dblp.uni-trier.dewww.uni-trier.de

Anna Lisa Ferrara

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
14EEAnna Lisa Ferrara, Matthew Green, Susan Hohenberger, Michael Østergaard Pedersen: Practical Short Signature Batch Verification. CT-RSA 2009: 309-324
2008
13EEAlfredo De Santis, Anna Lisa Ferrara, Barbara Masucci: An attack on a payment scheme. Inf. Sci. 178(5): 1418-1421 (2008)
12EEAlfredo De Santis, Anna Lisa Ferrara, Barbara Masucci: New constructions for provably-secure time-bound hierarchical key assignment schemes. Theor. Comput. Sci. 407(1-3): 213-230 (2008)
2007
11EEAlfredo De Santis, Anna Lisa Ferrara, Barbara Masucci: Efficient Provably-Secure Hierarchical Key Assignment Schemes. MFCS 2007: 371-382
10EEAlfredo De Santis, Anna Lisa Ferrara, Barbara Masucci: New constructions for provably-secure time-bound hierarchical key assignment schemes. SACMAT 2007: 133-138
2006
9EEGiuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci: Provably-secure time-bound hierarchical key assignment schemes. ACM Conference on Computer and Communications Security 2006: 288-297
8EEAlfredo De Santis, Anna Lisa Ferrara, Barbara Masucci: Unconditionally secure key assignment schemes. Discrete Applied Mathematics 154(2): 234-252 (2006)
7EEAlfredo De Santis, Anna Lisa Ferrara, Barbara Masucci: Enforcing the security of a time-bound hierarchical key assignment scheme. Inf. Sci. 176(12): 1684-1694 (2006)
2005
6EEAlfredo De Santis, Anna Lisa Ferrara, Barbara Masucci: A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy. WCC 2005: 202-217
5EEStelvio Cimato, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci: Ideal contrast visual cryptography schemes with reversing. Inf. Process. Lett. 93(4): 199-206 (2005)
2004
4EECarlo Blundo, Stelvio Cimato, Roberto De Prisco, Anna Lisa Ferrara: Modeling A Certified Email Protocol using I/O Automata. Electr. Notes Theor. Comput. Sci. 99: 339-359 (2004)
3EEFrancis Y. L. Chin, Alfredo De Santis, Anna Lisa Ferrara, N. L. Ho, S. K. Kim: A simple algorithm for the constrained sequence problems. Inf. Process. Lett. 90(4): 175-179 (2004)
2EEAlfredo De Santis, Anna Lisa Ferrara, Barbara Masucci: Cryptographic key assignment schemes for any access control policy. Inf. Process. Lett. 92(4): 199-205 (2004)
2003
1EEAnna Lisa Ferrara, Barbara Masucci: An Information-Theoretic Approach to the Access Control Problem. ICTCS 2003: 342-354

Coauthor Index

1Giuseppe Ateniese [9]
2Carlo Blundo [4]
3Francis Y. L. Chin [3]
4Stelvio Cimato [4] [5]
5Matthew Green [14]
6N. L. Ho [3]
7Susan Hohenberger [14]
8S. K. Kim [3]
9Barbara Masucci [1] [2] [5] [6] [7] [8] [9] [10] [11] [12] [13]
10Michael Østergaard Pedersen [14]
11Roberto De Prisco [4]
12Alfredo De Santis [2] [3] [5] [6] [7] [8] [9] [10] [11] [12] [13]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)