Volgen
Antonio Nicolosi
Antonio Nicolosi
Geverifieerd e-mailadres voor cs.stevens.edu
Titel
Geciteerd door
Geciteerd door
Jaar
Anonymous Identification in Ad Hoc Groups
Y Dodis, A Kiayias, A Nicolosi, V Shoup
Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004
3782004
Verifying and enforcing network paths with ICING
J Naous, M Walfish, A Nicolosi, D Mazieres, M Miller, A Seehra
Proceedings of the Seventh Conference on Emerging Networking Experiments and …, 2011
1902011
Proactive Two-Party Signatures for User Authentication.
A Nicolosi, MN Krohn, Y Dodis, D Mazieres
NDSS, 2003
992003
The nebula future internet architecture
T Anderson, K Birman, R Broberg, M Caesar, D Comer, C Cotton, ...
The Future Internet: Future Internet Assembly 2013: Validated Results and …, 2013
922013
Non-interactive zero-knowledge from homomorphic encryption
I Damgård, N Fazio, A Nicolosi
Theory of Cryptography Conference, 41-59, 2006
852006
Cryptographic accumulators: Definitions, constructions and applications
N Fazio, A Nicolosi
Paper written for course at New York University: www. cs. nyu. edu/nicolosi …, 2002
642002
P2PCast: A peer-to-peer multicast scheme for streaming data
A Nicolosi, S Annapureddy
Proceedings of First IRIS Student Workshop August, 2003
532003
Efficient Private Techniques for Verifying Social Proximity.
MJ Freedman, A Nicolosi
IPTPS 5, 1, 2007
442007
A brief overview of the NEBULA future internet architecture
T Anderson, K Birman, R Broberg, M Caesar, D Comer, C Cotton, ...
ACM SIGCOMM Computer Communication Review 44 (3), 81-86, 2014
402014
A Policy Framework for the Future Internet.
A Seehra, J Naous, M Walfish, D Mazieres, A Nicolosi, S Shenker
Hotnets, 2009
352009
Traitor tracing with optimal transmission rate
N Fazio, A Nicolosi, DH Phan
International Conference on Information Security, 71-88, 2007
332007
Efficient bounded distance decoders for Barnes-Wall lattices
D Micciancio, A Nicolosi
2008 IEEE International Symposium on Information Theory, 2484-2488, 2008
312008
Nebula-a future internet that supports trustworthy cloud computing
T Anderson, K Birman, R Broberg, M Caesar, D Comer, C Cotton, ...
White Paper, 1-31, 2010
292010
: An HB-like protocol secure against man-in-the-middle attacks
C Bosley, K Haralambiev, A Nicolosi
Cryptology ePrint Archive, 2011
262011
Broadcast steganography
N Fazio, AR Nicolosi, IM Perera
Topics in Cryptology–CT-RSA 2014: The Cryptographer’s Track at the RSA …, 2014
232014
Learning potential in mathematics through imagination and manipulation of building blocks
C Pirrone, A Nicolosi, A Passanisi, S Di Nuovo
Mediterranean Journal of Social Sciences 6 (4), 152-159, 2015
222015
Secure acknowledgment of multicast messages in open peer-to-peer networks
A Nicolosi, D Mazieres
Peer-to-Peer Systems III: Third International Workshop, IPTPS 2004, La Jolla …, 2005
212005
Public Key Cryptography--PKC 2011: 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011, Proceedings
D Catalano, N Fazio, R Gennaro, A Nicolosi
Springer Science & Business Media, 2011
182011
Generalized learning problems and applications to non-commutative cryptography
G Baumslag, N Fazio, AR Nicolosi, V Shpilrain, WE Skeith III
International Conference on Provable Security, 324-339, 2011
172011
Hardness of learning problems over burnside groups of exponent 3
N Fazio, K Iga, AR Nicolosi, L Perret, WE Skeith
Designs, Codes and Cryptography 75, 59-70, 2015
92015
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20