2009 | ||
---|---|---|
37 | EE | Giuseppe Ateniese, Karyn Benson, Susan Hohenberger: Key-Private Proxy Re-encryption. CT-RSA 2009: 279-294 |
36 | EE | Giuseppe Ateniese, Paolo Gasti: Universally Anonymous IBE Based on the Quadratic Residuosity Assumption. CT-RSA 2009: 32-47 |
2008 | ||
35 | EE | Reza Curtmola, Osama Khan, Randal C. Burns, Giuseppe Ateniese: MR-PDP: Multiple-Replica Provable Data Possession. ICDCS 2008: 411-420 |
2007 | ||
34 | EE | Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, Dawn Xiaodong Song: Provable data possession at untrusted stores. ACM Conference on Computer and Communications Security 2007: 598-609 |
33 | EE | Matthew Green, Giuseppe Ateniese: Identity-Based Proxy Re-encryption. ACNS 2007: 288-306 |
32 | EE | Giuseppe Ateniese, Jonathan Kirsch, Marina Blanton: Secret Handshakes with Dynamic and Fuzzy Matching. NDSS 2007 |
2006 | ||
31 | EE | Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci: Provably-secure time-bound hierarchical key assignment schemes. ACM Conference on Computer and Communications Security 2006: 288-297 |
30 | EE | Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1): 1-30 (2006) |
29 | EE | Giuseppe Ateniese, Chris Riley, Christian Scheideler: Survivable Monitoring in Dynamic Networks. IEEE Trans. Mob. Comput. 5(9): 1242-1254 (2006) |
2005 | ||
28 | EE | Giuseppe Ateniese, Susan Hohenberger: Proxy re-signatures: new definitions, algorithms, and applications. ACM Conference on Computer and Communications Security 2005: 310-319 |
27 | EE | Giuseppe Ateniese, Jan Camenisch, Breno de Medeiros: Untraceable RFID tags via insubvertible encryption. ACM Conference on Computer and Communications Security 2005: 92-101 |
26 | EE | Reza Curtmola, Aniello Del Sorbo, Giuseppe Ateniese: On the Performance and Analysis of DNS Security Extensions. CANS 2005: 288-303 |
25 | EE | Giuseppe Ateniese, Daniel H. Chou, Breno de Medeiros, Gene Tsudik: Sanitizable Signatures. ESORICS 2005: 159-177 |
24 | EE | Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger: Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. NDSS 2005 |
23 | EE | Randal C. Burns, Zachary N. J. Peterson, Giuseppe Ateniese, Stephen Bono: Verifiable audit trails for a versioning file system. StorageSS 2005: 44-50 |
2004 | ||
22 | EE | Giuseppe Ateniese, Breno de Medeiros: Identity-Based Chameleon Hash and Applications. Financial Cryptography 2004: 164-180 |
21 | EE | Giuseppe Ateniese, Chris Riley, Christian Scheideler: Survivable Monitoring in Dynamic Networks. IWIA 2004: 33-47 |
20 | EE | Giuseppe Ateniese, Breno de Medeiros: On the Key Exposure Problem in Chameleon Hashes. SCN 2004: 165-179 |
19 | EE | Giuseppe Ateniese: Verifiable encryption of digital signatures and applications. ACM Trans. Inf. Syst. Secur. 7(1): 1-20 (2004) |
2003 | ||
18 | EE | Giuseppe Ateniese, Breno de Medeiros: Efficient Group Signatures without Trapdoors. ASIACRYPT 2003: 246-268 |
2002 | ||
17 | EE | Giuseppe Ateniese, Cristina Nita-Rotaru: Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption. CT-RSA 2002: 182-199 |
16 | EE | Giuseppe Ateniese, Dawn Xiaodong Song, Gene Tsudik: Quasi-Efficient Revocation in Group Signatures. Financial Cryptography 2002: 183-197 |
15 | EE | Giuseppe Ateniese, Reza Curtmola, Breno de Medeiros, Darren Davis: Medical Information Privacy Assurance: Cryptographic and System Aspects. SCN 2002: 199-218 |
14 | EE | Giuseppe Ateniese, Breno de Medeiros: Anonymous E-prescriptions. WPES 2002: 19-31 |
2001 | ||
13 | EE | Giuseppe Ateniese, Stefan Mangard: A new approach to DNS security (DNSSEC). ACM Conference on Computer and Communications Security 2001: 86-95 |
12 | EE | Giuseppe Ateniese, Breno de Medeiros, Michael T. Goodrich: TRICERT: A Distributed Certified E-Mail Scheme. NDSS 2001 |
11 | EE | Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250(1-2): 143-161 (2001) |
2000 | ||
10 | EE | Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik: A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. CRYPTO 2000: 255-270 |
9 | EE | Jonathan Robert Stanton, Yair Amir, Damian Hasse, Giuseppe Ateniese, Yongdae Kim, Cristina Nita-Rotaru, Theo Schlossnagle, John L. Schultz, Gene Tsudik: Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments. ICDCS 2000: 330-343 |
1999 | ||
8 | EE | Giuseppe Ateniese: Efficient Verifiable Encryption (and Fair Exchange) of Digital Signatures. ACM Conference on Computer and Communications Security 1999: 138-146 |
7 | EE | Giuseppe Ateniese, Gene Tsudik: Some Open Issues and New Directions in Group Signatures. Financial Cryptography 1999: 196-211 |
6 | EE | Giuseppe Ateniese, Gene Tsudik: Group Signatures Á la carte. SODA 1999: 848-849 |
5 | EE | Giuseppe Ateniese, Amir Herzberg, Hugo Krawczyk, Gene Tsudik: Untraceable mobility or how to travel incognito. Computer Networks 31(8): 871-884 (1999) |
1998 | ||
4 | EE | Giuseppe Ateniese, Michael Steiner, Gene Tsudik: Authenticated Group Key Agreement and Friends. ACM Conference on Computer and Communications Security 1998: 17-26 |
1996 | ||
3 | Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson: Constructions and Bounds for Visual Cryptography. ICALP 1996: 416-428 | |
2 | EE | Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson: Visual Cryptography for General Access Structures Electronic Colloquium on Computational Complexity (ECCC) 3(12): (1996) |
1 | Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson: Visual Cryptography for General Access Structures. Inf. Comput. 129(2): 86-106 (1996) |