dblp.uni-trier.dewww.uni-trier.de

Barbara Masucci

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
27EEAlfredo De Santis, Anna Lisa Ferrara, Barbara Masucci: An attack on a payment scheme. Inf. Sci. 178(5): 1418-1421 (2008)
26EEAlfredo De Santis, Anna Lisa Ferrara, Barbara Masucci: New constructions for provably-secure time-bound hierarchical key assignment schemes. Theor. Comput. Sci. 407(1-3): 213-230 (2008)
2007
25EEAlfredo De Santis, Anna Lisa Ferrara, Barbara Masucci: Efficient Provably-Secure Hierarchical Key Assignment Schemes. MFCS 2007: 371-382
24EEAlfredo De Santis, Anna Lisa Ferrara, Barbara Masucci: New constructions for provably-secure time-bound hierarchical key assignment schemes. SACMAT 2007: 133-138
23EEAlfredo De Santis, Barbara Masucci: New results on non-perfect sharing of multiple secrets. Journal of Systems and Software 80(2): 216-223 (2007)
2006
22EEGiuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci: Provably-secure time-bound hierarchical key assignment schemes. ACM Conference on Computer and Communications Security 2006: 288-297
21EEBarbara Masucci: Sharing Multiple Secrets: Models, Schemes and Analysis. Des. Codes Cryptography 39(1): 89-111 (2006)
20EEAlfredo De Santis, Anna Lisa Ferrara, Barbara Masucci: Unconditionally secure key assignment schemes. Discrete Applied Mathematics 154(2): 234-252 (2006)
19EEAlfredo De Santis, Anna Lisa Ferrara, Barbara Masucci: Enforcing the security of a time-bound hierarchical key assignment scheme. Inf. Sci. 176(12): 1684-1694 (2006)
2005
18EEStelvio Cimato, Clemente Galdi, Raffaella Giordano, Barbara Masucci, Gildo Tomasco: Design and Implementation of an Inline Certified E-mail Service. CANS 2005: 186-199
17EEAlfredo De Santis, Anna Lisa Ferrara, Barbara Masucci: A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy. WCC 2005: 202-217
16EEStelvio Cimato, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci: Ideal contrast visual cryptography schemes with reversing. Inf. Process. Lett. 93(4): 199-206 (2005)
2004
15EEAlfredo De Santis, Barbara Masucci: Anonymous Membership Broadcast Schemes. Des. Codes Cryptography 32(1-3): 135-151 (2004)
14EECarlo Blundo, Sebastià Martín Molleví, Barbara Masucci, Carles Padró: A Linear Algebraic Approach to Metering Schemes. Des. Codes Cryptography 33(3): 241-260 (2004)
13EEAlfredo De Santis, Anna Lisa Ferrara, Barbara Masucci: Cryptographic key assignment schemes for any access control policy. Inf. Process. Lett. 92(4): 199-205 (2004)
2003
12EEAnna Lisa Ferrara, Barbara Masucci: An Information-Theoretic Approach to the Access Control Problem. ICTCS 2003: 342-354
2002
11 Carlo Blundo, Barbara Masucci, Douglas R. Stinson, Ruizhong Wei: Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes. Des. Codes Cryptography 26(1-3): 97-110 (2002)
10EECarlo Blundo, Stelvio Cimato, Barbara Masucci: A note on optimal metering schemes. Inf. Process. Lett. 84(6): 319-326 (2002)
2001
9 Barbara Masucci, Douglas R. Stinson: Efficient metering schemes with pricing. IEEE Transactions on Information Theory 47(7): 2835-2844 (2001)
2000
8EECarlo Blundo, Annalisa De Bonis, Barbara Masucci: Metering Schemes with Pricing. DISC 2000: 194-208
7EEBarbara Masucci, Douglas R. Stinson: Metering Schemes for General Access Structures. ESORICS 2000: 72-87
6EECarlo Blundo, Annalisa De Bonis, Barbara Masucci, Douglas R. Stinson: Dynamic Multi-threshold Metering Schemes. Selected Areas in Cryptography 2000: 130-143
5EEAlfredo De Santis, Barbara Masucci: On secret set schemes. Inf. Process. Lett. 74(5-6): 243-251 (2000)
1999
4 Alfredo De Santis, Barbara Masucci: Multiple ramp schemes. IEEE Transactions on Information Theory 45(5): 1720-1728 (1999)
3 Alfredo De Santis, Barbara Masucci: A Lower Bound on the Encoding Length in Lossy Transmission. Inf. Sci. 116(2-4): 129-146 (1999)
2EECarlo Blundo, Barbara Masucci: Randomness in Multi-Secret Sharing Schemes. J. UCS 5(7): 367-389 (1999)
1 Carlo Blundo, Barbara Masucci: A Note on the Randomness in Dynamic Threshold Schemes. Journal of Computer Security 7(1): 73-85 (1999)

Coauthor Index

1Giuseppe Ateniese [22]
2Carlo Blundo [1] [2] [6] [8] [10] [11] [14]
3Annalisa De Bonis [6] [8]
4Stelvio Cimato [10] [16] [18]
5Anna Lisa Ferrara [12] [13] [16] [17] [19] [20] [22] [24] [25] [26] [27]
6Clemente Galdi [18]
7Raffaella Giordano [18]
8Sebastià Martín Molleví [14]
9Carles Padró [14]
10Alfredo De Santis [3] [4] [5] [13] [15] [16] [17] [19] [20] [22] [23] [24] [25] [26] [27]
11Douglas R. Stinson [6] [7] [9] [11]
12Gildo Tomasco [18]
13Ruizhong Wei [11]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)