default search action
Giuseppe Ateniese
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c75]Giuseppe Ateniese, Foteini Baldimtsi, Matteo Campanelli, Danilo Francati, Ioanna Karantaidou:
Advancing Scalability in Decentralized Storage: A Novel Approach to Proof-of-Replication via Polynomial Evaluation. CRYPTO (2) 2024: 3-39 - [c74]Huseyin Gokay, Foteini Baldimtsi, Giuseppe Ateniese:
Atomic Swaps for Boneh-Lynn-Shacham (BLS) Based Blockchains. ESORICS (3) 2024: 341-361 - [c73]Hanlin Zhang, Benjamin L. Edelman, Danilo Francati, Daniele Venturi, Giuseppe Ateniese, Boaz Barak:
Watermarks in the Sand: Impossibility of Strong Watermarking for Language Models. ICML 2024 - [c72]Dario Pasquini, Giuseppe Ateniese, Carmela Troncoso:
Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data. SP 2024: 1365-1384 - [c71]Dario Pasquini, Danilo Francati, Giuseppe Ateniese, Evgenios M. Kornaropoulos:
Breach Extraction Attacks: Exposing and Addressing the Leakage in Second Generation Compromised Credential Checking Services. SP 2024: 1405-1423 - [i56]Dario Pasquini, Evgenios M. Kornaropoulos, Giuseppe Ateniese:
LLMmap: Fingerprinting For Large Language Models. CoRR abs/2407.15847 (2024) - 2023
- [c70]Giuseppe Ateniese, Long Chen, Danilo Francati, Dimitrios Papadopoulos, Qiang Tang:
Verifiable Capacity-Bound Functions: A New Primitive from Kolmogorov Complexity - (Revisiting Space-Based Security in the Adaptive Setting). Public Key Cryptography (2) 2023: 63-93 - [i55]Dario Pasquini, Giuseppe Ateniese, Carmela Troncoso:
Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data. CoRR abs/2301.07628 (2023) - [i54]Hanlin Zhang, Benjamin L. Edelman, Danilo Francati, Daniele Venturi, Giuseppe Ateniese, Boaz Barak:
Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models. CoRR abs/2311.04378 (2023) - [i53]Giuseppe Ateniese, Foteini Baldimtsi, Matteo Campanelli, Danilo Francati, Ioanna Karantaidou:
Advancing Scalability in Decentralized Storage: A Novel Approach to Proof-of-Replication via Polynomial Evaluation. IACR Cryptol. ePrint Arch. 2023: 1569 (2023) - [i52]Hanlin Zhang, Benjamin L. Edelman, Danilo Francati, Daniele Venturi, Giuseppe Ateniese, Boaz Barak:
Watermarks in the Sand: Impossibility of Strong Watermarking for Generative Models. IACR Cryptol. ePrint Arch. 2023: 1776 (2023) - [i51]Dario Pasquini, Danilo Francati, Giuseppe Ateniese, Evgenios M. Kornaropoulos:
Breach Extraction Attacks: Exposing and Addressing the Leakage in Second Generation Compromised Credential Checking Services. IACR Cryptol. ePrint Arch. 2023: 1848 (2023) - 2022
- [j22]Bin Xiao, Fan Wu, Francesco Chiti, Mohammad Hossein Manshaei, Giuseppe Ateniese:
Guest Editorial: Introduction to the Special Section on Security and Privacy for AI Models and Applications. IEEE Trans. Netw. Sci. Eng. 9(1): 171-172 (2022) - [c69]Dario Pasquini, Danilo Francati, Giuseppe Ateniese:
Eluding Secure Aggregation in Federated Learning via Model Inconsistency. CCS 2022: 2429-2443 - [e2]Giuseppe Ateniese, Daniele Venturi:
Applied Cryptography and Network Security - 20th International Conference, ACNS 2022, Rome, Italy, June 20-23, 2022, Proceedings. Lecture Notes in Computer Science 13269, Springer 2022, ISBN 978-3-031-09233-6 [contents] - 2021
- [j21]Giuseppe Ateniese, Danilo Francati, David Nuñez, Daniele Venturi:
Match Me if You Can: Matchmaking Encryption and Its Applications. J. Cryptol. 34(3): 16 (2021) - [j20]Giuseppe Ateniese, Danilo Francati, Bernardo Magri, Daniele Venturi:
