Követés
Giuseppe Ateniese
Giuseppe Ateniese
E-mail megerősítve itt: gmu.edu - Kezdőlap
Cím
Hivatkozott rá
Hivatkozott rá
Év
Provable data possession at untrusted stores
G Ateniese, R Burns, R Curtmola, J Herring, L Kissner, Z Peterson, ...
Proceedings of the 14th ACM conference on Computer and communications …, 2007
41022007
Improved proxy re-encryption schemes with applications to secure distributed storage
G Ateniese, K Fu, M Green, S Hohenberger
ACM Transactions on Information and System Security (TISSEC) 9 (1), 1-30, 2006
21592006
Scalable and efficient provable data possession
G Ateniese, R Di Pietro, LV Mancini, G Tsudik
Proceedings of the 4th international conference on Security and privacy in …, 2008
17932008
Deep models under the GAN: information leakage from collaborative deep learning
B Hitaj, G Ateniese, F Perez-Cruz
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
17282017
A practical and provably secure coalition-resistant group signature scheme
G Ateniese, J Camenisch, M Joye, G Tsudik
Advances in Cryptology—CRYPTO 2000: 20th Annual International Cryptology …, 2000
13162000
Identity-based proxy re-encryption
M Green, G Ateniese
Applied Cryptography and Network Security: 5th International Conference …, 2007
10432007
Visual cryptography for general access structures
G Ateniese, C Blundo, A De Santis, DR Stinson
Information and computation 129 (2), 86-106, 1996
9621996
MR-PDP: Multiple-replica provable data possession
R Curtmola, O Khan, R Burns, G Ateniese
2008 the 28th international conference on distributed computing systems, 411-420, 2008
7632008
Extended capabilities for visual cryptography
G Ateniese, C Blundo, A De Santis, DR Stinson
Theoretical Computer Science 250 (1-2), 143-161, 2001
6702001
Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiers
G Ateniese, LV Mancini, A Spognardi, A Villani, D Vitali, G Felici
International Journal of Security and Networks 10 (3), 137-150, 2015
6182015
VABKS: Verifiable attribute-based keyword search over outsourced encrypted data
Q Zheng, S Xu, G Ateniese
IEEE INFOCOM 2014-IEEE conference on computer communications, 522-530, 2014
6002014
Remote data checking using provable data possession
G Ateniese, R Burns, R Curtmola, J Herring, O Khan, L Kissner, ...
ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-34, 2011
5522011
Redactable blockchain–or–rewriting history in bitcoin and friends
G Ateniese, B Magri, D Venturi, E Andrade
2017 IEEE European symposium on security and privacy (EuroS&P), 111-126, 2017
5362017
Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage
Y Yu, MH Au, G Ateniese, X Huang, W Susilo, Y Dai, G Min
IEEE Transactions on Information Forensics and Security 12 (4), 767-778, 2016
5152016
Proofs of storage from homomorphic identification protocols
G Ateniese, S Kamara, J Katz
International conference on the theory and application of cryptology and …, 2009
5062009
New multiparty authentication services and key agreement protocols
G Ateniese, M Steiner, G Tsudik
IEEE journal on selected areas in communications 18 (4), 628-639, 2000
5002000
Sanitizable signatures
G Ateniese, DH Chou, B De Medeiros, G Tsudik
Computer Security–ESORICS 2005: 10th European Symposium on Research in …, 2005
3742005
Passgan: A deep learning approach for password guessing
B Hitaj, P Gasti, G Ateniese, F Perez-Cruz
Applied Cryptography and Network Security: 17th International Conference …, 2019
3682019
Quasi-efficient revocation of group signatures
G Ateniese, D Song, G Tsudik
Financial Cryptography: 6th International Conference, FC 2002 Southampton …, 2003
3292003
Some open issues and new directions in group signatures
G Ateniese, G Tsudik
Financial Cryptography: Third International Conference, FC’99 Anguilla …, 1999
3161999
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20