Sfoglia per Autore
A Sharded Blockchain Architecture for Healthcare Data
2024 J.Z. Shahid, S. Cimato, Z. Muhammad
Efficient Secure Computation of Edit Distance on Genomic Data
2024 A. Migliore, S. Cimato, G. Trucco
Role mining under User-Distribution cardinality constraint
2023 C. Blundo, S. Cimato
Training future it leaders in a collaborative and multicultural setting
2022 L. Brunie, S. Ben Mokhtar, D. Brac de la Perrière, D. Fabrègue, L. Tondu, A. Cordier, V. Delplanque, A. Bertrand, O. Coueffe, H. Kosch, E. Damiani, S. Cimato, I.A. Awada, A. Olaru, R. Wossidlo, G. Fiorentino, L. Lombardo, F.S. Nucci, O. Cramariuc
Fostering student entrepreneurship mindset through the embedding of international student teams into start-ips and the sudy of company-driven open questions
2022 L. Brunie, S. Ben Mokhtar, D. Brac de la Perrière, D. Fabrègue, L. Tondu, A. Cordier, V. Delplanque, A. Bertrand, O. Coueffe, H. Kosch, E. Damiani, S. Cimato, I.A. Awada, A. Olaru, R. Wossidlo, G. Fiorentino, L. Lombardo, F.S. Nucci, O. Cramariuc
A Blockchain-based Trustworthy Cloud Services Digital Ecosystem
2022 E. Bellini, I. Aversa, S. Cimato, A. Esposito
Untangling the XRP Ledger: Insights and Analysis
2022 L. Mauri, S. Cimato, E. Damiani
Multiplicative Complexity of XOR Based Regular Functions
2022 A. Bernasconi, S. Cimato, V. Ciriani, M.C. Molteni
Heuristics for constrained role mining in the post-processing framework
2022 C. Blundo, S. Cimato, L. Siniscalchi
Key competences expected of future it leardes in a multicultural and digital Europe
2021 L. Brunie, S. Cimato, O. Cramariuc
Towards a Trustworthy Semantic-Aware Marketplace for Interoperable Cloud Services
2021 E. Bellini, S. Cimato, E. Damiani, B. Di Martino, A. Esposito
Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints
2021 C. Blundo, S. Cimato, L. Siniscalchi
Biometric Privacy
2021 S. Cimato, R. Sassi, F. Scotti
Managing constraints in role based access control
2020 C. Blundo, S. Cimato, L. Siniscalchi
A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem
2020 S. Cimato, G. Gianini, M. Sepehri, R. Asal, E. Damiani
Deep Learning for Real-time Information Hiding and Forensics
2020 Z. Zhou, C. Yang, C. Kim, S. Cimato
Towards the Monitoring and Evaluation of Trainees’ Activities in Cyber Ranges
2020 C. Braghin, S. Cimato, E. Damiani, F. Frati, E. Riccobene, S. Astaneh
A Formal Approach for the Analysis of the XRP Ledger Consensus Protocol
2020 L. Mauri, S. Cimato, E. Damiani
Be your neighbor's miner: Building trust in ledger content via reciprocally useful work
2020 L. Mauri, E. Damiani, S. Cimato
Multiplicative Complexity of Autosymmetric Functions: Theory and Applications to Security
2020 A. Bernasconi, S. Cimato, V. Ciriani, M.C. Molteni
Towards Efficient and Secure Analysis of Large Datasets
2020 S. Cimato, S. Nicolo
Introduction to the special issue on deep learning for real-time information hiding and forensics
2020 Z. Zhou, C. Yang, C. Kim, S. Cimato
Special Issue "Computing Methods in Steganography and Multimedia Security"
2020 J.C.N. Yang, C. Kim, S. Cimato
A Model Driven Approach for Cyber Security Scenarios Deployment
2020 C. Braghin, S. Cimato, E. Damiani, F. Frati, L. Mauri, E. Riccobene
2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC). 1
2019 V. Getov, J. Gaudiot, N. Yamai, S. Cimato, J. Morris Chang, Y. Teranishi, J. Yang, H. Va Leong, H. Shahriar, M. Takemoto, D. Towey, H. Takakura, A. Elcci, S. Takeuchi, S. Puri
Designing smart-contract based auctions
2019 C. Braghin, S. Cimato, E. Damiani, M. Baronchelli
Embedding a Digital Wallet to Pay-with-a-Selfie, Defining the System Architecture as Blockchain Based
2019 P.J. Houngbo, J.T. Hounsou, E. Damiani, R. Asal, S. Cimato, F. Frati, C.Y. Yeun
An OBDD-Based Technique for the Efficient Synthesis of Garbled Circuits
2019 S. Cimato, V. Ciriani, E. Damiani, M. Ehsanpour
Towards Blockchain-Based E-Voting Systems
2019 C. Braghin, S. Cimato, S.R. Cominesi, E. Damiani, L. Mauri
Embedding a Digital Wallet to Pay-with-a-Selfie, from Functional Requirements to Prototype