Immunization against complete subversion without random oracles. Theor. Comput. Sci. 859: 1-36 (2021) - [c68]Danilo Francati, Giuseppe Ateniese, Abdoulaye Faye, Andrea Maria Milazzo, Angelo Massimo Perillo, Luca Schiatti, Giuseppe Giordano:
Audita: A Blockchain-based Auditing Framework for Off-chain Storage. SBC@AsiaCCS 2021: 5-10 - [c67]Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi:
Unleashing the Tiger: Inference Attacks on Split Learning. CCS 2021: 2113-2129 - [c66]Dario Pasquini, Ankit Gangwal, Giuseppe Ateniese, Massimo Bernaschi, Mauro Conti:
Improving Password Guessing via Representation Learning. SP 2021: 1382-1399 - [c65]Dario Pasquini, Marco Cianfriglia, Giuseppe Ateniese, Massimo Bernaschi:
Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries. USENIX Security Symposium 2021: 821-838 - [i50]Dario Pasquini, Danilo Francati, Giuseppe Ateniese:
Eluding Secure Aggregation in Federated Learning via Model Inconsistency. CoRR abs/2111.07380 (2021) - [i49]Giuseppe Ateniese, Long Chen, Danilo Francati, Dimitrios Papadopoulos, Qiang Tang:
Verifiable Capacity-bound Functions: A New Primitive from Kolmogorov Complexity. IACR Cryptol. ePrint Arch. 2021: 162 (2021) - 2020
- [j19]Giuseppe Ateniese, Bernardo Magri, Daniele Venturi:
Subversion-resilient signatures: Definitions, constructions and applications. Theor. Comput. Sci. 820: 91-122 (2020) - [c64]Giuseppe Ateniese:
Is AI Taking Over the World? No, but It's Making it Less Private. SBC@AsiaCCS 2020: 1 - [c63]Adriano Di Luzio, Danilo Francati, Giuseppe Ateniese:
Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains. CANS 2020: 323-343 - [c62]Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi:
Interpretable Probabilistic Password Strength Meters via Deep Learning. ESORICS (1) 2020: 502-522 - [c61]Giuseppe Ateniese, Long Chen, Mohammad Etemad, Qiang Tang:
Proof of Storage-Time: Efficiently Checking Continuous Data Availability. NDSS 2020 - [e1]Hung-Min Sun, Shiuh-Pyng Shieh, Guofei Gu, Giuseppe Ateniese:
ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020. ACM 2020, ISBN 978-1-4503-6750-9 [contents] - [i48]Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi:
Interpretable Probabilistic Password Strength Meters via Deep Learning. CoRR abs/2004.07179 (2020) - [i47]Dario Pasquini, Marco Cianfriglia, Giuseppe Ateniese, Massimo Bernaschi:
Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries. CoRR abs/2010.12269 (2020) - [i46]Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi:
Unleashing the Tiger: Inference Attacks on Split Learning. CoRR abs/2012.02670 (2020) - [i45]Giuseppe Ateniese, Long Chen, Mohammad Etemad, Qiang Tang:
Proof of Storage-Time: Efficiently Checking Continuous Data Availability. IACR Cryptol. ePrint Arch. 2020: 840 (2020)
2010 – 2019
- 2019
- [c60]Briland Hitaj, Paolo Gasti, Giuseppe Ateniese, Fernando Pérez-Cruz:
PassGAN: A Deep Learning Approach for Password Guessing. ACNS 2019: 217-237 - [c59]Giuseppe Ateniese, Danilo Francati, Bernardo Magri, Daniele Venturi:
Public Immunization Against Complete Subversion Without Random Oracles. ACNS 2019: 465-485 - [c58]Giuseppe Ateniese, Danilo Francati, David Nuñez, Daniele Venturi:
Match Me if You Can: Matchmaking Encryption and Its Applications. CRYPTO (2) 2019: 701-731 - [i44]Adriano Di Luzio, Danilo Francati, Giuseppe Ateniese:
Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains. CoRR abs/1906.05919 (2019) - [i43]Dario Pasquini, Ankit Gangwal, Giuseppe Ateniese, Massimo Bernaschi, Mauro Conti:
