The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Barbara Masucci: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Stelvio Cimato, Clemente Galdi, Raffaella Giordano, Barbara Masucci, Gildo Tomasco
    Design and Implementation of an Inline Certified E-mail Service. [Citation Graph (0, 0)][DBLP]
    CANS, 2005, pp:186-199 [Conf]
  2. Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
    Provably-secure time-bound hierarchical key assignment schemes. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:288-297 [Conf]
  3. Barbara Masucci, Douglas R. Stinson
    Metering Schemes for General Access Structures. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:72-87 [Conf]
  4. Anna Lisa Ferrara, Barbara Masucci
    An Information-Theoretic Approach to the Access Control Problem. [Citation Graph (0, 0)][DBLP]
    ICTCS, 2003, pp:342-354 [Conf]
  5. Carlo Blundo, Annalisa De Bonis, Barbara Masucci, Douglas R. Stinson
    Dynamic Multi-threshold Metering Schemes. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:130-143 [Conf]
  6. Carlo Blundo, Annalisa De Bonis, Barbara Masucci
    Metering Schemes with Pricing. [Citation Graph (0, 0)][DBLP]
    DISC, 2000, pp:194-208 [Conf]
  7. Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
    A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:202-217 [Conf]
  8. Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
    Unconditionally secure key assignment schemes. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2006, v:154, n:2, pp:234-252 [Journal]
  9. Carlo Blundo, Sebastià Martín Molleví, Barbara Masucci, Carles Padró
    A Linear Algebraic Approach to Metering Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:33, n:3, pp:241-260 [Journal]
  10. Carlo Blundo, Barbara Masucci, Douglas R. Stinson, Ruizhong Wei
    Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2002, v:26, n:1-3, pp:97-110 [Journal]
  11. Alfredo De Santis, Barbara Masucci
    Anonymous Membership Broadcast Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:32, n:1-3, pp:135-151 [Journal]
  12. Barbara Masucci
    Sharing Multiple Secrets: Models, Schemes and Analysis. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:39, n:1, pp:89-111 [Journal]
  13. Carlo Blundo, Stelvio Cimato, Barbara Masucci
    A note on optimal metering schemes. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2002, v:84, n:6, pp:319-326 [Journal]
  14. Stelvio Cimato, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
    Ideal contrast visual cryptography schemes with reversing. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2005, v:93, n:4, pp:199-206 [Journal]
  15. Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
    Cryptographic key assignment schemes for any access control policy. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2004, v:92, n:4, pp:199-205 [Journal]
  16. Alfredo De Santis, Barbara Masucci
    On secret set schemes. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 2000, v:74, n:5-6, pp:243-251 [Journal]
  17. Alfredo De Santis, Barbara Masucci
    A Lower Bound on the Encoding Length in Lossy Transmission. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1999, v:116, n:2-4, pp:129-146 [Journal]
  18. Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
    Enforcing the security of a time-bound hierarchical key assignment scheme. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2006, v:176, n:12, pp:1684-1694 [Journal]
  19. Carlo Blundo, Barbara Masucci
    A Note on the Randomness in Dynamic Threshold Schemes. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1999, v:7, n:1, pp:73-85 [Journal]
  20. Alfredo De Santis, Barbara Masucci
    New results on non-perfect sharing of multiple secrets. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2007, v:80, n:2, pp:216-223 [Journal]
  21. Carlo Blundo, Barbara Masucci
    Randomness in Multi-Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    J. UCS, 1999, v:5, n:7, pp:367-389 [Journal]
  22. Barbara Masucci, Douglas R. Stinson
    Efficient metering schemes with pricing. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2001, v:47, n:7, pp:2835-2844 [Journal]
  23. Alfredo De Santis, Barbara Masucci
    Multiple ramp schemes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1999, v:45, n:5, pp:1720-1728 [Journal]
  24. Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
    Efficient Provably-Secure Hierarchical Key Assignment Schemes. [Citation Graph (0, 0)][DBLP]
    MFCS, 2007, pp:371-382 [Conf]
  25. Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
    New constructions for provably-secure time-bound hierarchical key assignment schemes. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:133-138 [Conf]

  26. Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.305secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002