CIMATO, STELVIO
CIMATO, STELVIO
Dipartimento di Informatica Giovanni Degli Antoni
Google Map-based Password Authentication Systems Using Tolerant Distance and Homomorphic Encryption
2025 Z. Zhou, C. Yang, S. Wang, G. Nan, S. Cimato, Y. Zheng, Q. Wang
A Sharded Blockchain Architecture for Healthcare Data
2024 J.Z. Shahid, S. Cimato, Z. Muhammad
Efficient Secure Computation of Edit Distance on Genomic Data
2024 A. Migliore, S. Cimato, G. Trucco
Role mining under User-Distribution cardinality constraint
2023 C. Blundo, S. Cimato
Multiplicative Complexity of XOR Based Regular Functions
2022 A. Bernasconi, S. Cimato, V. Ciriani, M.C. Molteni
Untangling the XRP Ledger: Insights and Analysis
2022 L. Mauri, S. Cimato, E. Damiani
Heuristics for constrained role mining in the post-processing framework
2022 C. Blundo, S. Cimato, L. Siniscalchi
Training future it leaders in a collaborative and multicultural setting
2022 L. Brunie, S. Ben Mokhtar, D. Brac de la Perrière, D. Fabrègue, L. Tondu, A. Cordier, V. Delplanque, A. Bertrand, O. Coueffe, H. Kosch, E. Damiani, S. Cimato, I.A. Awada, A. Olaru, R. Wossidlo, G. Fiorentino, L. Lombardo, F.S. Nucci, O. Cramariuc
A Blockchain-based Trustworthy Cloud Services Digital Ecosystem
2022 E. Bellini, I. Aversa, S. Cimato, A. Esposito
Fostering student entrepreneurship mindset through the embedding of international student teams into start-ips and the sudy of company-driven open questions
2022 L. Brunie, S. Ben Mokhtar, D. Brac de la Perrière, D. Fabrègue, L. Tondu, A. Cordier, V. Delplanque, A. Bertrand, O. Coueffe, H. Kosch, E. Damiani, S. Cimato, I.A. Awada, A. Olaru, R. Wossidlo, G. Fiorentino, L. Lombardo, F.S. Nucci, O. Cramariuc
Key competences expected of future it leardes in a multicultural and digital Europe
2021 L. Brunie, S. Cimato, O. Cramariuc
Towards a Trustworthy Semantic-Aware Marketplace for Interoperable Cloud Services
2021 E. Bellini, S. Cimato, E. Damiani, B. Di Martino, A. Esposito
Role Mining Heuristics for Permission-Role-Usage Cardinality Constraints
2021 C. Blundo, S. Cimato, L. Siniscalchi
Biometric Privacy
2021 S. Cimato, R. Sassi, F. Scotti
A Formal Approach for the Analysis of the XRP Ledger Consensus Protocol
2020 L. Mauri, S. Cimato, E. Damiani
Be your neighbor's miner: Building trust in ledger content via reciprocally useful work
2020 L. Mauri, E. Damiani, S. Cimato
Special Issue "Computing Methods in Steganography and Multimedia Security"
2020 J.C.N. Yang, C. Kim, S. Cimato
Deep Learning for Real-time Information Hiding and Forensics
2020 Z. Zhou, C. Yang, C. Kim, S. Cimato
Towards the Monitoring and Evaluation of Trainees’ Activities in Cyber Ranges
2020 C. Braghin, S. Cimato, E. Damiani, F. Frati, E. Riccobene, S. Astaneh
A Model Driven Approach for Cyber Security Scenarios Deployment
2020 C. Braghin, S. Cimato, E. Damiani, F. Frati, L. Mauri, E. Riccobene