Improving Password Guessing via Representation Learning. CoRR abs/1910.04232 (2019) - [i42]Danilo Francati, Giuseppe Ateniese, Abdoulaye Faye, Andrea Maria Milazzo, Angelo Massimo Perillo, Luca Schiatti, Giuseppe Giordano:
Audita: A Blockchain-based Auditing Framework for Off-chain Storage. CoRR abs/1911.08515 (2019) - [i41]Adriano Di Luzio, Danilo Francati, Giuseppe Ateniese:
Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains. IACR Cryptol. ePrint Arch. 2019: 704 (2019) - [i40]Giuseppe Ateniese, Danilo Francati, Bernardo Magri, Daniele Venturi:
Immunization against Complete Subversion without Random Oracles. IACR Cryptol. ePrint Arch. 2019: 1173 (2019) - [i39]Dario Pasquini, Ankit Gangwal, Giuseppe Ateniese, Massimo Bernaschi, Mauro Conti:
Improving Password Guessing via Representation Learning. IACR Cryptol. ePrint Arch. 2019: 1188 (2019) - [i38]Danilo Francati, Giuseppe Ateniese, Abdoulaye Faye, Andrea Maria Milazzo, Angelo Massimo Perillo, Luca Schiatti, Giuseppe Giordano:
Audita: A Blockchain-based Auditing Framework for Off-chain Storage. IACR Cryptol. ePrint Arch. 2019: 1345 (2019) - 2018
- [c57]Giuseppe Ateniese, Katharina Fech, Bernardo Magri:
A Family of FDH Signature Schemes Based on the Quadratic Residuosity Assumption. INDOCRYPT 2018: 248-262 - [c56]Giuseppe Ateniese, Aggelos Kiayias, Bernardo Magri, Yiannis Tselekounis, Daniele Venturi:
Secure Outsourcing of Cryptographic Circuits Manufacturing. ProvSec 2018: 75-93 - [i37]Giuseppe Ateniese, Danilo Francati, David Nuñez, Daniele Venturi:
Match Me if You Can: Matchmaking Encryption and its Applications. IACR Cryptol. ePrint Arch. 2018: 1094 (2018) - 2017
- [j18]Giuseppe Ateniese, Giuseppe Bianchi, Angelo T. Capossele, Chiara Petrioli, Dora Spenza:
Low-Cost Standard Signatures for Energy-Harvesting Wireless Sensor Networks. ACM Trans. Embed. Comput. Syst. 16(3): 64:1-64:23 (2017) - [j17]Yong Yu, Man Ho Au, Giuseppe Ateniese, Xinyi Huang, Willy Susilo, Yuanshun Dai, Geyong Min:
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage. IEEE Trans. Inf. Forensics Secur. 12(4): 767-778 (2017) - [c55]Giuseppe Ateniese, Michael T. Goodrich, Vassilios Lekakis, Charalampos Papamanthou, Evripidis Paraskevas, Roberto Tamassia:
Accountable Storage. ACNS 2017: 623-644 - [c54]Briland Hitaj, Giuseppe Ateniese, Fernando Pérez-Cruz:
Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning. CCS 2017: 603-618 - [c53]Giuseppe Ateniese, Bernardo Magri, Daniele Venturi, Ewerton R. Andrade:
Redactable Blockchain - or - Rewriting History in Bitcoin and Friends. EuroS&P 2017: 111-126 - [c52]Giuseppe Ateniese, Giuseppe Bianchi, Angelo T. Capossele, Chiara Petrioli, Dora Spenza:
HELIOS: Outsourcing of Security Operations in Green Wireless Sensor Networks. VTC Spring 2017: 1-7 - [i36]Briland Hitaj, Giuseppe Ateniese, Fernando Pérez-Cruz:
Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning. CoRR abs/1702.07464 (2017) - [i35]Briland Hitaj, Paolo Gasti, Giuseppe Ateniese, Fernando Pérez-Cruz:
PassGAN: A Deep Learning Approach for Password Guessing. CoRR abs/1709.00440 (2017) - 2016
- [j16]Giuseppe Ateniese, Özgür Dagdelen, Ivan Damgård, Daniele Venturi:
Entangled cloud storage. Future Gener. Comput. Syst. 62: 104-118 (2016) - [c51]Johannes Krupp, Dominique Schröder, Mark Simkin, Dario Fiore, Giuseppe Ateniese, Stefan Nürnberger:
Nearly Optimal Verifiable Data Streaming. Public Key Cryptography (1) 2016: 417-445 - [i34]Giuseppe Ateniese, Aggelos Kiayias, Bernardo Magri, Yiannis Tselekounis, Daniele Venturi:
Secure Outsourcing of Circuit Manufacturing. IACR Cryptol. ePrint Arch. 2016: 527 (2016) - [i33]Giuseppe Ateniese, Bernardo Magri, Daniele Venturi, Ewerton R. Andrade:
Redactable Blockchain - or - Rewriting History in Bitcoin and Friends. IACR Cryptol. ePrint Arch. 2016: 757 (2016) - 2015
- [j15]Giuseppe Ateniese, Luigi V. Mancini, Angelo Spognardi, Antonio Villani, Domenico Vitali, Giovanni Felici:
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers. Int. J. Secur. Networks 10(3): 137-150 (2015) - [j14]Yong Yu, Yi Mu, Giuseppe Ateniese:
Recent Advances in Security and Privacy in Big Data. J. Univers. Comput. Sci. 21(3): 365-368 (2015) - [c50]Giuseppe Ateniese, Özgür Dagdelen, Ivan Damgård, Daniele Venturi:
Entangled Encodings and Data Entanglement. SCC@ASIACCS 2015: 3-12 - [c49]Giuseppe Ateniese, Bernardo Magri, Daniele Venturi:
Subversion-Resilient Signature Schemes. CCS 2015: 364-375 - [c48]Giuseppe Ateniese, Antonio Faonio, Seny Kamara:
Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage. IMACC 2015: 311-328 - [c47]Giuseppe Ateniese, Briland Hitaj, Luigi Vincenzo Mancini, Nino Vincenzo Verde, Antonio Villani:
No Place to Hide that Bytes Won't Reveal: Sniffing Location-Based Encrypted Traffic to Track a User's Position. NSS 2015: 46-59 - [c46]Duane Wilson, Giuseppe Ateniese:
From Pretty Good to Great: Enhancing PGP Using Bitcoin and the Blockchain. NSS 2015: 368-375 - [i32]Giuseppe Ateniese, Briland Hitaj, Luigi V. Mancini, Nino Vincenzo Verde, Antonio Villani:
No Place to Hide that Bytes won't Reveal: Sniffing Location-Based Encrypted Traffic to Track User Position. CoRR abs/1505.07774 (2015) - [i31]Duane Wilson, Giuseppe Ateniese:
From Pretty Good To Great: Enhancing PGP using Bitcoin and the Blockchain. CoRR abs/1508.04868 (2015) - [i30]Johannes Krupp, Dominique Schröder, Mark Simkin, Dario Fiore, Giuseppe Ateniese, Stefan Nürnberger:
Nearly Optimal Verifiable Data Streaming (Full Version). IACR Cryptol. ePrint Arch. 2015: 333 (2015) - [i29]Giuseppe Ateniese, Bernardo Magri, Daniele Venturi:
Subversion-Resilient Signature Schemes. IACR Cryptol. ePrint Arch. 2015: 517 (2015) - [i28]Giuseppe Ateniese, Antonio Faonio, Seny Kamara:
Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage. IACR Cryptol. ePrint Arch. 2015: 920 (2015) - 2014
- [j13]Giuseppe Ateniese, Roberto Baldoni, Silvia Bonomi, Giuseppe Antonio Di Luna:
Fault-tolerant oblivious assignment with m slots in synchronous systems. J. Parallel Distributed Comput. 74(7): 2648-2661 (2014) - [c45]Giuseppe Ateniese, Antonio Faonio, Bernardo Magri, Breno de Medeiros:
Certified Bitcoins. ACNS 2014: 80-96 - [c44]Nino Vincenzo Verde, Giuseppe Ateniese, Emanuele Gabrielli, Luigi Vincenzo Mancini, Angelo Spognardi:
No NAT'd User Left Behind: Fingerprinting Users behind NAT from NetFlow Records Alone. ICDCS 2014: 218-227 - [c43]Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese:
VABKS: Verifiable attribute-based keyword search over outsourced encrypted data. INFOCOM 2014: 522-530 - [c42]Duane C. Wilson, Giuseppe Ateniese:
"To Share or not to Share" in Client-Side Encrypted Clouds. ISC 2014: 401-412 - [c41]Giuseppe Ateniese, Ilario Bonacina, Antonio Faonio, Nicola Galesi:
Proofs of Space: When Space Is of the Essence. SCN 2014: 538-557 - [i27]Nino Vincenzo Verde, Giuseppe Ateniese, Emanuele Gabrielli, Luigi Vincenzo Mancini, Angelo Spognardi:
No NAT'd User left Behind: Fingerprinting Users behind NAT from NetFlow Records alone. CoRR abs/1402.1940 (2014) - [i26]Duane Wilson, Giuseppe Ateniese:
To Share or Not to Share in Client-Side Encrypted Clouds. CoRR abs/1404.2697 (2014) - [i25]Giuseppe Ateniese, Antonio Faonio, Bernardo Magri, Breno de Medeiros:
Certified Bitcoins. IACR Cryptol. ePrint Arch. 2014: 76 (2014) - [i24]Giuseppe Ateniese, Michael T. Goodrich, Vassilios Lekakis, Charalampos Papamanthou, Evripidis Paraskevas, Roberto Tamassia:
Accountable Storage. IACR Cryptol. ePrint Arch. 2014: 886 (2014) - 2013
- [j12]Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
A note on time-bound hierarchical key assignment schemes. Inf. Process. Lett. 113(5-6): 151-155 (2013) - [c40]Giuseppe Ateniese, Giuseppe Bianchi, Angelo Capossele, Chiara Petrioli:
Low-cost Standard Signatures in Wireless Sensor Networks: A Case for Reviving Pre-computation Techniques? NDSS 2013 - [i23]Giuseppe Ateniese, Giovanni Felici, Luigi V. Mancini, Angelo Spognardi, Antonio Villani, Domenico Vitali:
Hacking Smart Machines with Smarter Ones: How to Extract Meaningful Data from Machine Learning Classifiers. CoRR abs/1306.4447 (2013) - [i22]Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese:
VABKS: Verifiable Attribute-based Keyword Search over Outsourced Encrypted Data. IACR Cryptol. ePrint Arch. 2013: 462 (2013) - [i21]Giuseppe Ateniese, Ilario Bonacina, Antonio Faonio, Nicola Galesi:
Proofs of Space: When Space is of the Essence. IACR Cryptol. ePrint Arch. 2013: 805 (2013) - 2012
- [j11]Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes. J. Cryptol. 25(2): 243-270 (2012) - [c39]Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese:
Efficient query integrity for outsourced dynamic databases. CCSW 2012: 71-82 - [c38]Nathaniel Wesley Filardo, Giuseppe Ateniese:
High-Entropy Visual Identification for Touch Screen Devices. ISPEC 2012: 182-198 - [c37]Giuseppe Ateniese, Roberto Baldoni, Silvia Bonomi, Giuseppe Antonio Di Luna:
Oblivious Assignment with m Slots. SSS 2012: 187-201 - [i20]Qingji Zheng, Shouhuai Xu, Giuseppe Ateniese:
Efficient Query Integrity for Outsourced Dynamic Databases. IACR Cryptol. ePrint Arch. 2012: 493 (2012) - [i19]Giuseppe Ateniese, Özgür Dagdelen, Ivan Damgård, Daniele Venturi:
Entangled Cloud Storage. IACR Cryptol. ePrint Arch. 2012: 511 (2012) - 2011
- [j10]Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Osama Khan, Lea Kissner, Zachary N. J. Peterson, Dawn Song:
Remote data checking using provable data possession. ACM Trans. Inf. Syst. Secur. 14(1): 12:1-12:34 (2011) - [c36]Giuseppe Ateniese, Emiliano De Cristofaro, Gene Tsudik:
(If) Size Matters: Size-Hiding Private Set Intersection. Public Key Cryptography 2011: 156-173 - [i18]Nathaniel Wesley Filardo, Giuseppe Ateniese:
High-Entropy Visual Identification for Touch Screen Devices. IACR Cryptol. ePrint Arch. 2011: 359 (2011) - 2010
- [j9]Paul T. Stanton, Benjamin McKeown, Randal C. Burns, Giuseppe Ateniese:
FastAD: an authenticated directory for billions of objects. ACM SIGOPS Oper. Syst. Rev. 44(1): 45-49 (2010) - [c35]Bo Chen, Reza Curtmola, Giuseppe Ateniese, Randal C. Burns:
Remote data checking for network coding-based distributed storage systems. CCSW 2010: 31-42 - [c34]Paolo Gasti, Giuseppe Ateniese, Marina Blanton:
Deniable cloud storage: sharing files via public-key deniability. WPES 2010: 31-42 - [i17]Giuseppe Ateniese, Emiliano De Cristofaro, Gene Tsudik:
(If) Size Matters: Size-Hiding Private Set Intersection. IACR Cryptol. ePrint Arch. 2010: 220 (2010)
2000 – 2009
- 2009
- [j8]Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik:
Remarks on ''Analysis of one popular group signature scheme'' in Asiacrypt 2006. Int. J. Appl. Cryptogr. 1(4): 320-322 (2009) - [c33]Giuseppe Ateniese, Seny Kamara, Jonathan Katz:
Proofs of Storage from Homomorphic Identification Protocols. ASIACRYPT 2009: 319-333 - [c32]Giuseppe Ateniese, Paolo Gasti:
Universally Anonymous IBE Based on the Quadratic Residuosity Assumption. CT-RSA 2009: 32-47 - [c31]Giuseppe Ateniese, Karyn Benson, Susan Hohenberger:
Key-Private Proxy Re-encryption. CT-RSA 2009: 279-294 - [i16]Giuseppe Ateniese, Paolo Gasti:
Universally Anonymous IBE based on the Quadratic Residuosity Assumption. IACR Cryptol. ePrint Arch. 2009: 280 (2009) - 2008
- [c30]Reza Curtmola, Osama Khan, Randal C. Burns, Giuseppe Ateniese:
MR-PDP: Multiple-Replica Provable Data Possession. ICDCS 2008: 411-420 - [c29]Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, Gene Tsudik:
Scalable and efficient provable data possession. SecureComm 2008: 9 - [i15]Giuseppe Ateniese, Roberto Di Pietro, Luigi V. Mancini, Gene Tsudik:
Scalable and Efficient Provable Data Possession. IACR Cryptol. ePrint Arch. 2008: 114 (2008) - [i14]Giuseppe Ateniese, Karyn Benson, Susan Hohenberger:
Key-Private Proxy Re-Encryption. IACR Cryptol. ePrint Arch. 2008: 463 (2008) - 2007
- [c28]Matthew Green, Giuseppe Ateniese:
Identity-Based Proxy Re-encryption. ACNS 2007: 288-306 - [c27]Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, Dawn Xiaodong Song:
Provable data possession at untrusted stores. CCS 2007: 598-609 - [c26]Zachary N. J. Peterson, Randal C. Burns, Giuseppe Ateniese, Stephen Bono:
Design and Implementation of Verifiable Audit Trails for a Versioning File System. FAST 2007: 93-106 - [c25]Giuseppe Ateniese, Jonathan Kirsch, Marina Blanton:
Secret Handshakes with Dynamic and Fuzzy Matching. NDSS 2007 - [i13]Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, Dawn Song:
Provable Data Possession at Untrusted Stores. IACR Cryptol. ePrint Arch. 2007: 202 (2007) - 2006
- [j7]Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger:
Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1): 1-30 (2006) - [j6]Giuseppe Ateniese, Chris Riley, Christian Scheideler:
Survivable Monitoring in Dynamic Networks. IEEE Trans. Mob. Comput. 5(9): 1242-1254 (2006) - [c24]Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Provably-secure time-bound hierarchical key assignment schemes. CCS 2006: 288-297 - [i12]Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes. IACR Cryptol. ePrint Arch. 2006: 225 (2006) - [i11]Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik:
Remarks on "Analysis of One Popular Group Signature Scheme" in Asiacrypt 2006. IACR Cryptol. ePrint Arch. 2006: 464 (2006) - [i10]Matthew Green, Giuseppe Ateniese:
Identity-Based Proxy Re-encryption. IACR Cryptol. ePrint Arch. 2006: 473 (2006) - 2005
- [c23]Reza Curtmola, Aniello Del Sorbo, Giuseppe Ateniese:
On the Performance and Analysis of DNS Security Extensions. CANS 2005: 288-303 - [c22]Giuseppe Ateniese, Jan Camenisch, Breno de Medeiros:
Untraceable RFID tags via insubvertible encryption. CCS 2005: 92-101 - [c21]Giuseppe Ateniese, Susan Hohenberger:
Proxy re-signatures: new definitions, algorithms, and applications. CCS 2005: 310-319 - [c20]Giuseppe Ateniese, Daniel H. Chou, Breno de Medeiros, Gene Tsudik:
Sanitizable Signatures. ESORICS 2005: 159-177 - [c19]Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger:
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. NDSS 2005