dblp.uni-trier.dewww.uni-trier.de

Giuseppe Ateniese Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo

*2009
38EEGiuseppe Ateniese, Karyn Benson, Susan Hohenberger: Key-Private Proxy Re-encryption. CT-RSA 2009: 279-294
37EEGiuseppe Ateniese, Paolo Gasti: Universally Anonymous IBE Based on the Quadratic Residuosity Assumption. CT-RSA 2009: 32-47
36EEGiuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik: Remarks on ''Analysis of one popular group signature scheme'' in Asiacrypt 2006. IJACT 1(4): 320-322 (2009)
2008
35EEReza Curtmola, Osama Khan, Randal C. Burns, Giuseppe Ateniese: MR-PDP: Multiple-Replica Provable Data Possession. ICDCS 2008: 411-420
2007
34EEGiuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, Dawn Xiaodong Song: Provable data possession at untrusted stores. ACM Conference on Computer and Communications Security 2007: 598-609
33EEMatthew Green, Giuseppe Ateniese: Identity-Based Proxy Re-encryption. ACNS 2007: 288-306
32EEGiuseppe Ateniese, Jonathan Kirsch, Marina Blanton: Secret Handshakes with Dynamic and Fuzzy Matching. NDSS 2007
2006
31EEGiuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci: Provably-secure time-bound hierarchical key assignment schemes. ACM Conference on Computer and Communications Security 2006: 288-297
30EEGiuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1): 1-30 (2006)
29EEGiuseppe Ateniese, Chris Riley, Christian Scheideler: Survivable Monitoring in Dynamic Networks. IEEE Trans. Mob. Comput. 5(9): 1242-1254 (2006)
2005
28EEGiuseppe Ateniese, Susan Hohenberger: Proxy re-signatures: new definitions, algorithms, and applications. ACM Conference on Computer and Communications Security 2005: 310-319
27EEGiuseppe Ateniese, Jan Camenisch, