Sfoglia per Autore
AvaDrive: A Blockchain Based Framework for Efficient Vehicle to Grid Management
2025 G. Aurora, C. Braghin, S. Cimato
Proceedings 2025 IEEE 49th Annual Computers, Software, and Applications Conference
2025 H. Shahriar, K. Shafiul Alam, H. Ohsaki, S. Cimato, M. Capretz, S. Ahmed, S. Iqbal Ahamed, A. Jahangir Alam Majumder, M. Haque, T. Yoshihisa, A. Cuzzocrea, M. Takemoto, N. Sakib, M. Elsayed
Biometric Privacy
2025 S. Cimato, R. Sassi, F. Scotti
Google Map-based Password Authentication Systems Using Tolerant Distance and Homomorphic Encryption
2025 Z. Zhou, C. Yang, S. Wang, G. Nan, S. Cimato, Y. Zheng, Q. Wang
A State Channel Based Approach to Address Scalability of Healthcare Data Sharing
2025 J. Shahid, S. Cimato
Blockchain in the Quantum Era: Surveying Security Challenges and Post-Quantum Cryptography
2025 M.T. Ramzan, S. Cimato
A Framework for Secure Sharing of Medical Images Based on Visual Cryptography
2025 C. Coduri, S. Cimato
A Sharded Blockchain Architecture for Healthcare Data
2024 J.Z. Shahid, S. Cimato, Z. Muhammad
Special Section Guest Editorial: Real-Time Image Steganography and Steganalysis
2024 S. Dong, S. Cimato, J. Kamruzzaman, Y. Hao
Real-Time Image Steganography and Steganalysis
2024 S. Dong, S. Cimato, J. Kamruzzaman, Y. Hao
Efficient Secure Computation of Edit Distance on Genomic Data
2024 A. Migliore, S. Cimato, G. Trucco
Role mining under User-Distribution cardinality constraint
2023 C. Blundo, S. Cimato
Multiplicative Complexity of XOR Based Regular Functions
2022 A. Bernasconi, S. Cimato, V. Ciriani, M.C. Molteni
Untangling the XRP Ledger: Insights and Analysis
2022 L. Mauri, S. Cimato, E. Damiani
Applying Visual Cryptography to Data Hiding, Watermarking and Secret Image Sharing for Enhancement of Information Security
2022 C. Yang, S. Cimato, X. Yan, W. Puech
Fostering student entrepreneurship mindset through the embedding of international student teams into start-ips and the sudy of company-driven open questions
2022 L. Brunie, S. Ben Mokhtar, D. Brac de la Perrière, D. Fabrègue, L. Tondu, A. Cordier, V. Delplanque, A. Bertrand, O. Coueffe, H. Kosch, E. Damiani, S. Cimato, I.A. Awada, A. Olaru, R. Wossidlo, G. Fiorentino, L. Lombardo, F.S. Nucci, O. Cramariuc
Heuristics for constrained role mining in the post-processing framework
2022 C. Blundo, S. Cimato, L. Siniscalchi
Training future it leaders in a collaborative and multicultural setting
2022 L. Brunie, S. Ben Mokhtar, D. Brac de la Perrière, D. Fabrègue, L. Tondu, A. Cordier, V. Delplanque, A. Bertrand, O. Coueffe, H. Kosch, E. Damiani, S. Cimato, I.A. Awada, A. Olaru, R. Wossidlo, G. Fiorentino, L. Lombardo, F.S. Nucci, O. Cramariuc
A Blockchain-based Trustworthy Cloud Services Digital Ecosystem
2022 E. Bellini, I. Aversa, S. Cimato, A. Esposito
Towards a Trustworthy Semantic-Aware Marketplace for Interoperable Cloud Services
2021 E. Bellini, S. Cimato, E. Damiani, B. Di Martino, A. Esposito
Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints
2021 C. Blundo, S. Cimato, L. Siniscalchi
Biometric Privacy
2021 S. Cimato, R. Sassi, F. Scotti
Key competences expected of future it leardes in a multicultural and digital Europe