2019 P.J. Houngbo, J.T. Hounsou, E. Damiani, R. Asal, S. Cimato, F. Frati, C.Y. Yeun
Some ideas on privacy-aware data analytics in the internet-of-everything
2018 S. Cimato, E. Damiani
Porting the Pay with a (Group) Selfie (PGS) Payment System to Crypto Currency
2018 E. Damiani, P.J. Houngbo, J.T. Hounsou, R. Asal, S. Cimato, F. Frati, D. Shehada, C.Y. Yeun
Are mHealth Apps Secure? : A Case Study
2018 C. Braghin, S. Cimato, A. Della Libera
2018 IEEE 42nd Annual Computer Software and Applications Conference
2018 S. Reisman, S. Iqbal Ahamed, C. Demartini, T.M. Conte, L. Liu, W.R. Claycomb, M. Nakamura, E. Tovar, S. Cimato, C. Lung, H. Takakura, J. Yang, T. Akiyama, Z. Zhang, K. Hasan
A Comparative Analysis of Current Cryptocurrencies
2018 E. Damiani, S. Cimato, L. Mauri
PostProcessing in Constrained Role Mining
2018 C. Blundo, S. Cimato, L. Siniscalchi
Efficient Implementation of a Proxy-based Protocol for Data Sharing on the Cloud
2017 M. Sepehri, S. Cimato, E. Damiani
41st IEEE Annual Computer Software and Applications Conference
2017 S.I. Ahamed, C. Demartini, T.M. Conte, L. Liu, W.R. Claycomb, M. Nakamura, E. Tovar, S. Cimato, C.-. Lung, H. Takakura, J.J. Yang, T. Akiyama, Z. Zhang, K. Hasan
Visual Cryptography in Action: The Pay-with-a-Selfie Demo
2017 S. Cimato, E. Damiani, D.J.M. Shehadai, R. Asal, F. Frati, C. Yeob Yeun, J.T. Hounsou, J.P. Houngbo
PRUCC-RM: Permission-Role-Usage Cardinality Constrained Role Mining
2017 C. Blundo, S. Cimato, L. Siniscalchi
A multiple valued logic approach for the synthesis of garbled circuits
2017 S. Cimato, V. Ciriani, E. Damiani, M. Ehsanpour
Exploiting Quantum Gates in Secure Computation
2017 M. Ehsanpour, S. Cimato, V. Ciriani, E. Damiani
Minimization of ESOP forms for secure computation
2016 S. Cimato, V. Ciriani, M. Moroni
Possibilistic assessment of process-related disclosure risks on the cloud
2016 V. Bellandi, S. Cimato, E. Damiani, G. Gianini
3-out-of-n cheating prevention visual cryptographic schemes
2016 S. Cai, J. Wu, S. Cimato, C. Yang
Key recovery in public clouds: A survey on cross-vm side channel attacks
2016 S. Cimato, E. Damiani, S. Mella, C. Yang
Paying with a selfie: a hybrid micro-payment framework based on visual cryptography
2016 S. Cimato, E. Damiani, F. Frati, J.T. Hounsou, J. Tandjiékpon
Partial key exposure attacks on RSA with exponent blinding
2016 S. Cimato, S. Mella, R. Susella
Privacy-Preserving Query Processing by Multi-Party Computation
2015 M. Sepehri, S. Cimato, E. Damiani
Security and searchability in secret sharing based data outsourcing
2015 M.A. Hadavi, R. Jalili, E. Damiani, S. Cimato
Toward economic-aware risk assessment on the cloud
2015 V. Bellandi, S. Cimato, E. Damiani, G. Gianini, A. Zilli
Data sharing on the cloud: a scalable proxy-based protocol for privacy-preserving queries
2015 M. Sepehri, S. Cimato, E. Damiani, C.Y. Yeun
New Results for Partial Key Exposure on RSA with Exponent Blinding
2015 R. Susella, S. Mella, S. Cimato
A risk model for cloud processes
2014 E. Damiani, S. Cimato, G. Gianini
Visual cryptography based watermarking
2014 S. Cimato, J.C.N. Yang, C. Wu
ESOP Synthesis for Secure Computation
2014 S. Cimato, V. Ciriani, M. Moroni
Visual cryptography based watermarking
2014 S. Cimato, J.C.N. Yang, C.C. Wu
A multi-party protocol for privacy-preserving range queries
2014 M. Sepehri, S. Cimato, E. Damiani
Clustering models in secure clustered multiparty computation
2013 S. Abbasi, S. Cimato, E. Damiani
Towards the certification of cloud services
2013 S. Cimato, E. Damiani, F. Zavatarelli, R. Menicocci
Image watermarking using visual cryptography
2013 S. Cimato
Visual cryptography based watermarking: definition and meaning
2013 S. Cimato, J.C. Yang, C. Wu
Constrained role mining
2013 C. Blundo, S. Cimato
AS5 : a secure searchable secret sharing scheme for privacy preserving database outsourcing
2013 M.A. Hadavi, E. Damiani, R. Jalili, S. Cimato, Z. Ganjei
Toward secure clustered multi-party computation : a privacy-preserving clustering protocol
