| 2008 |
| 27 | EE | Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
An attack on a payment scheme.
Inf. Sci. 178(5): 1418-1421 (2008) |
| 26 | EE | Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
New constructions for provably-secure time-bound hierarchical key assignment schemes.
Theor. Comput. Sci. 407(1-3): 213-230 (2008) |
| 2007 |
| 25 | EE | Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
Efficient Provably-Secure Hierarchical Key Assignment Schemes.
MFCS 2007: 371-382 |
| 24 | EE | Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
New constructions for provably-secure time-bound hierarchical key assignment schemes.
SACMAT 2007: 133-138 |
| 23 | EE | Alfredo De Santis,
Barbara Masucci:
New results on non-perfect sharing of multiple secrets.
Journal of Systems and Software 80(2): 216-223 (2007) |
| 2006 |
| 22 | EE | Giuseppe Ateniese,
Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
Provably-secure time-bound hierarchical key assignment schemes.
ACM Conference on Computer and Communications Security 2006: 288-297 |
| 21 | EE | Barbara Masucci:
Sharing Multiple Secrets: Models, Schemes and Analysis.
Des. Codes Cryptography 39(1): 89-111 (2006) |
| 20 | EE | Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
Unconditionally secure key assignment schemes.
Discrete Applied Mathematics 154(2): 234-252 (2006) |
| 19 | EE | Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
Enforcing the security of a time-bound hierarchical key assignment scheme.
Inf. Sci. 176(12): 1684-1694 (2006) |
| 2005 |
| 18 | EE | Stelvio Cimato,
Clemente Galdi,
Raffaella Giordano,
Barbara Masucci,
Gildo Tomasco:
Design and Implementation of an Inline Certified E-mail Service.
CANS 2005: 186-199 |
| 17 | EE | Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy.
WCC 2005: 202-217 |
| 16 | EE | Stelvio Cimato,
Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
Ideal contrast visual cryptography schemes with reversing.
Inf. Process. Lett. 93(4): 199-206 (2005) |
| 2004 |
| 15 | EE | Alfredo De Santis,
Barbara Masucci:
Anonymous Membership Broadcast Schemes.
Des. Codes Cryptography 32(1-3): 135-151 (2004) |
| 14 | EE | Carlo Blundo,
Sebastià Martín Molleví,
Barbara Masucci,
Carles Padró:
A Linear Algebraic Approach to Metering Schemes.
Des. Codes Cryptography 33(3): 241-260 (2004) |
| 13 | EE | Alfredo De Santis,
Anna Lisa Ferrara,
Barbara Masucci:
Cryptographic key assignment schemes for any access control policy.
Inf. Process. Lett. 92(4): 199-205 (2004) |
| 2003 |
| 12 | EE | Anna Lisa Ferrara,
Barbara Masucci:
An Information-Theoretic Approach to the Access Control Problem.
ICTCS 2003: 342-354 |
| 2002 |
| 11 | | Carlo Blundo,
Barbara Masucci,
Douglas R. Stinson,
Ruizhong Wei:
Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes.
Des. Codes Cryptography 26(1-3): 97-110 (2002) |
| 10 | EE | Carlo Blundo,
Stelvio Cimato,
Barbara Masucci:
A note on optimal metering schemes.
Inf. Process. Lett. 84(6): 319-326 (2002) |
| 2001 |
| 9 | | Barbara Masucci,
Douglas R. Stinson:
Efficient metering schemes with pricing.
IEEE Transactions on Information Theory 47(7): 2835-2844 (2001) |
| 2000 |
| 8 | EE | Carlo Blundo,
Annalisa De Bonis,
Barbara Masucci:
Metering Schemes with Pricing.
DISC 2000: 194-208 |
| 7 | EE | Barbara Masucci,
Douglas R. Stinson:
Metering Schemes for General Access Structures.
ESORICS 2000: 72-87 |
| 6 | EE | Carlo Blundo,
Annalisa De Bonis,
Barbara Masucci,
Douglas R. Stinson:
Dynamic Multi-threshold Metering Schemes.
Selected Areas in Cryptography 2000: 130-143 |
| 5 | EE | Alfredo De Santis,
Barbara Masucci:
On secret set schemes.
Inf. Process. Lett. 74(5-6): 243-251 (2000) |
| 1999 |
| 4 | | Alfredo De Santis,
Barbara Masucci:
Multiple ramp schemes.
IEEE Transactions on Information Theory 45(5): 1720-1728 (1999) |
| 3 | | Alfredo De Santis,
Barbara Masucci:
A Lower Bound on the Encoding Length in Lossy Transmission.
Inf. Sci. 116(2-4): 129-146 (1999) |
| 2 | EE | Carlo Blundo,
Barbara Masucci:
Randomness in Multi-Secret Sharing Schemes.
J. UCS 5(7): 367-389 (1999) |
| 1 | | Carlo Blundo,
Barbara Masucci:
A Note on the Randomness in Dynamic Threshold Schemes.
Journal of Computer Security 7(1): 73-85 (1999) |