Sfoglia per Autore
A note on optimal metering schemes
2002 C. Blundo, S. Cimato, B. Masucci
Certified email: Design and implementation of a new optimistic protocol
2003 C. Blundo, S. Cimato, R. De Prisco
Modeling a certified email protocol using I/O Automata
2004 C. Blundo, S. Cimato, R. De Prisco, A.L. Ferrara
A software infrastructure for authenticated web metering
2004 C. Blundo, S. Cimato
A web service for certified email
2005 V. Auletta, C. Blundo, S. Cimato, G. Raimato
Design and implementation of an inline certified e-mail service
2005 S. Cimato, C. Galdi, R. Giordano, B. Masucci, G. Tomasco
Optimal colored threshold visual cryptography schemes
2005 S. Cimato, R. De Prisco, A. De Santis
A lightweight approach to authenticated Web caching
2005 C. Blundo, S. Cimato, R. De Prisco
Security in communication networks : 4th international conference, SCN 2004, Amalfi, Italy, September 8-10, 2004 : revised selected papers
2005 C. Blundo, S. Cimato
Ideal contrast visual cryptography schemes with reversing
2005 S. Cimato, A. De Santis, A.L. Ferrara, B. Masucci
Overcoming the obfuscation of Java programs by identifier renaming
2005 S. Cimato, A. De Santis, U. Ferraro Petrillo
Secure E-Coupons
2005 C. Blundo, S. Cimato, A. De Bonis
Personal identification and verification using multimodal biometric data
2006 S. Cimato, M. Gamassi, V. Piuri, D. Sana, R. Sassi, F. Scotti
Privacy issues in biometric identification
2006 S. Cimato, M. Gamassi, V. Piuri, R. Sassi, F. Scotti
Visual cryptography schemes with optimal pixel expansion
2006 C. BLUNDO, S. CIMATO, A. DE SANTIS
Probabilistic visual cryptography schemes
2006 S. Cimato, R. DE PRISCO, A. DE SANTIS
A unified model for unconditionally secure key distribution
2006 S. Cimato, A. Cresti, P. D'Arco
A web service based micro-payment system
2006 V. Auletta, C. Blundo, S. Cimato, G. Raimato
Metodo di generazione e di verifica di una informazione di sicurezza ottenuta mediante letture biometriche
2006 S. Cimato, M. Gamassi, V. Piuri, D. Sana, R. Sassi, F. Scotti
Authenticated web services : a WS-security based implementation
2007 V. Auletta, C. Blundo, S. Cimato, E. De Cristofaro, G. Raimato
Colored visual cryptography without color darkening
2007 S. Cimato, R. De Prisco, A. De Santis
A biometric verification system addressing privacy concerns
2007 S. Cimato, M. Gamassi, V. Piuri, R. Sassi, F. Scotti
Method for generating and verifying security information obtained by means of biometric readings
2007 S. Cimato, M. Gamassi, V. Piuri, D. Sana, R. Sassi, F. Scotti
Risk management and information disclosure in supply chain analysis
2008 P. Ceravolo, S. Cimato, E. Damiani, G. Gianini, C. Fugazza, S. Marrara
Proceedings of the IFIP TC 11 23. international information security conference : IFIP 20. world computer congress, IFIP SEC '08 : september 7-10, 2008, Milano, Italy
2008 S. Jajodia, P. Samarati, S. Cimato
Biometrics and privacy
2008 S. Cimato, R. Sassi, F. Scotti
Hazards in full-disclosure supply chains
2008 F. Frati, E. Damiani, P. Ceravolo, S. Cimato, C. Fugazza, G. Gianini, S. Marrara, O. Scotti
A lightweight protocol for dynamic RFID identification
2008 S. Cimato
Obfuscation for the common good
2008 E. Damiani, P. Ceravolo, S. Cimato, G. Gianini
Privacy-aware biometrics : design and implementation of a multimodal verification system
2008 S. Cimato, M. Gamassi, V. Piuri, R. Sassi, F. Scotti
Efficient key management for enforcing access control in outsourced scenarios
2009 C. Blundo, S. Cimato, S. De Capitani di Vimercati, A. De Santis, S. Foresti, S. Paraboschi, P. Samarati
Privacy in biometrics
2009 S. Cimato, M. Gamassi, V. Piuri, R. Sassi, F. Scotti
A multi-biometric verification system for the privacy protection of iris templates
2009 S. Cimato , M. Gamassi, V. Piuri, R. Sassi, F. Scotti
Using incentive schemes to alleviate supply chain risks
