Probabilistic visual cryptography schemes S Cimato, R De Prisco, A De Santis The Computer Journal 49 (1), 97-107, 2006 | 247 | 2006 |
Ideal contrast visual cryptography schemes with reversing S Cimato, A De Santis, AL Ferrara, B Masucci Information Processing Letters 93 (4), 199-206, 2005 | 144 | 2005 |
Visual cryptography and secret image sharing S Cimato, CN Yang CRC press, 2011 | 138 | 2011 |
Colored visual cryptography without color darkening S Cimato, R De Prisco, A De Santis Theoretical Computer Science 374 (1-3), 261-276, 2007 | 115 | 2007 |
Optimal colored threshold visual cryptography schemes S Cimato, RD Prisco, AD Santis Designs, Codes and Cryptography 35, 311-335, 2005 | 114 | 2005 |
Privacy-aware biometrics: Design and implementation of a multimodal verification system S Cimato, M Gamassi, V Piuri, R Sassi, F Scotti 2008 Annual computer security applications conference (ACSAC), 130-139, 2008 | 97 | 2008 |
Visual cryptography schemes with optimal pixel expansion C Blundo, S Cimato, A De Santis Theoretical Computer Science 369 (1-3), 169-182, 2006 | 91 | 2006 |
Secure e-coupons C Blundo, S Cimato, A De Bonis Electronic Commerce Research 5, 117-139, 2005 | 73 | 2005 |
Secure collaborative supply-chain management F Kerschbaum, A Schröpfer, A Zilli, R Pibernik, O Catrina, S De Hoogh, ... Computer 44 (9), 38-43, 2011 | 65 | 2011 |
Designing smart-contract based auctions C Braghin, S Cimato, E Damiani, M Baronchelli Security with Intelligent Computing and Big-data Services: Proceedings of …, 2020 | 51 | 2020 |
Overcoming the obfuscation of Java programs by identifier renaming S Cimato, A De Santis, UF Petrillo Journal of systems and software 78 (1), 60-72, 2005 | 51 | 2005 |
Efficient key management for enforcing access control in outsourced scenarios C Blundo, S Cimato, S De Capitani di Vimercati, A De Santis, S Foresti, ... Emerging Challenges for Security, Privacy and Trust: 24th IFIP TC 11 …, 2009 | 50 | 2009 |
Towards the certification of cloud services S Cimato, E Damiani, F Zavatarelli, R Menicocci 2013 IEEE Ninth World Congress on Services, 92-97, 2013 | 46 | 2013 |
A simple role mining algorithm C Blundo, S Cimato Proceedings of the 2010 ACM Symposium on Applied Computing, 1958-1962, 2010 | 46 | 2010 |
A multi-biometric verification system for the privacy protection of iris templates S Cimato, M Gamassi, V Piuri, R Sassi, F Scotti Proceedings of the International Workshop on Computational Intelligence in …, 2009 | 42 | 2009 |
AS5: A secure searchable secret sharing scheme for privacy preserving database outsourcing MA Hadavi, E Damiani, R Jalili, S Cimato, Z Ganjei International Workshop on Data Privacy Management, 201-216, 2012 | 39 | 2012 |
Security and searchability in secret sharing-based data outsourcing MA Hadavi, R Jalili, E Damiani, S Cimato International Journal of Information Security 14, 513-529, 2015 | 37 | 2015 |
Constrained role mining C Blundo, S Cimato International Workshop on Security and Trust Management, 289-304, 2012 | 34 | 2012 |
A Comparative Analysis of Current Cryptocurrencies. L Mauri, S Cimato, E Damiani ICISSP, 127-138, 2018 | 31 | 2018 |
Toward cloud-based key management for outsourced databases N Bennani, E Damiani, S Cimato 2010 IEEE 34th Annual Computer Software and Applications Conference …, 2010 | 31 | 2010 |