Titolo | Pubblicato in | Anno |
---|---|---|
Multi-covert channel attack in the cloud | 2019 6th International Conference on Software Defined Systems, SDS 2019 | 2019 |
Affordable Security or Big Guy vs Small Guy | Security Protocols XXVII | 2019 |
FuturesMEX: Secure, Distributed Futures Market Exchange | Proceedings of the 2018 IEEE Symposium on Security and Privacy | 2018 |
Fiat–Shamir for highly sound protocols is instantiable | THEORETICAL COMPUTER SCIENCE | 2018 |
Continuously non-malleable codes with split-state refresh | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2018 |
Continuously non-malleable codes in the split-state model from minimal assumptions | Advances in Cryptology – CRYPTO 2018 | 2018 |
Non-monotonic Security Protocols and Failures in Financial Intermediation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2018 |
Bounded tamper resilience: how to go beyond the algebraic barrier | JOURNAL OF CRYPTOLOGY | 2017 |
Fully leakage-resilient signatures revisited: Graceful degradation, noisy leakage, and construction in the bounded-retrieval model | THEORETICAL COMPUTER SCIENCE | 2017 |
Outsourced pattern matching | INTERNATIONAL JOURNAL OF INFORMATION SECURITY | 2017 |
Predictable arguments of knowledge | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2017 |
Naor-Yung paradigm with shared randomness and applications | THEORETICAL COMPUTER SCIENCE | 2017 |
Redactable Blockchain - Or - Rewriting History in Bitcoin and Friends | Proceedings - 2nd IEEE European Symposium on Security and Privacy, EuroS and P 2017 | 2017 |
The seconomics (security-economics) vulnerabilities of Decentralized Autonomous Organizations | Security Protocols XXV | 2017 |
Securing underwater communications: key agreement based on Fully Hashed MQV | Proceedings of the International Conference on Underwater Networks and Systems, WUWNET 2017 | 2017 |
Non-malleable codes for space-bounded tampering | ADVANCES IN CRYPTOLOGY - CRYPTO 2017 : 37th annual international cryptology. | 2017 |
Entangled cloud storage | FUTURE GENERATION COMPUTER SYSTEMS | 2016 |
Efficient authentication from hard learning problems | JOURNAL OF CRYPTOLOGY | 2016 |
Efficient non-malleable codes and key derivation for poly-size tampering circuits | IEEE TRANSACTIONS ON INFORMATION THEORY | 2016 |
Efficient public-key cryptography with bounded leakage and tamper resilience | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2016 |
© Università degli Studi di Roma "La Sapienza" - Piazzale Aldo Moro 5, 00185 Roma