The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ivan Visconti: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Pino Persiano, Ivan Visconti
    An Anonymous Credential System and a Privacy-Aware PKI. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:27-38 [Conf]
  2. Giovanni Di Crescenzo, Giuseppe Persiano, Ivan Visconti
    Improved Setup Assumptions for 3-Round Resettable Zero Knowledge. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:530-544 [Conf]
  3. Pino Persiano, Ivan Visconti
    User privacy issues regarding certificates and the TLS protocol: the design and implementation of the SPSL protocol. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:53-62 [Conf]
  4. Joël Alwen, Giuseppe Persiano, Ivan Visconti
    Impossibility and Feasibility Results for Zero Knowledge with Public Keys. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2005, pp:135-151 [Conf]
  5. Giovanni Di Crescenzo, Giuseppe Persiano, Ivan Visconti
    Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2004, pp:237-253 [Conf]
  6. Giuseppe Persiano, Ivan Visconti
    An Efficient and Usable Multi-show Non-transferable Anonymous Credential System. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:196-211 [Conf]
  7. Luigi Catuogno, Pompeo Faruolo, Umberto Ferraro Petrillo, Ivan Visconti
    Reliable Accounting in Grid Economic Transactions. [Citation Graph (0, 0)][DBLP]
    GCC Workshops, 2004, pp:514-521 [Conf]
  8. Dario Catalano, Ivan Visconti
    Hybrid Trapdoor Commitments and Their Applications. [Citation Graph (0, 0)][DBLP]
    ICALP, 2005, pp:298-310 [Conf]
  9. Giovanni Di Crescenzo, Ivan Visconti
    Concurrent Zero Knowledge in the Public-Key Model. [Citation Graph (0, 0)][DBLP]
    ICALP, 2005, pp:816-827 [Conf]
  10. Giuseppe Persiano, Ivan Visconti
    Single-Prover Concurrent Zero Knowledge in Almost Constant Rounds. [Citation Graph (0, 0)][DBLP]
    ICALP, 2005, pp:228-240 [Conf]
  11. Ivan Visconti
    Efficient Zero Knowledge on the Internet. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:22-33 [Conf]
  12. Stelvio Cimato, Paolo D'Arco, Ivan Visconti
    Anonymous Group Communication in Mobile Networks. [Citation Graph (0, 0)][DBLP]
    ICTCS, 2003, pp:316-328 [Conf]
  13. Giuseppe Persiano, Ivan Visconti
    On Non-Interactive Zero-Knowledge Proofs of Knowledge in the Shared Random String Model. [Citation Graph (0, 0)][DBLP]
    MFCS, 2006, pp:753-764 [Conf]
  14. Giuseppe Cattaneo, Luigi Catuogno, Umberto Ferraro Petrillo, Ivan Visconti
    A Lightweight Security Model for WBEM. [Citation Graph (0, 0)][DBLP]
    OTM Workshops, 2003, pp:975-988 [Conf]
  15. Luigi Catuogno, Ivan Visconti
    A Format-Independent Architecture for Run-Time Integrity Checking of Executable Code. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:219-233 [Conf]
  16. Dario Catalano, Yevgeniy Dodis, Ivan Visconti
    Mercurial Commitments: Minimal Assumptions and Efficient Constructions. [Citation Graph (0, 0)][DBLP]
    TCC, 2006, pp:120-144 [Conf]
  17. Luigi Catuogno, Roberto Gassirà, Michele Masullo, Ivan Visconti
    Securing Operating System Services Based on Smart Cards. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:321-330 [Conf]
  18. Luigi Catuogno, Ivan Visconti
    An Architecture for Kernel-Level Verification of Executables at Run Time. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2004, v:47, n:5, pp:511-526 [Journal]
  19. Dario Catalano, Ivan Visconti
    Hybrid commitments and their applications to zero-knowledge proof systems. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2007, v:374, n:1-3, pp:229-260 [Journal]
  20. Pino Persiano, Ivan Visconti
    A secure and private system for subscription-based remote services. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2003, v:6, n:4, pp:472-500 [Journal]

  21. On RFID Privacy with Mutual Authentication and Tag Corruption. [Citation Graph (, )][DBLP]


  22. Revisiting DoS Attacks and Privacy in RFID-Enabled Networks. [Citation Graph (, )][DBLP]


  23. Anonymizer-Enabled Security and Privacy for RFID. [Citation Graph (, )][DBLP]


  24. Collusion-Free Protocols in the Mediated Model. [Citation Graph (, )][DBLP]


  25. Collusion-Free Multiparty Computation in the Mediated Model. [Citation Graph (, )][DBLP]


  26. Improved Security Notions and Protocols for Non-transferable Identification. [Citation Graph (, )][DBLP]


  27. User Privacy in Transport Systems Based on RFID E-Tickets. [Citation Graph (, )][DBLP]


  28. Location Privacy in RFID Applications. [Citation Graph (, )][DBLP]


  29. Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports. [Citation Graph (, )][DBLP]


  30. Constant-Round Concurrent Non-malleable Zero Knowledge in the Bare Public-Key Model. [Citation Graph (, )][DBLP]


  31. On Defining Proofs of Knowledge in the Bare Public Key Model. [Citation Graph (, )][DBLP]


  32. Completely Non-malleable Encryption Revisited. [Citation Graph (, )][DBLP]


  33. Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments. [Citation Graph (, )][DBLP]


  34. Simulation-Based Concurrent Non-malleable Commitments and Decommitments. [Citation Graph (, )][DBLP]


  35. Efficiency Preserving Transformations for Concurrent Non-malleable Zero Knowledge. [Citation Graph (, )][DBLP]


  36. Proxy Smart Card Systems. [Citation Graph (, )][DBLP]


  37. Co-sound Zero-Knowledge with Public Keys. [Citation Graph (, )][DBLP]


  38. Concurrent Non-Malleable Witness Indistinguishability and its Applications. [Citation Graph (, )][DBLP]


Search in 0.059secs, Finished in 0.061secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002