2021 L. Brunie, S. Cimato, O. Cramariuc
Managing constraints in role based access control
2020 C. Blundo, S. Cimato, L. Siniscalchi
A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem
2020 S. Cimato, G. Gianini, M. Sepehri, R. Asal, E. Damiani
Deep Learning for Real-time Information Hiding and Forensics
2020 Z. Zhou, C. Yang, C. Kim, S. Cimato
Multiplicative Complexity of Autosymmetric Functions: Theory and Applications to Security
2020 A. Bernasconi, S. Cimato, V. Ciriani, M.C. Molteni
Be your neighbor's miner: Building trust in ledger content via reciprocally useful work
2020 L. Mauri, E. Damiani, S. Cimato
A Model Driven Approach for Cyber Security Scenarios Deployment
2020 C. Braghin, S. Cimato, E. Damiani, F. Frati, L. Mauri, E. Riccobene
Special Issue "Computing Methods in Steganography and Multimedia Security"
2020 J.C.N. Yang, C. Kim, S. Cimato
Introduction to the special issue on deep learning for real-time information hiding and forensics
2020 Z. Zhou, C. Yang, C. Kim, S. Cimato
Towards the Monitoring and Evaluation of Trainees’ Activities in Cyber Ranges
2020 C. Braghin, S. Cimato, E. Damiani, F. Frati, E. Riccobene, S. Astaneh
Towards Efficient and Secure Analysis of Large Datasets
2020 S. Cimato, S. Nicolo
A Formal Approach for the Analysis of the XRP Ledger Consensus Protocol
2020 L. Mauri, S. Cimato, E. Damiani
An OBDD-Based Technique for the Efficient Synthesis of Garbled Circuits
2019 S. Cimato, V. Ciriani, E. Damiani, M. Ehsanpour
Towards Blockchain-Based E-Voting Systems
2019 C. Braghin, S. Cimato, S.R. Cominesi, E. Damiani, L. Mauri
2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC). 1
2019 V. Getov, J. Gaudiot, N. Yamai, S. Cimato, J. Morris Chang, Y. Teranishi, J. Yang, H. Va Leong, H. Shahriar, M. Takemoto, D. Towey, H. Takakura, A. Elcci, S. Takeuchi, S. Puri
Embedding a Digital Wallet to Pay-with-a-Selfie, Defining the System Architecture as Blockchain Based
2019 P.J. Houngbo, J.T. Hounsou, E. Damiani, R. Asal, S. Cimato, F. Frati, C.Y. Yeun
Embedding a Digital Wallet to Pay-with-a-Selfie, from Functional Requirements to Prototype
2019 P.J. Houngbo, J.T. Hounsou, E. Damiani, R. Asal, S. Cimato, F. Frati, C.Y. Yeun
Designing smart-contract based auctions
2019 C. Braghin, S. Cimato, E. Damiani, M. Baronchelli
2018 IEEE 42nd Annual Computer Software and Applications Conference
2018 S. Reisman, S. Iqbal Ahamed, C. Demartini, T.M. Conte, L. Liu, W.R. Claycomb, M. Nakamura, E. Tovar, S. Cimato, C. Lung, H. Takakura, J. Yang, T. Akiyama, Z. Zhang, K. Hasan
2018 IEEE 42nd Annual Computer Software and Applications Conference
2018 S. Reisman, S. Iqbal Ahamed, C. Demartini, T.M. Conte, L. Liu, W.R. Claycomb, M. Nakamura, E. Tovar, S. Cimato, C. Lung, H. Takakura, J. Yang, T. Akiyama, Z. Zhang, K. Hasan
Some ideas on privacy-aware data analytics in the internet-of-everything
2018 S. Cimato, E. Damiani
PostProcessing in Constrained Role Mining
2018 C. Blundo, S. Cimato, L. Siniscalchi
Are mHealth Apps Secure? : A Case Study
2018 C. Braghin, S. Cimato, A. Della Libera
A Comparative Analysis of Current Cryptocurrencies
