dblp.uni-trier.dewww.uni-trier.de

Ivan Visconti

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
29EERafail Ostrovsky, Giuseppe Persiano, Ivan Visconti: Simulation-Based Concurrent Non-malleable Commitments and Decommitments. TCC 2009: 91-108
2008
28 Rafail Ostrovsky, Roberto De Prisco, Ivan Visconti: Security and Cryptography for Networks, 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings Springer 2008
27EEJoël Alwen, Abhi Shelat, Ivan Visconti: Collusion-Free Protocols in the Mediated Model. CRYPTO 2008: 497-514
26EECarlo Blundo, Giuseppe Persiano, Ahmad-Reza Sadeghi, Ivan Visconti: Improved Security Notions and Protocols for Non-transferable Identification. ESORICS 2008: 364-378
25EERafail Ostrovsky, Giuseppe Persiano, Ivan Visconti: Constant-Round Concurrent Non-malleable Zero Knowledge in the Bare Public-Key Model. ICALP (2) 2008: 548-559
24EEAhmad-Reza Sadeghi, Ivan Visconti, Christian Wachsmann: User Privacy in Transport Systems Based on RFID E-Tickets. PiLBA 2008
23EECarmine Ventre, Ivan Visconti: Completely Non-malleable Encryption Revisited. Public Key Cryptography 2008: 65-84
2007
22 Giovanni Di Crescenzo, Ivan Visconti: On Defining Proofs of Knowledge in the Bare Public Key Model. ICTCS 2007: 187-198
21EEDario Catalano, Ivan Visconti: Hybrid commitments and their applications to zero-knowledge proof systems. Theor. Comput. Sci. 374(1-3): 229-260 (2007)
2006
20EEIvan Visconti: Efficient Zero Knowledge on the Internet. ICALP (2) 2006: 22-33
19EEGiuseppe Persiano, Ivan Visconti: On Non-Interactive Zero-Knowledge Proofs of Knowledge in the Shared Random String Model. MFCS 2006: 753-764
18EEDario Catalano, Yevgeniy Dodis, Ivan Visconti: Mercurial Commitments: Minimal Assumptions and Efficient Constructions. TCC 2006: 120-144
17EERafail Ostrovsky, Giuseppe Persiano, Ivan Visconti: Concurrent Non-Malleable Witness Indistinguishability and its Applications. Electronic Colloquium on Computational Complexity (ECCC) 13(095): (2006)
2005
16EEJoël Alwen, Giuseppe Persiano, Ivan Visconti: Impossibility and Feasibility Results for Zero Knowledge with Public Keys. CRYPTO 2005: 135-151
15EEGiuseppe Persiano, Ivan Visconti: Single-Prover Concurrent Zero Knowledge in Almost Constant Rounds. ICALP 2005: 228-240
14EEDario Catalano, Ivan Visconti: Hybrid Trapdoor Commitments and Their Applications. ICALP 2005: 298-310
13EEGiovanni Di Crescenzo, Ivan Visconti: Concurrent Zero Knowledge in the Public-Key Model. ICALP 2005: 816-827
12EELuigi Catuogno, Roberto Gassirà, Michele Masullo, Ivan Visconti: Securing Operating System Services Based on Smart Cards. TrustBus 2005: 321-330
2004
11EEGiovanni Di Crescenzo, Giuseppe Persiano, Ivan Visconti: Improved Setup Assumptions for 3-Round Resettable Zero Knowledge. ASIACRYPT 2004: 530-544
10EEGiovanni Di Crescenzo, Giuseppe Persiano, Ivan Visconti: Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model. CRYPTO 2004: 237-253
9EEGiuseppe Persiano, Ivan Visconti: An Efficient and Usable Multi-show Non-transferable Anonymous Credential System. Financial Cryptography 2004: 196-211
8EELuigi Catuogno, Pompeo Faruolo, Umberto Ferraro Petrillo, Ivan Visconti: Reliable Accounting in Grid Economic Transactions. GCC Workshops 2004: 514-521
7EELuigi Catuogno, Ivan Visconti: An Architecture for Kernel-Level Verification of Executables at Run Time. Comput. J. 47(5): 511-526 (2004)
2003
6EEPino Persiano, Ivan Visconti: An Anonymous Credential System and a Privacy-Aware PKI. ACISP 2003: 27-38
5EEStelvio Cimato, Paolo D'Arco, Ivan Visconti: Anonymous Group Communication in Mobile Networks. ICTCS 2003: 316-328
4EEGiuseppe Cattaneo, Luigi Catuogno, Umberto Ferraro Petrillo, Ivan Visconti: A Lightweight Security Model for WBEM. OTM Workshops 2003: 975-988
3EEPino Persiano, Ivan Visconti: A secure and private system for subscription-based remote services. ACM Trans. Inf. Syst. Secur. 6(4): 472-500 (2003)
2002
2EELuigi Catuogno, Ivan Visconti: A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code. SCN 2002: 219-233
2000
1EEPino Persiano, Ivan Visconti: User privacy issues regarding certificates and the TLS protocol: the design and implementation of the SPSL protocol. ACM Conference on Computer and Communications Security 2000: 53-62

Coauthor Index

1Joël Alwen [16] [27]
2Carlo Blundo [26]
3Dario Catalano [14] [18] [21]
4Giuseppe Cattaneo [4]
5Luigi Catuogno [2] [4] [7] [8] [12]
6Stelvio Cimato [5]
7Giovanni Di Crescenzo [10] [11] [13] [22]
8Paolo D'Arco [5]
9Yevgeniy Dodis [18]
10Pompeo Faruolo [8]
11Roberto Gassirà [12]
12Michele Masullo [12]
13Rafail Ostrovsky [17] [25] [28] [29]
14Giuseppe Persiano (Pino Persiano) [1] [3] [6] [9] [10] [11] [15] [16] [17] [19] [25] [26] [29]
15Umberto Ferraro Petrillo [4] [8]
16Roberto De Prisco [28]
17Ahmad-Reza Sadeghi [24] [26]
18Abhi Shelat [27]
19Carmine Ventre [23]
20Christian Wachsmann [24]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)