Anonymous Identification in Ad Hoc Groups Y Dodis, A Kiayias, A Nicolosi, V Shoup
Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004
371 2004 Verifying and enforcing network paths with ICING J Naous, M Walfish, A Nicolosi, D Mazieres, M Miller, A Seehra
Proceedings of the Seventh Conference on Emerging Networking Experiments and …, 2011
191 2011 Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
113 2006 Proactive Two-Party Signatures for User Authentication. A Nicolosi, MN Krohn, Y Dodis, D Mazieres
NDSS, 2003
99 2003 The nebula future internet architecture T Anderson, K Birman, R Broberg, M Caesar, D Comer, C Cotton, ...
The Future Internet: Future Internet Assembly 2013: Validated Results and …, 2013
92 2013 Non-interactive zero-knowledge from homomorphic encryption I Damgård, N Fazio, A Nicolosi
Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006 …, 2006
84 2006 Cryptographic accumulators: Definitions, constructions and applications N Fazio, A Nicolosi
Paper written for course at New York University: www. cs. nyu. edu/nicolosi …, 2002
63 2002 P2PCast: A peer-to-peer multicast scheme for streaming data A Nicolosi, S Annapureddy
Proceedings of First IRIS Student Workshop August, 2003
53 2003 Efficient Private Techniques for Verifying Social Proximity. MJ Freedman, A Nicolosi
IPTPS 5, 1, 2007
44 2007 A brief overview of the NEBULA future internet architecture T Anderson, K Birman, R Broberg, M Caesar, D Comer, C Cotton, ...
ACM SIGCOMM Computer Communication Review 44 (3), 81-86, 2014
40 2014 A Policy Framework for the Future Internet. A Seehra, J Naous, M Walfish, D Mazieres, A Nicolosi, S Shenker
Hotnets, 2009
34 2009 Traitor tracing with optimal transmission rate N Fazio, A Nicolosi, DH Phan
Information Security: 10th International Conference, ISC 2007, Valparaíso …, 2007
32 2007 Efficient bounded distance decoders for Barnes-Wall lattices D Micciancio, A Nicolosi
2008 IEEE International Symposium on Information Theory, 2484-2488, 2008
30 2008 Nebula-a future internet that supports trustworthy cloud computing T Anderson, K Birman, R Broberg, M Caesar, D Comer, C Cotton, ...
White Paper, 1-31, 2010
29 2010 : An HB-like protocol secure against man-in-the-middle attacksC Bosley, K Haralambiev, A Nicolosi
Cryptology ePrint Archive, 2011
26 2011 Broadcast steganography N Fazio, AR Nicolosi, IM Perera
Topics in Cryptology–CT-RSA 2014: The Cryptographer’s Track at the RSA …, 2014
23 2014 Secure acknowledgment of multicast messages in open peer-to-peer networks A Nicolosi, D Mazieres
Peer-to-Peer Systems III: Third International Workshop, IPTPS 2004, La Jolla …, 2005
21 2005 Learning potential in mathematics through imagination and manipulation of building blocks C Pirrone, A Nicolosi, A Passanisi, S Di Nuovo
Mediterranean Journal of Social Sciences 6 (4), 152-159, 2015
20 2015 Public Key Cryptography--PKC 2011: 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011, Proceedings D Catalano, N Fazio, R Gennaro, A Nicolosi
Springer Science & Business Media, 2011
17 * 2011 Generalized learning problems and applications to non-commutative cryptography G Baumslag, N Fazio, AR Nicolosi, V Shpilrain, WE Skeith
Provable Security: 5th International Conference, ProvSec 2011, Xi’an, China …, 2011
17 2011