2009 |
14 | EE | Anna Lisa Ferrara,
Matthew Green,
Susan Hohenberger,
Michael Østergaard Pedersen:
Practical Short Signature Batch Verification.
CT-RSA 2009: 309-324 |
2008 |
13 | EE | Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
An attack on a payment scheme.
Inf. Sci. 178(5): 1418-1421 (2008) |
12 | EE | Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
New constructions for provably-secure time-bound hierarchical key assignment schemes.
Theor. Comput. Sci. 407(1-3): 213-230 (2008) |
2007 |
11 | EE | Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
Efficient Provably-Secure Hierarchical Key Assignment Schemes.
MFCS 2007: 371-382 |
10 | EE | Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
New constructions for provably-secure time-bound hierarchical key assignment schemes.
SACMAT 2007: 133-138 |
2006 |
9 | EE | Giuseppe Ateniese,
Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
Provably-secure time-bound hierarchical key assignment schemes.
ACM Conference on Computer and Communications Security 2006: 288-297 |
8 | EE | Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
Unconditionally secure key assignment schemes.
Discrete Applied Mathematics 154(2): 234-252 (2006) |
7 | EE | Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
Enforcing the security of a time-bound hierarchical key assignment scheme.
Inf. Sci. 176(12): 1684-1694 (2006) |
2005 |
6 | EE | Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy.
WCC 2005: 202-217 |
5 | EE | Stelvio Cimato,
Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
Ideal contrast visual cryptography schemes with reversing.
Inf. Process. Lett. 93(4): 199-206 (2005) |
2004 |
4 | EE | Carlo Blundo,
Stelvio Cimato,
Roberto De Prisco,
Anna Lisa Ferrara:
Modeling A Certified Email Protocol using I/O Automata.
Electr. Notes Theor. Comput. Sci. 99: 339-359 (2004) |
3 | EE | Francis Y. L. Chin,
Alfredo De Santis,
Anna Lisa Ferrara,
N. L. Ho,
S. K. Kim:
A simple algorithm for the constrained sequence problems.
Inf. Process. Lett. 90(4): 175-179 (2004) |
2 | EE | Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
Cryptographic key assignment schemes for any access control policy.
Inf. Process. Lett. 92(4): 199-205 (2004) |
2003 |
1 | EE | Anna Lisa Ferrara,
Barbara Masucci:
An Information-Theoretic Approach to the Access Control Problem.
ICTCS 2003: 342-354 |