The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Stelvio Cimato: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Stelvio Cimato, Cecilia Mascolo
    Analyzing and Animating Declarative Specifications. [Citation Graph (0, 0)][DBLP]
    APPIA-GULP-PRODE, 1996, pp:295-308 [Conf]
  2. Stelvio Cimato, Clemente Galdi, Raffaella Giordano, Barbara Masucci, Gildo Tomasco
    Design and Implementation of an Inline Certified E-mail Service. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:186-199 [Conf]
  3. Paolo Ciancarini, Stelvio Cimato
    Animating a Non-executable Formal Specification with a Distributed Symbolic Language. [Citation Graph (0, 0)][DBLP]
    DISCO, 1996, pp:200-201 [Conf]
  4. Stelvio Cimato, Paolo Ciancarini
    A Formal Approach to the Specification of Java Components. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1999, pp:107-108 [Conf]
  5. Carlo Blundo, Stelvio Cimato
    A Framework for Authenticated Web Services. [Citation Graph (0, 0)][DBLP]
    ECOWS, 2004, pp:61-71 [Conf]
  6. Stelvio Cimato
    Specifying component-based Java applications (Short Paper). [Citation Graph (0, 0)][DBLP]
    FMOODS, 1999, pp:- [Conf]
  7. Stelvio Cimato
    Design of an Authentication Protocol for Gsm Javacards. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:355-368 [Conf]
  8. Stelvio Cimato, Annalisa De Bonis
    Online Advertising: Secure E-coupons. [Citation Graph (0, 0)][DBLP]
    ICTCS, 2001, pp:370-383 [Conf]
  9. Stelvio Cimato, Paolo D'Arco, Ivan Visconti
    Anonymous Group Communication in Mobile Networks. [Citation Graph (0, 0)][DBLP]
    ICTCS, 2003, pp:316-328 [Conf]
  10. Vincenzo Auletta, Carlo Blundo, Stelvio Cimato, Guerriero Raimato
    A Web Service Based Micro-payment System. [Citation Graph (0, 0)][DBLP]
    ISCC, 2006, pp:328-333 [Conf]
  11. Carlo Blundo, Stelvio Cimato, Roberto De Prisco
    Certified Email: Design and Implementation of a New Optimistic Protocol.. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:828-833 [Conf]
  12. Carlo Blundo, Stelvio Cimato
    A Platform for Secure E-Gambling. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:768-772 [Conf]
  13. Carlo Blundo, Stelvio Cimato, Roberto De Prisco
    A Lightweight Approach to Authenticated Web Caching. [Citation Graph (0, 0)][DBLP]
    SAINT, 2005, pp:157-163 [Conf]
  14. Stelvio Cimato, Roberto De Prisco, Alfredo De Santis
    Colored Visual Cryptography Without Color Darkening. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:235-248 [Conf]
  15. Paolo Ciancarini, Stelvio Cimato, Cecilia Mascolo
    Engineering Formal Requirements: Analysis and Testing. [Citation Graph (0, 0)][DBLP]
    SEKE, 1996, pp:385-392 [Conf]
  16. Carlo Blundo, Stelvio Cimato
    SAWM: a tool for secure and authenticated web metering. [Citation Graph (0, 0)][DBLP]
    SEKE, 2002, pp:641-648 [Conf]
  17. Carlo Blundo, Stelvio Cimato, Annalisa De Bonis
    A lightweight protocol for the generation and distribution of secure e-coupons. [Citation Graph (0, 0)][DBLP]
    WWW, 2002, pp:542-552 [Conf]
  18. Paolo Ciancarini, Stelvio Cimato, Cecilia Mascolo
    Engineering Formal Requirements: An Analysis and Testing Method for Z Documents. [Citation Graph (0, 0)][DBLP]
    Ann. Software Eng., 1997, v:3, n:, pp:189-219 [Journal]
  19. Stelvio Cimato, Roberto De Prisco, Alfredo De Santis
    Probabilistic Visual Cryptography Schemes. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2006, v:49, n:1, pp:97-107 [Journal]
  20. Carlo Blundo, Stelvio Cimato
    A Software Infrastructure for Authenticated Web Metering. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:4, pp:28-33 [Journal]
  21. Stelvio Cimato, Roberto De Prisco, Alfredo De Santis
    Optimal Colored Threshold Visual Cryptography Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:35, n:3, pp:311-335 [Journal]
  22. Carlo Blundo, Stelvio Cimato, Annalisa De Bonis
    Secure E-Coupons. [Citation Graph (0, 0)][DBLP]
    Electronic Commerce Research, 2005, v:5, n:1, pp:117-139 [Journal]
  23. Carlo Blundo, Stelvio Cimato, Roberto De Prisco, Anna Lisa Ferrara
    Modeling A Certified Email Protocol using I/O Automata. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2004, v:99, n:, pp:339-359 [Journal]
  24. Carlo Blundo, Stelvio Cimato, Barbara Masucci
    A note on optimal metering schemes. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2002, v:84, n:6, pp:319-326 [Journal]
  25. Stelvio Cimato, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
    Ideal contrast visual cryptography schemes with reversing. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2005, v:93, n:4, pp:199-206 [Journal]
  26. Stelvio Cimato, Antonella Cresti, Paolo D'Arco
    A unified model for unconditionally secure key distribution. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2006, v:14, n:1, pp:45-64 [Journal]
  27. Stelvio Cimato, Alfredo De Santis, Umberto Ferraro Petrillo
    Overcoming the obfuscation of Java programs by identifier renaming. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2005, v:78, n:1, pp:60-72 [Journal]
  28. Carlo Blundo, Stelvio Cimato, Alfredo De Santis
    Visual cryptography schemes with optimal pixel expansion. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2006, v:369, n:1-3, pp:169-182 [Journal]
  29. Stelvio Cimato, Roberto De Prisco, Alfredo De Santis
    Colored visual cryptography without color darkening. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2007, v:374, n:1-3, pp:261-276 [Journal]

  30. Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System. [Citation Graph (, )][DBLP]


  31. A Biometric Verification System Addressing Privacy Concerns. [Citation Graph (, )][DBLP]


  32. A Lightweight Protocol for Dynamic RFID Identification. [Citation Graph (, )][DBLP]


  33. A simple role mining algorithm. [Citation Graph (, )][DBLP]


  34. Efficient Key Management for Enforcing Access Control in Outsourced Scenarios. [Citation Graph (, )][DBLP]


  35. Managing key hierarchies for access control enforcement: Heuristic approaches. [Citation Graph (, )][DBLP]


Search in 0.143secs, Finished in 0.144secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002