dblp.uni-trier.dewww.uni-trier.de

Stelvio Cimato

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
33 Sushil Jajodia, Pierangela Samarati, Stelvio Cimato: Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy Springer 2008
32EEStelvio Cimato: A Lightweight Protocol for Dynamic RFID Identification. COMPSAC 2008: 673-678
2007
31EEStelvio Cimato, Roberto De Prisco, Alfredo De Santis: Colored visual cryptography without color darkening. Theor. Comput. Sci. 374(1-3): 261-276 (2007)
2006
30EEVincenzo Auletta, Carlo Blundo, Stelvio Cimato, Guerriero Raimato: A Web Service Based Micro-payment System. ISCC 2006: 328-333
29EEStelvio Cimato, Roberto De Prisco, Alfredo De Santis: Probabilistic Visual Cryptography Schemes. Comput. J. 49(1): 97-107 (2006)
28EEStelvio Cimato, Antonella Cresti, Paolo D'Arco: A unified model for unconditionally secure key distribution. Journal of Computer Security 14(1): 45-64 (2006)
27EECarlo Blundo, Stelvio Cimato, Alfredo De Santis: Visual cryptography schemes with optimal pixel expansion. Theor. Comput. Sci. 369(1-3): 169-182 (2006)
2005
26 Carlo Blundo, Stelvio Cimato: Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers Springer 2005
25EEStelvio Cimato, Clemente Galdi, Raffaella Giordano, Barbara Masucci, Gildo Tomasco: Design and Implementation of an Inline Certified E-mail Service. CANS 2005: 186-199
24EECarlo Blundo, Stelvio Cimato, Roberto De Prisco: A Lightweight Approach to Authenticated Web Caching. SAINT 2005: 157-163
23EEStelvio Cimato, Roberto De Prisco, Alfredo De Santis: Optimal Colored Threshold Visual Cryptography Schemes. Des. Codes Cryptography 35(3): 311-335 (2005)
22EECarlo Blundo, Stelvio Cimato, Annalisa De Bonis: Secure E-Coupons. Electronic Commerce Research 5(1): 117-139 (2005)
21EEStelvio Cimato, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci: Ideal contrast visual cryptography schemes with reversing. Inf. Process. Lett. 93(4): 199-206 (2005)
20EEStelvio Cimato, Alfredo De Santis, Umberto Ferraro Petrillo: Overcoming the obfuscation of Java programs by identifier renaming. Journal of Systems and Software 78(1): 60-72 (2005)
2004
19EECarlo Blundo, Stelvio Cimato: A Framework for Authenticated Web Services. ECOWS 2004: 61-71
18EECarlo Blundo, Stelvio Cimato: A Platform for Secure E-Gambling. ITCC (2) 2004: 768-772
17EEStelvio Cimato, Roberto De Prisco, Alfredo De Santis: Colored Visual Cryptography Without Color Darkening. SCN 2004: 235-248
16EECarlo Blundo, Stelvio Cimato, Roberto De Prisco, Anna Lisa Ferrara: Modeling A Certified Email Protocol using I/O Automata. Electr. Notes Theor. Comput. Sci. 99: 339-359 (2004)
15EECarlo Blundo, Stelvio Cimato: A Software Infrastructure for Authenticated Web Metering. IEEE Computer 37(4): 28-33 (2004)
2003
14 Stelvio Cimato, Clemente Galdi, Giuseppe Persiano: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers Springer 2003
13EEStelvio Cimato, Paolo D'Arco, Ivan Visconti: Anonymous Group Communication in Mobile Networks. ICTCS 2003: 316-328
12EECarlo Blundo, Stelvio Cimato, Roberto De Prisco: Certified Email: Design and Implementation of a New Optimistic Protocol.. ISCC 2003: 828-833
2002
11EECarlo Blundo, Stelvio Cimato: SAWM: a tool for secure and authenticated web metering. SEKE 2002: 641-648
10EECarlo Blundo, Stelvio Cimato, Annalisa De Bonis: A lightweight protocol for the generation and distribution of secure e-coupons. WWW 2002: 542-552
9EECarlo Blundo, Stelvio Cimato, Barbara Masucci: A note on optimal metering schemes. Inf. Process. Lett. 84(6): 319-326 (2002)
2001
8EEStelvio Cimato: Design of an Authentication Protocol for Gsm Javacards. ICISC 2001: 355-368
7EEStelvio Cimato, Annalisa De Bonis: Online Advertising: Secure E-coupons. ICTCS 2001: 370-383
1999
6 Stelvio Cimato, Paolo Ciancarini: A Formal Approach to the Specification of Java Components. ECOOP Workshops 1999: 107-108
5 Stelvio Cimato: Specifying component-based Java applications (Short Paper). FMOODS 1999
1997
4 Paolo Ciancarini, Stelvio Cimato, Cecilia Mascolo: Engineering Formal Requirements: An Analysis and Testing Method for Z Documents. Ann. Software Eng. 3: 189-219 (1997)
1996
3 Stelvio Cimato, Cecilia Mascolo: Analyzing and Animating Declarative Specifications. APPIA-GULP-PRODE 1996: 295-308
2 Paolo Ciancarini, Stelvio Cimato: Animating a Non-executable Formal Specification with a Distributed Symbolic Language. DISCO 1996: 200-201
1 Paolo Ciancarini, Stelvio Cimato, Cecilia Mascolo: Engineering Formal Requirements: Analysis and Testing. SEKE 1996: 385-392

Coauthor Index

1Vincenzo Auletta [30]
2Carlo Blundo [9] [10] [11] [12] [15] [16] [18] [19] [22] [24] [26] [27] [30]
3Annalisa De Bonis [7] [10] [22]
4Paolo Ciancarini [1] [2] [4] [6]
5Antonella Cresti [28]
6Paolo D'Arco [13] [28]
7Anna Lisa Ferrara [16] [21]
8Clemente Galdi [14] [25]
9Raffaella Giordano [25]
10Sushil Jajodia [33]
11Cecilia Mascolo [1] [3] [4]
12Barbara Masucci [9] [21] [25]
13Giuseppe Persiano (Pino Persiano) [14]
14Umberto Ferraro Petrillo [20]
15Roberto De Prisco [12] [16] [17] [23] [24] [29] [31]
16Guerriero Raimato [30]
17Pierangela Samarati [33]
18Alfredo De Santis [17] [20] [21] [23] [27] [29] [31]
19Gildo Tomasco [25]
20Ivan Visconti [13]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)