2010 M. Anisetti, E. Damiani, F. Frati, S. Cimato, G. Gianini
Secure metering schemes
2010 C. Blundo, S. Cimato, B. Masucci
A distributed and privacy-preserving method for network intrusion detection
2010 F. Benali, N. Bennani, G. Gianini, S. Cimato
Toward cloud-based key management for outsourced databases
2010 N. Bennani, S. Cimato, E. Damiani
A simple role mining algorithm
2010 C. Blundo, S. Cimato
Privacy preserving risk assessment of credit securities
2010 S. Cimato, E. Damiani, G. Gianini
Managing key hierarchies for access control enforcement : heuristic approaches
2010 C. Blundo, S. Cimato, S. De Capitani di Vimercati, A. De Santis, S. Foresti, S. Paraboschi, P. Samarati
Secure collaborative supply-chain management
2011 F. Kerschbaum, A. Schröpfer, A. Zilli, R. Pibernik, O. Catrina, S. de Hoogh, B. Schoenmakers, S. Cimato, E. Damiani
Biometric privacy
2011 F. Scotti, S. Cimato, R. Sassi
Probabilistic visual cryptography schemes
2011 S. Cimato, R. De Prisco, A. De Santis
Visual cryptography and secret image sharing
2011 S. Cimato, C.N. Yang
Ensuring XML integrity using watermarking techniques
2012 R. Tchokpon, S. Cimato, N. Bennani
Risk assessment of credit securities : the notion and the issues
2012 E. Damiani, S. Cimato, G. Gianini
Visual cryptography for color images
2012 S. Cimato, R. De Prisco, A. De Santis
Constrained role mining
2013 C. Blundo, S. Cimato
Visual cryptography based watermarking: definition and meaning
2013 S. Cimato, J.C. Yang, C. Wu
AS5 : a secure searchable secret sharing scheme for privacy preserving database outsourcing
2013 M.A. Hadavi, E. Damiani, R. Jalili, S. Cimato, Z. Ganjei
Image watermarking using visual cryptography
2013 S. Cimato
A scalable multi-party protocol for privacy-preserving equality test
2013 M. Sepehri, S. Cimato, E. Damiani
Toward secure clustered multi-party computation : a privacy-preserving clustering protocol
2013 S. Abbasi, S. Cimato, E. Damiani
Towards the certification of cloud services
2013 S. Cimato, E. Damiani, F. Zavatarelli, R. Menicocci
Visual cryptography schemes for graph based access structures
2013 S. Cimato
Clustering models in secure clustered multiparty computation
2013 S. Abbasi, S. Cimato, E. Damiani
Visual cryptography based watermarking
2014 S. Cimato, J.C.N. Yang, C.C. Wu
A risk model for cloud processes
2014 E. Damiani, S. Cimato, G. Gianini
A multi-party protocol for privacy-preserving range queries
2014 M. Sepehri, S. Cimato, E. Damiani
Visual cryptography based watermarking
2014 S. Cimato, J.C.N. Yang, C. Wu
ESOP Synthesis for Secure Computation
2014 S. Cimato, V. Ciriani, M. Moroni
Toward economic-aware risk assessment on the cloud
2015 V. Bellandi, S. Cimato, E. Damiani, G. Gianini, A. Zilli
New Results for Partial Key Exposure on RSA with Exponent Blinding
2015 R. Susella, S. Mella, S. Cimato
Data sharing on the cloud: a scalable proxy-based protocol for privacy-preserving queries
2015 M. Sepehri, S. Cimato, E. Damiani, C.Y. Yeun
Security and searchability in secret sharing based data outsourcing
2015 M.A. Hadavi, R. Jalili, E. Damiani, S. Cimato
Privacy-Preserving Query Processing by Multi-Party Computation
2015 M. Sepehri, S. Cimato, E. Damiani
Key recovery in public clouds: A survey on cross-vm side channel attacks
2016 S. Cimato, E. Damiani, S. Mella, C. Yang
3-out-of-n cheating prevention visual cryptographic schemes
2016 S. Cai, J. Wu, S. Cimato, C. Yang
Minimization of ESOP forms for secure computation
2016 S. Cimato, V. Ciriani, M. Moroni
Partial key exposure attacks on RSA with exponent blinding
2016 S. Cimato, S. Mella, R. Susella
Possibilistic assessment of process-related disclosure risks on the cloud
2016 V. Bellandi, S. Cimato, E. Damiani, G. Gianini
Paying with a selfie: a hybrid micro-payment framework based on visual cryptography
2016 S. Cimato, E. Damiani, F. Frati, J.T. Hounsou, J. Tandjiékpon
