Search the dblp DataBase
Giuseppe Ateniese :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Giuseppe Ateniese , Breno de Medeiros Efficient Group Signatures without Trapdoors. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:246-268 [Conf ] Reza Curtmola , Aniello Del Sorbo , Giuseppe Ateniese On the Performance and Analysis of DNS Security Extensions. [Citation Graph (0, 0)][DBLP ] CANS, 2005, pp:288-303 [Conf ] Giuseppe Ateniese Efficient Verifiable Encryption (and Fair Exchange) of Digital Signatures. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1999, pp:138-146 [Conf ] Giuseppe Ateniese , Jan Camenisch , Breno de Medeiros Untraceable RFID tags via insubvertible encryption. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2005, pp:92-101 [Conf ] Giuseppe Ateniese , Susan Hohenberger Proxy re-signatures: new definitions, algorithms, and applications. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2005, pp:310-319 [Conf ] Giuseppe Ateniese , Stefan Mangard A new approach to DNS security (DNSSEC). [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:86-95 [Conf ] Giuseppe Ateniese , Michael Steiner , Gene Tsudik Authenticated Group Key Agreement and Friends. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1998, pp:17-26 [Conf ] Giuseppe Ateniese , Alfredo De Santis , Anna Lisa Ferrara , Barbara Masucci Provably-secure time-bound hierarchical key assignment schemes. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:288-297 [Conf ] Giuseppe Ateniese , Jan Camenisch , Marc Joye , Gene Tsudik A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2000, pp:255-270 [Conf ] Giuseppe Ateniese , Cristina Nita-Rotaru Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:182-199 [Conf ] Giuseppe Ateniese , Daniel H. Chou , Breno de Medeiros , Gene Tsudik Sanitizable Signatures. [Citation Graph (0, 0)][DBLP ] ESORICS, 2005, pp:159-177 [Conf ] Giuseppe Ateniese , Breno de Medeiros Identity-Based Chameleon Hash and Applications. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:164-180 [Conf ] Giuseppe Ateniese , Dawn Xiaodong Song , Gene Tsudik Quasi-Efficient Revocation in Group Signatures. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2002, pp:183-197 [Conf ] Giuseppe Ateniese , Gene Tsudik Some Open Issues and New Directions in Group Signatures. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1999, pp:196-211 [Conf ] Giuseppe Ateniese , Carlo Blundo , Alfredo De Santis , Douglas R. Stinson Constructions and Bounds for Visual Cryptography. [Citation Graph (0, 0)][DBLP ] ICALP, 1996, pp:416-428 [Conf ] Jonathan Robert Stanton , Yair Amir , Damian Hasse , Giuseppe Ateniese , Yongdae Kim , Cristina Nita-Rotaru , Theo Schlossnagle , John L. Schultz , Gene Tsudik Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments. [Citation Graph (0, 0)][DBLP ] ICDCS, 2000, pp:330-343 [Conf ] Giuseppe Ateniese , Chris Riley , Christian Scheideler Survivable Monitoring in Dynamic Networks. [Citation Graph (0, 0)][DBLP ] IWIA, 2004, pp:33-47 [Conf ] Giuseppe Ateniese , Kevin Fu , Matthew Green , Susan Hohenberger Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. [Citation Graph (0, 0)][DBLP ] NDSS, 2005, pp:- [Conf ] Giuseppe Ateniese , Breno de Medeiros , Michael T. Goodrich TRICERT: A Distributed Certified E-Mail Scheme. [Citation Graph (0, 0)][DBLP ] NDSS, 2001, pp:- [Conf ] Giuseppe Ateniese , Reza Curtmola , Breno de Medeiros , Darren Davis Medical Information Privacy Assurance: Cryptographic and System Aspects. [Citation Graph (0, 0)][DBLP ] SCN, 2002, pp:199-218 [Conf ] Giuseppe Ateniese , Breno de Medeiros On the Key Exposure Problem in Chameleon Hashes. [Citation Graph (0, 0)][DBLP ] SCN, 2004, pp:165-179 [Conf ] Giuseppe Ateniese , Gene Tsudik Group Signatures Á la carte . [Citation Graph (0, 0)][DBLP ] SODA, 1999, pp:848-849 [Conf ] Giuseppe Ateniese , Breno de Medeiros Anonymous E-prescriptions. [Citation Graph (0, 0)][DBLP ] WPES, 2002, pp:19-31 [Conf ] Giuseppe Ateniese , Amir Herzberg , Hugo Krawczyk , Gene Tsudik Untraceable mobility or how to travel incognito. [Citation Graph (0, 0)][DBLP ] Computer Networks, 1999, v:31, n:8, pp:871-884 [Journal ] Giuseppe Ateniese , Carlo Blundo , Alfredo De Santis , Douglas R. Stinson Visual Cryptography for General Access Structures [Citation Graph (0, 0)][DBLP ] Electronic Colloquium on Computational Complexity (ECCC), 1996, v:3, n:12, pp:- [Journal ] Giuseppe Ateniese , Carlo Blundo , Alfredo De Santis , Douglas R. Stinson Visual Cryptography for General Access Structures. [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1996, v:129, n:2, pp:86-106 [Journal ] Giuseppe Ateniese , Carlo Blundo , Alfredo De Santis , Douglas R. Stinson Extended capabilities for visual cryptography. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2001, v:250, n:1-2, pp:143-161 [Journal ] Giuseppe Ateniese Verifiable encryption of digital signatures and applications. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:1, pp:1-20 [Journal ] Giuseppe Ateniese , Kevin Fu , Matthew Green , Susan Hohenberger Improved proxy re-encryption schemes with applications to secure distributed storage. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2006, v:9, n:1, pp:1-30 [Journal ] Giuseppe Ateniese , Chris Riley , Christian Scheideler Survivable Monitoring in Dynamic Networks. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Mob. Comput., 2006, v:5, n:9, pp:1242-1254 [Journal ] Matthew Green , Giuseppe Ateniese Identity-Based Proxy Re-encryption. [Citation Graph (0, 0)][DBLP ] ACNS, 2007, pp:288-306 [Conf ] Proofs of Storage from Homomorphic Identification Protocols. [Citation Graph (, )][DBLP ] Provable data possession at untrusted stores. [Citation Graph (, )][DBLP ] Key-Private Proxy Re-encryption. [Citation Graph (, )][DBLP ] Universally Anonymous IBE Based on the Quadratic Residuosity Assumption. [Citation Graph (, )][DBLP ] Design and Implementation of Verifiable Audit Trails for a Versioning File System. [Citation Graph (, )][DBLP ] MR-PDP: Multiple-Replica Provable Data Possession. [Citation Graph (, )][DBLP ] Secret Handshakes with Dynamic and Fuzzy Matching. [Citation Graph (, )][DBLP ] Verifiable audit trails for a versioning file system. [Citation Graph (, )][DBLP ] Search in 0.023secs, Finished in 0.024secs