| 2009 |
| 14 | EE | Anna Lisa Ferrara,
Matthew Green,
Susan Hohenberger,
Michael Østergaard Pedersen:
Practical Short Signature Batch Verification.
CT-RSA 2009: 309-324 |
| 2008 |
| 13 | EE | Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
An attack on a payment scheme.
Inf. Sci. 178(5): 1418-1421 (2008) |
| 12 | EE | Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
New constructions for provably-secure time-bound hierarchical key assignment schemes.
Theor. Comput. Sci. 407(1-3): 213-230 (2008) |
| 2007 |
| 11 | EE | Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
Efficient Provably-Secure Hierarchical Key Assignment Schemes.
MFCS 2007: 371-382 |
| 10 | EE | Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
New constructions for provably-secure time-bound hierarchical key assignment schemes.
SACMAT 2007: 133-138 |
| 2006 |
| 9 | EE | Giuseppe Ateniese,
Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
Provably-secure time-bound hierarchical key assignment schemes.
ACM Conference on Computer and Communications Security 2006: 288-297 |
| 8 | EE | Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
Unconditionally secure key assignment schemes.
Discrete Applied Mathematics 154(2): 234-252 (2006) |
| 7 | EE | Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
Enforcing the security of a time-bound hierarchical key assignment scheme.
Inf. Sci. 176(12): 1684-1694 (2006) |
| 2005 |
| 6 | EE | Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy.
WCC 2005: 202-217 |
| 5 | EE | Stelvio Cimato,
Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
Ideal contrast visual cryptography schemes with reversing.
Inf. Process. Lett. 93(4): 199-206 (2005) |
| 2004 |
| 4 | EE | Carlo Blundo,
Stelvio Cimato,
Roberto De Prisco,
Anna Lisa Ferrara:
Modeling A Certified Email Protocol using I/O Automata.
Electr. Notes Theor. Comput. Sci. 99: 339-359 (2004) |
| 3 | EE | Francis Y. L. Chin,
Alfredo De Santis,
Anna Lisa Ferrara,
N. L. Ho,
S. K. Kim:
A simple algorithm for the constrained sequence problems.
Inf. Process. Lett. 90(4): 175-179 (2004) |
| 2 | EE | Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
Cryptographic key assignment schemes for any access control policy.
Inf. Process. Lett. 92(4): 199-205 (2004) |
| 2003 |
| 1 | EE | Anna Lisa Ferrara,
Barbara Masucci:
An Information-Theoretic Approach to the Access Control Problem.
ICTCS 2003: 342-354 |