2013 S. Abbasi, S. Cimato, E. Damiani
Visual cryptography schemes for graph based access structures
2013 S. Cimato
A scalable multi-party protocol for privacy-preserving equality test
2013 M. Sepehri, S. Cimato, E. Damiani
Visual cryptography for color images
2012 S. Cimato, R. De Prisco, A. De Santis
Risk assessment of credit securities : the notion and the issues
2012 E. Damiani, S. Cimato, G. Gianini
Ensuring XML integrity using watermarking techniques
2012 R. Tchokpon, S. Cimato, N. Bennani
Visual cryptography and secret image sharing
2011 S. Cimato, C.N. Yang
Probabilistic visual cryptography schemes
2011 S. Cimato, R. De Prisco, A. De Santis
Biometric privacy
2011 F. Scotti, S. Cimato, R. Sassi
Secure collaborative supply-chain management
2011 F. Kerschbaum, A. Schröpfer, A. Zilli, R. Pibernik, O. Catrina, S. de Hoogh, B. Schoenmakers, S. Cimato, E. Damiani
Managing key hierarchies for access control enforcement : heuristic approaches
2010 C. Blundo, S. Cimato, S. De Capitani di Vimercati, A. De Santis, S. Foresti, S. Paraboschi, P. Samarati
A simple role mining algorithm
2010 C. Blundo, S. Cimato
Toward cloud-based key management for outsourced databases
2010 N. Bennani, S. Cimato, E. Damiani
Privacy preserving risk assessment of credit securities
2010 S. Cimato, E. Damiani, G. Gianini
Using incentive schemes to alleviate supply chain risks
2010 M. Anisetti, E. Damiani, F. Frati, S. Cimato, G. Gianini
A distributed and privacy-preserving method for network intrusion detection
2010 F. Benali, N. Bennani, G. Gianini, S. Cimato
Secure metering schemes
2010 C. Blundo, S. Cimato, B. Masucci
Privacy in biometrics
2009 S. Cimato, M. Gamassi, V. Piuri, R. Sassi, F. Scotti
A multi-biometric verification system for the privacy protection of iris templates
2009 S. Cimato , M. Gamassi, V. Piuri, R. Sassi, F. Scotti
Efficient key management for enforcing access control in outsourced scenarios
2009 C. Blundo, S. Cimato, S. De Capitani di Vimercati, A. De Santis, S. Foresti, S. Paraboschi, P. Samarati
Privacy-aware biometrics : design and implementation of a multimodal verification system
2008 S. Cimato, M. Gamassi, V. Piuri, R. Sassi, F. Scotti
A lightweight protocol for dynamic RFID identification
2008 S. Cimato
Proceedings of the IFIP TC 11 23. international information security conference : IFIP 20. world computer congress, IFIP SEC '08 : september 7-10, 2008, Milano, Italy
2008 S. Jajodia, P. Samarati, S. Cimato
Hazards in full-disclosure supply chains
2008 F. Frati, E. Damiani, P. Ceravolo, S. Cimato, C. Fugazza, G. Gianini, S. Marrara, O. Scotti
Biometrics and privacy
2008 S. Cimato, R. Sassi, F. Scotti
Obfuscation for the common good
2008 E. Damiani, P. Ceravolo, S. Cimato, G. Gianini
Risk management and information disclosure in supply chain analysis
2008 P. Ceravolo, S. Cimato, E. Damiani, G. Gianini, C. Fugazza, S. Marrara
Method for generating and verifying security information obtained by means of biometric readings
2007 S. Cimato, M. Gamassi, V. Piuri, D. Sana, R. Sassi, F. Scotti
Authenticated web services : a WS-security based implementation
2007 V. Auletta, C. Blundo, S. Cimato, E. De Cristofaro, G. Raimato
Colored visual cryptography without color darkening
2007 S. Cimato, R. De Prisco, A. De Santis
A biometric verification system addressing privacy concerns
2007 S. Cimato, M. Gamassi, V. Piuri, R. Sassi, F. Scotti
Metodo di generazione e di verifica di una informazione di sicurezza ottenuta mediante letture biometriche
2006 S. Cimato, M. Gamassi, V. Piuri, D. Sana, R. Sassi, F. Scotti
Visual cryptography schemes with optimal pixel expansion
2006 C. BLUNDO, S. CIMATO, A. DE SANTIS
Personal identification and verification using multimodal biometric data
2006 S. Cimato, M. Gamassi, V. Piuri, D. Sana, R. Sassi, F. Scotti
A web service based micro-payment system
2006 V. Auletta, C. Blundo, S. Cimato, G. Raimato
Privacy issues in biometric identification
2006 S. Cimato, M. Gamassi, V. Piuri, R. Sassi, F. Scotti
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile