2009 |
37 | EE | Giuseppe Ateniese,
Karyn Benson,
Susan Hohenberger:
Key-Private Proxy Re-encryption.
CT-RSA 2009: 279-294 |
36 | EE | Giuseppe Ateniese,
Paolo Gasti:
Universally Anonymous IBE Based on the Quadratic Residuosity Assumption.
CT-RSA 2009: 32-47 |
2008 |
35 | EE | Reza Curtmola,
Osama Khan,
Randal C. Burns,
Giuseppe Ateniese:
MR-PDP: Multiple-Replica Provable Data Possession.
ICDCS 2008: 411-420 |
2007 |
34 | EE | Giuseppe Ateniese,
Randal C. Burns,
Reza Curtmola,
Joseph Herring,
Lea Kissner,
Zachary N. J. Peterson,
Dawn Xiaodong Song:
Provable data possession at untrusted stores.
ACM Conference on Computer and Communications Security 2007: 598-609 |
33 | EE | Matthew Green,
Giuseppe Ateniese:
Identity-Based Proxy Re-encryption.
ACNS 2007: 288-306 |
32 | EE | Giuseppe Ateniese,
Jonathan Kirsch,
Marina Blanton:
Secret Handshakes with Dynamic and Fuzzy Matching.
NDSS 2007 |
2006 |
31 | EE | Giuseppe Ateniese,
Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
Provably-secure time-bound hierarchical key assignment schemes.
ACM Conference on Computer and Communications Security 2006: 288-297 |
30 | EE | Giuseppe Ateniese,
Kevin Fu,
Matthew Green,
Susan Hohenberger:
Improved proxy re-encryption schemes with applications to secure distributed storage.
ACM Trans. Inf. Syst. Secur. 9(1): 1-30 (2006) |
29 | EE | Giuseppe Ateniese,
Chris Riley,
Christian Scheideler:
Survivable Monitoring in Dynamic Networks.
IEEE Trans. Mob. Comput. 5(9): 1242-1254 (2006) |
2005 |
28 | EE | Giuseppe Ateniese,
Susan Hohenberger:
Proxy re-signatures: new definitions, algorithms, and applications.
ACM Conference on Computer and Communications Security 2005: 310-319 |
27 | EE | Giuseppe Ateniese,
Jan Camenisch,
Breno de Medeiros:
Untraceable RFID tags via insubvertible encryption.
ACM Conference on Computer and Communications Security 2005: 92-101 |
26 | EE | Reza Curtmola,
Aniello Del Sorbo,
Giuseppe Ateniese:
On the Performance and Analysis of DNS Security Extensions.
CANS 2005: 288-303 |
25 | EE | Giuseppe Ateniese,
Daniel H. Chou,
Breno de Medeiros,
Gene Tsudik:
Sanitizable Signatures.
ESORICS 2005: 159-177 |
24 | EE | Giuseppe Ateniese,
Kevin Fu,
Matthew Green,
Susan Hohenberger:
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage.
NDSS 2005 |
23 | EE | Randal C. Burns,
Zachary N. J. Peterson,
Giuseppe Ateniese,
Stephen Bono:
Verifiable audit trails for a versioning file system.
StorageSS 2005: 44-50 |
2004 |
22 | EE | Giuseppe Ateniese,
Breno de Medeiros:
Identity-Based Chameleon Hash and Applications.
Financial Cryptography 2004: 164-180 |
21 | EE | Giuseppe Ateniese,
Chris Riley,
Christian Scheideler:
Survivable Monitoring in Dynamic Networks.
IWIA 2004: 33-47 |
20 | EE | Giuseppe Ateniese,
Breno de Medeiros:
On the Key Exposure Problem in Chameleon Hashes.
SCN 2004: 165-179 |
19 | EE | Giuseppe Ateniese:
Verifiable encryption of digital signatures and applications.
ACM Trans. Inf. Syst. Secur. 7(1): 1-20 (2004) |
2003 |
18 | EE | Giuseppe Ateniese,
Breno de Medeiros:
Efficient Group Signatures without Trapdoors.
ASIACRYPT 2003: 246-268 |
2002 |
17 | EE | Giuseppe Ateniese,
Cristina Nita-Rotaru:
Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption.
CT-RSA 2002: 182-199 |
16 | EE | Giuseppe Ateniese,
Dawn Xiaodong Song,
Gene Tsudik:
Quasi-Efficient Revocation in Group Signatures.
Financial Cryptography 2002: 183-197 |
15 | EE | Giuseppe Ateniese,
Reza Curtmola,
Breno de Medeiros,
Darren Davis:
Medical Information Privacy Assurance: Cryptographic and System Aspects.
SCN 2002: 199-218 |
14 | EE | Giuseppe Ateniese,
Breno de Medeiros:
Anonymous E-prescriptions.
WPES 2002: 19-31 |
2001 |
13 | EE | Giuseppe Ateniese,
Stefan Mangard:
A new approach to DNS security (DNSSEC).
ACM Conference on Computer and Communications Security 2001: 86-95 |
12 | EE | Giuseppe Ateniese,
Breno de Medeiros,
Michael T. Goodrich:
TRICERT: A Distributed Certified E-Mail Scheme.
NDSS 2001 |
11 | EE | Giuseppe Ateniese,
Carlo Blundo,
Alfredo De Santis,
Douglas R. Stinson:
Extended capabilities for visual cryptography.
Theor. Comput. Sci. 250(1-2): 143-161 (2001) |
2000 |
10 | EE | Giuseppe Ateniese,
Jan Camenisch,
Marc Joye,
Gene Tsudik:
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme.
CRYPTO 2000: 255-270 |
9 | EE | Jonathan Robert Stanton,
Yair Amir,
Damian Hasse,
Giuseppe Ateniese,
Yongdae Kim,
Cristina Nita-Rotaru,
Theo Schlossnagle,
John L. Schultz,
Gene Tsudik:
Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments.
ICDCS 2000: 330-343 |
1999 |
8 | EE | Giuseppe Ateniese:
Efficient Verifiable Encryption (and Fair Exchange) of Digital Signatures.
ACM Conference on Computer and Communications Security 1999: 138-146 |
7 | EE | Giuseppe Ateniese,
Gene Tsudik:
Some Open Issues and New Directions in Group Signatures.
Financial Cryptography 1999: 196-211 |
6 | EE | Giuseppe Ateniese,
Gene Tsudik:
Group Signatures Á la carte.
SODA 1999: 848-849 |
5 | EE | Giuseppe Ateniese,
Amir Herzberg,
Hugo Krawczyk,
Gene Tsudik:
Untraceable mobility or how to travel incognito.
Computer Networks 31(8): 871-884 (1999) |
1998 |
4 | EE | Giuseppe Ateniese,
Michael Steiner,
Gene Tsudik:
Authenticated Group Key Agreement and Friends.
ACM Conference on Computer and Communications Security 1998: 17-26 |
1996 |
3 | | Giuseppe Ateniese,
Carlo Blundo,
Alfredo De Santis,
Douglas R. Stinson:
Constructions and Bounds for Visual Cryptography.
ICALP 1996: 416-428 |
2 | EE | Giuseppe Ateniese,
Carlo Blundo,
Alfredo De Santis,
Douglas R. Stinson:
Visual Cryptography for General Access Structures
Electronic Colloquium on Computational Complexity (ECCC) 3(12): (1996) |
1 | | Giuseppe Ateniese,
Carlo Blundo,
Alfredo De Santis,
Douglas R. Stinson:
Visual Cryptography for General Access Structures.
Inf. Comput. 129(2): 86-106 (1996) |