Exploiting Quantum Gates in Secure Computation
2017 M. Ehsanpour, S. Cimato, V. Ciriani, E. Damiani
Visual Cryptography in Action: The Pay-with-a-Selfie Demo
2017 S. Cimato, E. Damiani, D.J.M. Shehadai, R. Asal, F. Frati, C. Yeob Yeun, J.T. Hounsou, J.P. Houngbo
PRUCC-RM: Permission-Role-Usage Cardinality Constrained Role Mining
2017 C. Blundo, S. Cimato, L. Siniscalchi
A multiple valued logic approach for the synthesis of garbled circuits
2017 S. Cimato, V. Ciriani, E. Damiani, M. Ehsanpour
41st IEEE Annual Computer Software and Applications Conference
2017 S.I. Ahamed, C. Demartini, T.M. Conte, L. Liu, W.R. Claycomb, M. Nakamura, E. Tovar, S. Cimato, C.-. Lung, H. Takakura, J.J. Yang, T. Akiyama, Z. Zhang, K. Hasan
Efficient Implementation of a Proxy-based Protocol for Data Sharing on the Cloud
2017 M. Sepehri, S. Cimato, E. Damiani
Are mHealth Apps Secure? : A Case Study
2018 C. Braghin, S. Cimato, A. Della Libera
A Comparative Analysis of Current Cryptocurrencies
2018 E. Damiani, S. Cimato, L. Mauri
Some ideas on privacy-aware data analytics in the internet-of-everything
2018 S. Cimato, E. Damiani
Porting the Pay with a (Group) Selfie (PGS) Payment System to Crypto Currency
2018 E. Damiani, P.J. Houngbo, J.T. Hounsou, R. Asal, S. Cimato, F. Frati, D. Shehada, C.Y. Yeun
PostProcessing in Constrained Role Mining
2018 C. Blundo, S. Cimato, L. Siniscalchi
2018 IEEE 42nd Annual Computer Software and Applications Conference
2018 S. Reisman, S. Iqbal Ahamed, C. Demartini, T.M. Conte, L. Liu, W.R. Claycomb, M. Nakamura, E. Tovar, S. Cimato, C. Lung, H. Takakura, J. Yang, T. Akiyama, Z. Zhang, K. Hasan
Embedding a Digital Wallet to Pay-with-a-Selfie, from Functional Requirements to Prototype
2019 P.J. Houngbo, J.T. Hounsou, E. Damiani, R. Asal, S. Cimato, F. Frati, C.Y. Yeun
Embedding a Digital Wallet to Pay-with-a-Selfie, Defining the System Architecture as Blockchain Based
2019 P.J. Houngbo, J.T. Hounsou, E. Damiani, R. Asal, S. Cimato, F. Frati, C.Y. Yeun
2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC). 1
2019 V. Getov, J. Gaudiot, N. Yamai, S. Cimato, J. Morris Chang, Y. Teranishi, J. Yang, H. Va Leong, H. Shahriar, M. Takemoto, D. Towey, H. Takakura, A. Elcci, S. Takeuchi, S. Puri
An OBDD-Based Technique for the Efficient Synthesis of Garbled Circuits
2019 S. Cimato, V. Ciriani, E. Damiani, M. Ehsanpour
Towards Blockchain-Based E-Voting Systems
2019 C. Braghin, S. Cimato, S.R. Cominesi, E. Damiani, L. Mauri
Designing smart-contract based auctions
2019 C. Braghin, S. Cimato, E. Damiani, M. Baronchelli
Be your neighbor's miner: Building trust in ledger content via reciprocally useful work
2020 L. Mauri, E. Damiani, S. Cimato
Multiplicative Complexity of Autosymmetric Functions: Theory and Applications to Security
2020 A. Bernasconi, S. Cimato, V. Ciriani, M.C. Molteni
A Formal Approach for the Analysis of the XRP Ledger Consensus Protocol
2020 L. Mauri, S. Cimato, E. Damiani
Towards the Monitoring and Evaluation of Trainees’ Activities in Cyber Ranges
2020 C. Braghin, S. Cimato, E. Damiani, F. Frati, E. Riccobene, S. Astaneh
Special Issue "Computing Methods in Steganography and Multimedia Security"
2020 J.C.N. Yang, C. Kim, S. Cimato
A Model Driven Approach for Cyber Security Scenarios Deployment
2020 C. Braghin, S. Cimato, E. Damiani, F. Frati, L. Mauri, E. Riccobene
Towards Efficient and Secure Analysis of Large Datasets
2020 S. Cimato, S. Nicolo
Introduction to the special issue on deep learning for real-time information hiding and forensics
2020 Z. Zhou, C. Yang, C. Kim, S. Cimato
Deep Learning for Real-time Information Hiding and Forensics
2020 Z. Zhou, C. Yang, C. Kim, S. Cimato
A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem
2020 S. Cimato, G. Gianini, M. Sepehri, R. Asal, E. Damiani
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile