Search the dblp DataBase
Ivan Visconti :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Pino Persiano , Ivan Visconti An Anonymous Credential System and a Privacy-Aware PKI. [Citation Graph (0, 0)][DBLP ] ACISP, 2003, pp:27-38 [Conf ] Giovanni Di Crescenzo , Giuseppe Persiano , Ivan Visconti Improved Setup Assumptions for 3-Round Resettable Zero Knowledge. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:530-544 [Conf ] Pino Persiano , Ivan Visconti User privacy issues regarding certificates and the TLS protocol: the design and implementation of the SPSL protocol. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2000, pp:53-62 [Conf ] Joël Alwen , Giuseppe Persiano , Ivan Visconti Impossibility and Feasibility Results for Zero Knowledge with Public Keys. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2005, pp:135-151 [Conf ] Giovanni Di Crescenzo , Giuseppe Persiano , Ivan Visconti Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:237-253 [Conf ] Giuseppe Persiano , Ivan Visconti An Efficient and Usable Multi-show Non-transferable Anonymous Credential System. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:196-211 [Conf ] Luigi Catuogno , Pompeo Faruolo , Umberto Ferraro Petrillo , Ivan Visconti Reliable Accounting in Grid Economic Transactions. [Citation Graph (0, 0)][DBLP ] GCC Workshops, 2004, pp:514-521 [Conf ] Dario Catalano , Ivan Visconti Hybrid Trapdoor Commitments and Their Applications. [Citation Graph (0, 0)][DBLP ] ICALP, 2005, pp:298-310 [Conf ] Giovanni Di Crescenzo , Ivan Visconti Concurrent Zero Knowledge in the Public-Key Model. [Citation Graph (0, 0)][DBLP ] ICALP, 2005, pp:816-827 [Conf ] Giuseppe Persiano , Ivan Visconti Single-Prover Concurrent Zero Knowledge in Almost Constant Rounds. [Citation Graph (0, 0)][DBLP ] ICALP, 2005, pp:228-240 [Conf ] Ivan Visconti Efficient Zero Knowledge on the Internet. [Citation Graph (0, 0)][DBLP ] ICALP (2), 2006, pp:22-33 [Conf ] Stelvio Cimato , Paolo D'Arco , Ivan Visconti Anonymous Group Communication in Mobile Networks. [Citation Graph (0, 0)][DBLP ] ICTCS, 2003, pp:316-328 [Conf ] Giuseppe Persiano , Ivan Visconti On Non-Interactive Zero-Knowledge Proofs of Knowledge in the Shared Random String Model. [Citation Graph (0, 0)][DBLP ] MFCS, 2006, pp:753-764 [Conf ] Giuseppe Cattaneo , Luigi Catuogno , Umberto Ferraro Petrillo , Ivan Visconti A Lightweight Security Model for WBEM. [Citation Graph (0, 0)][DBLP ] OTM Workshops, 2003, pp:975-988 [Conf ] Luigi Catuogno , Ivan Visconti A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code. [Citation Graph (0, 0)][DBLP ] SCN, 2002, pp:219-233 [Conf ] Dario Catalano , Yevgeniy Dodis , Ivan Visconti Mercurial Commitments: Minimal Assumptions and Efficient Constructions. [Citation Graph (0, 0)][DBLP ] TCC, 2006, pp:120-144 [Conf ] Luigi Catuogno , Roberto Gassirà , Michele Masullo , Ivan Visconti Securing Operating System Services Based on Smart Cards. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:321-330 [Conf ] Luigi Catuogno , Ivan Visconti An Architecture for Kernel-Level Verification of Executables at Run Time. [Citation Graph (0, 0)][DBLP ] Comput. J., 2004, v:47, n:5, pp:511-526 [Journal ] Dario Catalano , Ivan Visconti Hybrid commitments and their applications to zero-knowledge proof systems. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2007, v:374, n:1-3, pp:229-260 [Journal ] Pino Persiano , Ivan Visconti A secure and private system for subscription-based remote services. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2003, v:6, n:4, pp:472-500 [Journal ] On RFID Privacy with Mutual Authentication and Tag Corruption. [Citation Graph (, )][DBLP ] Revisiting DoS Attacks and Privacy in RFID-Enabled Networks. [Citation Graph (, )][DBLP ] Anonymizer-Enabled Security and Privacy for RFID. [Citation Graph (, )][DBLP ] Collusion-Free Protocols in the Mediated Model. [Citation Graph (, )][DBLP ] Collusion-Free Multiparty Computation in the Mediated Model. [Citation Graph (, )][DBLP ] Improved Security Notions and Protocols for Non-transferable Identification. [Citation Graph (, )][DBLP ] User Privacy in Transport Systems Based on RFID E-Tickets. [Citation Graph (, )][DBLP ] Location Privacy in RFID Applications. [Citation Graph (, )][DBLP ] Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports. [Citation Graph (, )][DBLP ] Constant-Round Concurrent Non-malleable Zero Knowledge in the Bare Public-Key Model. [Citation Graph (, )][DBLP ] On Defining Proofs of Knowledge in the Bare Public Key Model. [Citation Graph (, )][DBLP ] Completely Non-malleable Encryption Revisited. [Citation Graph (, )][DBLP ] Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments. [Citation Graph (, )][DBLP ] Simulation-Based Concurrent Non-malleable Commitments and Decommitments. [Citation Graph (, )][DBLP ] Efficiency Preserving Transformations for Concurrent Non-malleable Zero Knowledge. [Citation Graph (, )][DBLP ] Proxy Smart Card Systems. [Citation Graph (, )][DBLP ] Co-sound Zero-Knowledge with Public Keys. [Citation Graph (, )][DBLP ] Concurrent Non-Malleable Witness Indistinguishability and its Applications. [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.006secs