

A Neural Network for Bass Functional Harmonization.
Proceedings of the Applications of Evolutionary Computation, 2010

2009
On designing truthful mechanisms for online scheduling.
Theor. Comput. Sci., 2009

The power of verification for one-parameter agents.
J. Comput. Syst. Sci., 2009

An Evolutionary Music Composer Algorithm for Bass Harmonization.
Proceedings of the Applications of Evolutionary Computing, 2009

Do You Trust Your Phone?
Proceedings of the E-Commerce and Web Technologies, 10th International Conference, 2009

2007
Colored visual cryptography without color darkening.
Theor. Comput. Sci., 2007

Routing selfish unsplittable traffic.
ACM Trans. Algorithms, 2007

2006
Algorithmic problems in distributed systems.
Comput. Networks, 2006

Probabilistic Visual Cryptography Schemes.
Comput. J., 2006

Cheating Immune (2, <i>n</i>)-Threshold Visual Secret Sharing.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

New Constructions of Mechanisms with Verification.
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006

2005
Optimal Colored Threshold Visual Cryptography Schemes.
Des. Codes Cryptogr., 2005

A Lightweight Approach to Authenticated Web Caching.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2005), 31 January, 2005

2004
Deterministic Truthful Approximation Mechanisms for Scheduling Related Machines.
Proceedings of the STACS 2004, 2004

How to route and tax selfish unsplittable traffic.
Proceedings of the SPAA 2004: Proceedings of the Sixteenth Annual ACM Symposium on Parallelism in Algorithms and Architectures, 2004

Availability, usage, and deployment characteristics of the domain name system.
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, 2004

A methodology for estimating interdomain web traffic demand.
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference, 2004

2003
Modeling A Certified Email Protocol using I/O Automata.
Proceedings of the Formal Methods for Security and Time: Proceedings of the MEFISTO Project 2003, 2003

Contrast optimal colored visual cryptography schemes.
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003

Certified Email: Design and Implementation of a New Optimistic Protocol..
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

2001
On k-Set Consensus Problems in Asynchronous Systems.
IEEE Trans. Parallel Distributed Syst., 2001

Performing tasks on synchronous restartable message-passing processors.
Distributed Comput., 2001

2000
On building blocks for distributed systems.
PhD thesis, 2000

Revisiting the PAXOS algorithm.
Theor. Comput. Sci., 2000

1999
A Dynamic Primary Configuration Group Communication Service.
Proceedings of the Distributed Computing, 1999

On <i>k</i>-Set Consensus Problems in Asynchronous Systems.
Proceedings of the Eighteenth Annual ACM Symposium on Principles of Distributed Computing, 1999

1998
Testing and Reconfiguration of VLSI Linear Arrays.
Theor. Comput. Sci., 1998

On Lower Bounds for the Redundancy of Optimal Codes.
Des. Codes Cryptogr., 1998

On the Data Expansion of the Huffman Compression Algorithm.
Comput. J., 1998

A Dynamic View-Oriented Group Communication Service.
Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, 1998

1997
A new bound for the data expansion of Huffman codes.
IEEE Trans. Inf. Theory, 1997

Catastrophic Faults in Reconfigurable Systolic Linear Arrays.
Discret. Appl. Math., 1997

Performing Tasks on Restartable Message-Passing Processors.
Proceedings of the Distributed Algorithms, 11th International Workshop, 1997

1996
New bounds on the expected length of one-to-one codes.
IEEE Trans. Inf. Theory, 1996

New Lower Bounds on the Cost of Binary Search Trees.
Theor. Comput. Sci., 1996

On the Redundancy Achieved by Huffman Codes.
Inf. Sci., 1996

A Note on the Expected Path Length of Trees with Known Fringe.
Inf. Process. Lett., 1996

1995
Minimal Path Length of Trees with Known Fringe.
Theor. Comput. Sci., 1995

Characteristic Inequalities for Binary Trees.
Inf. Process. Lett., 1995

1994
Time-Optimal Message-Efficient Work Performance in the Presence of Faults (Extended Summary).
Proceedings of the Thirteenth Annual ACM Symposium on Principles of Distributed Computing, 1994

1993
On Binary Search Trees.
Inf. Process. Lett., 1993

On Reconfigurability of VLSI Linear Arrays.
Proceedings of the Algorithms and Data Structures, Third Workshop, 1993


  Loading...