2018 E. Damiani, S. Cimato, L. Mauri
Porting the Pay with a (Group) Selfie (PGS) Payment System to Crypto Currency
2018 E. Damiani, P.J. Houngbo, J.T. Hounsou, R. Asal, S. Cimato, F. Frati, D. Shehada, C.Y. Yeun
Efficient Implementation of a Proxy-based Protocol for Data Sharing on the Cloud
2017 M. Sepehri, S. Cimato, E. Damiani
Visual Cryptography in Action: The Pay-with-a-Selfie Demo
2017 S. Cimato, E. Damiani, D.J.M. Shehadai, R. Asal, F. Frati, C. Yeob Yeun, J.T. Hounsou, J.P. Houngbo
41st IEEE Annual Computer Software and Applications Conference
2017 S.I. Ahamed, C. Demartini, T.M. Conte, L. Liu, W.R. Claycomb, M. Nakamura, E. Tovar, S. Cimato, C.-. Lung, H. Takakura, J.J. Yang, T. Akiyama, Z. Zhang, K. Hasan
A multiple valued logic approach for the synthesis of garbled circuits
2017 S. Cimato, V. Ciriani, E. Damiani, M. Ehsanpour
Exploiting Quantum Gates in Secure Computation
2017 M. Ehsanpour, S. Cimato, V. Ciriani, E. Damiani
PRUCC-RM: Permission-Role-Usage Cardinality Constrained Role Mining
2017 C. Blundo, S. Cimato, L. Siniscalchi
3-out-of-n cheating prevention visual cryptographic schemes
2016 S. Cai, J. Wu, S. Cimato, C. Yang
Partial key exposure attacks on RSA with exponent blinding
2016 S. Cimato, S. Mella, R. Susella
Paying with a selfie: a hybrid micro-payment framework based on visual cryptography
2016 S. Cimato, E. Damiani, F. Frati, J.T. Hounsou, J. Tandjiékpon
Minimization of ESOP forms for secure computation
2016 S. Cimato, V. Ciriani, M. Moroni
Possibilistic assessment of process-related disclosure risks on the cloud
2016 V. Bellandi, S. Cimato, E. Damiani, G. Gianini
Key recovery in public clouds: A survey on cross-vm side channel attacks
2016 S. Cimato, E. Damiani, S. Mella, C. Yang
Privacy-Preserving Query Processing by Multi-Party Computation
2015 M. Sepehri, S. Cimato, E. Damiani
Security and searchability in secret sharing based data outsourcing
2015 M.A. Hadavi, R. Jalili, E. Damiani, S. Cimato
Data sharing on the cloud: a scalable proxy-based protocol for privacy-preserving queries
2015 M. Sepehri, S. Cimato, E. Damiani, C.Y. Yeun
New Results for Partial Key Exposure on RSA with Exponent Blinding
2015 R. Susella, S. Mella, S. Cimato
Toward economic-aware risk assessment on the cloud
2015 V. Bellandi, S. Cimato, E. Damiani, G. Gianini, A. Zilli
A risk model for cloud processes
2014 E. Damiani, S. Cimato, G. Gianini
ESOP Synthesis for Secure Computation
2014 S. Cimato, V. Ciriani, M. Moroni
Visual cryptography based watermarking
2014 S. Cimato, J.C.N. Yang, C. Wu
A multi-party protocol for privacy-preserving range queries
2014 M. Sepehri, S. Cimato, E. Damiani
Clustering models in secure clustered multiparty computation
2013 S. Abbasi, S. Cimato, E. Damiani
Image watermarking using visual cryptography
2013 S. Cimato
Toward secure clustered multi-party computation : a privacy-preserving clustering protocol
2013 S. Abbasi, S. Cimato, E. Damiani
Towards the certification of cloud services
2013 S. Cimato, E. Damiani, F. Zavatarelli, R. Menicocci
Visual cryptography schemes for graph based access structures
2013 S. Cimato
Visual cryptography based watermarking: definition and meaning
