The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Giuseppe Ateniese: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Giuseppe Ateniese, Breno de Medeiros
    Efficient Group Signatures without Trapdoors. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:246-268 [Conf]
  2. Reza Curtmola, Aniello Del Sorbo, Giuseppe Ateniese
    On the Performance and Analysis of DNS Security Extensions. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:288-303 [Conf]
  3. Giuseppe Ateniese
    Efficient Verifiable Encryption (and Fair Exchange) of Digital Signatures. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1999, pp:138-146 [Conf]
  4. Giuseppe Ateniese, Jan Camenisch, Breno de Medeiros
    Untraceable RFID tags via insubvertible encryption. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:92-101 [Conf]
  5. Giuseppe Ateniese, Susan Hohenberger
    Proxy re-signatures: new definitions, algorithms, and applications. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:310-319 [Conf]
  6. Giuseppe Ateniese, Stefan Mangard
    A new approach to DNS security (DNSSEC). [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:86-95 [Conf]
  7. Giuseppe Ateniese, Michael Steiner, Gene Tsudik
    Authenticated Group Key Agreement and Friends. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1998, pp:17-26 [Conf]
  8. Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
    Provably-secure time-bound hierarchical key assignment schemes. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:288-297 [Conf]
  9. Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik
    A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2000, pp:255-270 [Conf]
  10. Giuseppe Ateniese, Cristina Nita-Rotaru
    Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:182-199 [Conf]
  11. Giuseppe Ateniese, Daniel H. Chou, Breno de Medeiros, Gene Tsudik
    Sanitizable Signatures. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:159-177 [Conf]
  12. Giuseppe Ateniese, Breno de Medeiros
    Identity-Based Chameleon Hash and Applications. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2004, pp:164-180 [Conf]
  13. Giuseppe Ateniese, Dawn Xiaodong Song, Gene Tsudik
    Quasi-Efficient Revocation in Group Signatures. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:183-197 [Conf]
  14. Giuseppe Ateniese, Gene Tsudik
    Some Open Issues and New Directions in Group Signatures. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1999, pp:196-211 [Conf]
  15. Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson
    Constructions and Bounds for Visual Cryptography. [Citation Graph (0, 0)][DBLP]
    ICALP, 1996, pp:416-428 [Conf]
  16. Jonathan Robert Stanton, Yair Amir, Damian Hasse, Giuseppe Ateniese, Yongdae Kim, Cristina Nita-Rotaru, Theo Schlossnagle, John L. Schultz, Gene Tsudik
    Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2000, pp:330-343 [Conf]
  17. Giuseppe Ateniese, Chris Riley, Christian Scheideler
    Survivable Monitoring in Dynamic Networks. [Citation Graph (0, 0)][DBLP]
    IWIA, 2004, pp:33-47 [Conf]
  18. Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger
    Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. [Citation Graph (0, 0)][DBLP]
    NDSS, 2005, pp:- [Conf]
  19. Giuseppe Ateniese, Breno de Medeiros, Michael T. Goodrich
    TRICERT: A Distributed Certified E-Mail Scheme. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  20. Giuseppe Ateniese, Reza Curtmola, Breno de Medeiros, Darren Davis
    Medical Information Privacy Assurance: Cryptographic and System Aspects. [Citation Graph (0, 0)][DBLP]
    SCN, 2002, pp:199-218 [Conf]
  21. Giuseppe Ateniese, Breno de Medeiros
    On the Key Exposure Problem in Chameleon Hashes. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:165-179 [Conf]
  22. Giuseppe Ateniese, Gene Tsudik
    Group Signatures Á la carte. [Citation Graph (0, 0)][DBLP]
    SODA, 1999, pp:848-849 [Conf]
  23. Giuseppe Ateniese, Breno de Medeiros
    Anonymous E-prescriptions. [Citation Graph (0, 0)][DBLP]
    WPES, 2002, pp:19-31 [Conf]
  24. Giuseppe Ateniese, Amir Herzberg, Hugo Krawczyk, Gene Tsudik
    Untraceable mobility or how to travel incognito. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1999, v:31, n:8, pp:871-884 [Journal]
  25. Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson
    Visual Cryptography for General Access Structures [Citation Graph (0, 0)][DBLP]
    Electronic Colloquium on Computational Complexity (ECCC), 1996, v:3, n:12, pp:- [Journal]
  26. Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson
    Visual Cryptography for General Access Structures. [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1996, v:129, n:2, pp:86-106 [Journal]
  27. Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson
    Extended capabilities for visual cryptography. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2001, v:250, n:1-2, pp:143-161 [Journal]
  28. Giuseppe Ateniese
    Verifiable encryption of digital signatures and applications. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:1, pp:1-20 [Journal]
  29. Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger
    Improved proxy re-encryption schemes with applications to secure distributed storage. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2006, v:9, n:1, pp:1-30 [Journal]
  30. Giuseppe Ateniese, Chris Riley, Christian Scheideler
    Survivable Monitoring in Dynamic Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Mob. Comput., 2006, v:5, n:9, pp:1242-1254 [Journal]
  31. Matthew Green, Giuseppe Ateniese
    Identity-Based Proxy Re-encryption. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:288-306 [Conf]

  32. Proofs of Storage from Homomorphic Identification Protocols. [Citation Graph (, )][DBLP]


  33. Provable data possession at untrusted stores. [Citation Graph (, )][DBLP]


  34. Key-Private Proxy Re-encryption. [Citation Graph (, )][DBLP]


  35. Universally Anonymous IBE Based on the Quadratic Residuosity Assumption. [Citation Graph (, )][DBLP]


  36. Design and Implementation of Verifiable Audit Trails for a Versioning File System. [Citation Graph (, )][DBLP]


  37. MR-PDP: Multiple-Replica Provable Data Possession. [Citation Graph (, )][DBLP]


  38. Secret Handshakes with Dynamic and Fuzzy Matching. [Citation Graph (, )][DBLP]


  39. Verifiable audit trails for a versioning file system. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.154secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002