|
Search the dblp DataBase
Barbara Masucci:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Stelvio Cimato, Clemente Galdi, Raffaella Giordano, Barbara Masucci, Gildo Tomasco
Design and Implementation of an Inline Certified E-mail Service. [Citation Graph (0, 0)][DBLP] CANS, 2005, pp:186-199 [Conf]
- Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
Provably-secure time-bound hierarchical key assignment schemes. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2006, pp:288-297 [Conf]
- Barbara Masucci, Douglas R. Stinson
Metering Schemes for General Access Structures. [Citation Graph (0, 0)][DBLP] ESORICS, 2000, pp:72-87 [Conf]
- Anna Lisa Ferrara, Barbara Masucci
An Information-Theoretic Approach to the Access Control Problem. [Citation Graph (0, 0)][DBLP] ICTCS, 2003, pp:342-354 [Conf]
- Carlo Blundo, Annalisa De Bonis, Barbara Masucci, Douglas R. Stinson
Dynamic Multi-threshold Metering Schemes. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2000, pp:130-143 [Conf]
- Carlo Blundo, Annalisa De Bonis, Barbara Masucci
Metering Schemes with Pricing. [Citation Graph (0, 0)][DBLP] DISC, 2000, pp:194-208 [Conf]
- Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy. [Citation Graph (0, 0)][DBLP] WCC, 2005, pp:202-217 [Conf]
- Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
Unconditionally secure key assignment schemes. [Citation Graph (0, 0)][DBLP] Discrete Applied Mathematics, 2006, v:154, n:2, pp:234-252 [Journal]
- Carlo Blundo, Sebastià Martín Molleví, Barbara Masucci, Carles Padró
A Linear Algebraic Approach to Metering Schemes. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2004, v:33, n:3, pp:241-260 [Journal]
- Carlo Blundo, Barbara Masucci, Douglas R. Stinson, Ruizhong Wei
Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2002, v:26, n:1-3, pp:97-110 [Journal]
- Alfredo De Santis, Barbara Masucci
Anonymous Membership Broadcast Schemes. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2004, v:32, n:1-3, pp:135-151 [Journal]
- Barbara Masucci
Sharing Multiple Secrets: Models, Schemes and Analysis. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2006, v:39, n:1, pp:89-111 [Journal]
- Carlo Blundo, Stelvio Cimato, Barbara Masucci
A note on optimal metering schemes. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 2002, v:84, n:6, pp:319-326 [Journal]
- Stelvio Cimato, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
Ideal contrast visual cryptography schemes with reversing. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 2005, v:93, n:4, pp:199-206 [Journal]
- Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
Cryptographic key assignment schemes for any access control policy. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 2004, v:92, n:4, pp:199-205 [Journal]
- Alfredo De Santis, Barbara Masucci
On secret set schemes. [Citation Graph (0, 0)][DBLP] Inf. Process. Lett., 2000, v:74, n:5-6, pp:243-251 [Journal]
- Alfredo De Santis, Barbara Masucci
A Lower Bound on the Encoding Length in Lossy Transmission. [Citation Graph (0, 0)][DBLP] Inf. Sci., 1999, v:116, n:2-4, pp:129-146 [Journal]
- Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
Enforcing the security of a time-bound hierarchical key assignment scheme. [Citation Graph (0, 0)][DBLP] Inf. Sci., 2006, v:176, n:12, pp:1684-1694 [Journal]
- Carlo Blundo, Barbara Masucci
A Note on the Randomness in Dynamic Threshold Schemes. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 1999, v:7, n:1, pp:73-85 [Journal]
- Alfredo De Santis, Barbara Masucci
New results on non-perfect sharing of multiple secrets. [Citation Graph (0, 0)][DBLP] Journal of Systems and Software, 2007, v:80, n:2, pp:216-223 [Journal]
- Carlo Blundo, Barbara Masucci
Randomness in Multi-Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP] J. UCS, 1999, v:5, n:7, pp:367-389 [Journal]
- Barbara Masucci, Douglas R. Stinson
Efficient metering schemes with pricing. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 2001, v:47, n:7, pp:2835-2844 [Journal]
- Alfredo De Santis, Barbara Masucci
Multiple ramp schemes. [Citation Graph (0, 0)][DBLP] IEEE Transactions on Information Theory, 1999, v:45, n:5, pp:1720-1728 [Journal]
- Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
Efficient Provably-Secure Hierarchical Key Assignment Schemes. [Citation Graph (0, 0)][DBLP] MFCS, 2007, pp:371-382 [Conf]
- Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
New constructions for provably-secure time-bound hierarchical key assignment schemes. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:133-138 [Conf]
Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.305secs
|