2013 S. Cimato, J.C. Yang, C. Wu
A scalable multi-party protocol for privacy-preserving equality test
2013 M. Sepehri, S. Cimato, E. Damiani
Constrained role mining
2013 C. Blundo, S. Cimato
AS5 : a secure searchable secret sharing scheme for privacy preserving database outsourcing
2013 M.A. Hadavi, E. Damiani, R. Jalili, S. Cimato, Z. Ganjei
Risk assessment of credit securities : the notion and the issues
2012 E. Damiani, S. Cimato, G. Gianini
Ensuring XML integrity using watermarking techniques
2012 R. Tchokpon, S. Cimato, N. Bennani
Visual cryptography for color images
2012 S. Cimato, R. De Prisco, A. De Santis
Visual cryptography and secret image sharing
2011 S. Cimato, C.N. Yang
Biometric privacy
2011 F. Scotti, S. Cimato, R. Sassi
Secure collaborative supply-chain management
2011 F. Kerschbaum, A. Schröpfer, A. Zilli, R. Pibernik, O. Catrina, S. de Hoogh, B. Schoenmakers, S. Cimato, E. Damiani
Probabilistic visual cryptography schemes
2011 S. Cimato, R. De Prisco, A. De Santis
Managing key hierarchies for access control enforcement : heuristic approaches
2010 C. Blundo, S. Cimato, S. De Capitani di Vimercati, A. De Santis, S. Foresti, S. Paraboschi, P. Samarati
A simple role mining algorithm
2010 C. Blundo, S. Cimato
A distributed and privacy-preserving method for network intrusion detection
2010 F. Benali, N. Bennani, G. Gianini, S. Cimato
Privacy preserving risk assessment of credit securities
2010 S. Cimato, E. Damiani, G. Gianini
Secure metering schemes
2010 C. Blundo, S. Cimato, B. Masucci
Toward cloud-based key management for outsourced databases
2010 N. Bennani, S. Cimato, E. Damiani
Using incentive schemes to alleviate supply chain risks
2010 M. Anisetti, E. Damiani, F. Frati, S. Cimato, G. Gianini
A multi-biometric verification system for the privacy protection of iris templates
2009 S. Cimato , M. Gamassi, V. Piuri, R. Sassi, F. Scotti
Efficient key management for enforcing access control in outsourced scenarios
2009 C. Blundo, S. Cimato, S. De Capitani di Vimercati, A. De Santis, S. Foresti, S. Paraboschi, P. Samarati
Privacy in biometrics
2009 S. Cimato, M. Gamassi, V. Piuri, R. Sassi, F. Scotti
Risk management and information disclosure in supply chain analysis
2008 P. Ceravolo, S. Cimato, E. Damiani, G. Gianini, C. Fugazza, S. Marrara
Obfuscation for the common good
2008 E. Damiani, P. Ceravolo, S. Cimato, G. Gianini
Privacy-aware biometrics : design and implementation of a multimodal verification system
2008 S. Cimato, M. Gamassi, V. Piuri, R. Sassi, F. Scotti
Hazards in full-disclosure supply chains
2008 F. Frati, E. Damiani, P. Ceravolo, S. Cimato, C. Fugazza, G. Gianini, S. Marrara, O. Scotti
Proceedings of the IFIP TC 11 23. international information security conference : IFIP 20. world computer congress, IFIP SEC '08 : september 7-10, 2008, Milano, Italy
2008 S. Jajodia, P. Samarati, S. Cimato
A lightweight protocol for dynamic RFID identification
2008 S. Cimato
Legenda icone
- file ad accesso aperto
- file disponibili sulla rete interna
- file disponibili agli utenti autorizzati
- file disponibili solo agli amministratori
- file sotto embargo
- nessun file disponibile