CIMATO, STELVIO
CIMATO, STELVIO
Dipartimento di Informatica Giovanni Degli Antoni
2018 IEEE 42nd Annual Computer Software and Applications Conference
2018 S. Reisman, S. Iqbal Ahamed, C. Demartini, T.M. Conte, L. Liu, W.R. Claycomb, M. Nakamura, E. Tovar, S. Cimato, C. Lung, H. Takakura, J. Yang, T. Akiyama, Z. Zhang, K. Hasan
2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC). 1
2019 V. Getov, J. Gaudiot, N. Yamai, S. Cimato, J. Morris Chang, Y. Teranishi, J. Yang, H. Va Leong, H. Shahriar, M. Takemoto, D. Towey, H. Takakura, A. Elcci, S. Takeuchi, S. Puri
3-out-of-n cheating prevention visual cryptographic schemes
2016 S. Cai, J. Wu, S. Cimato, C. Yang
41st IEEE Annual Computer Software and Applications Conference
2017 S.I. Ahamed, C. Demartini, T.M. Conte, L. Liu, W.R. Claycomb, M. Nakamura, E. Tovar, S. Cimato, C.-. Lung, H. Takakura, J.J. Yang, T. Akiyama, Z. Zhang, K. Hasan
A biometric verification system addressing privacy concerns
2007 S. Cimato, M. Gamassi, V. Piuri, R. Sassi, F. Scotti
A Blockchain-based Trustworthy Cloud Services Digital Ecosystem
2022 E. Bellini, I. Aversa, S. Cimato, A. Esposito
A Comparative Analysis of Current Cryptocurrencies
2018 E. Damiani, S. Cimato, L. Mauri
A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem
2020 S. Cimato, G. Gianini, M. Sepehri, R. Asal, E. Damiani
A distributed and privacy-preserving method for network intrusion detection
2010 F. Benali, N. Bennani, G. Gianini, S. Cimato
A Formal Approach for the Analysis of the XRP Ledger Consensus Protocol
2020 L. Mauri, S. Cimato, E. Damiani
A lightweight approach to authenticated Web caching
2005 C. Blundo, S. Cimato, R. De Prisco
A lightweight protocol for dynamic RFID identification
2008 S. Cimato
A Model Driven Approach for Cyber Security Scenarios Deployment
2020 C. Braghin, S. Cimato, E. Damiani, F. Frati, L. Mauri, E. Riccobene
A multi-biometric verification system for the privacy protection of iris templates
2009 S. Cimato , M. Gamassi, V. Piuri, R. Sassi, F. Scotti
A multi-party protocol for privacy-preserving range queries
2014 M. Sepehri, S. Cimato, E. Damiani
A multiple valued logic approach for the synthesis of garbled circuits
2017 S. Cimato, V. Ciriani, E. Damiani, M. Ehsanpour
A note on optimal metering schemes
2002 C. Blundo, S. Cimato, B. Masucci
A risk model for cloud processes
2014 E. Damiani, S. Cimato, G. Gianini
A scalable multi-party protocol for privacy-preserving equality test
2013 M. Sepehri, S. Cimato, E. Damiani
A simple role mining algorithm
2010 C. Blundo, S. Cimato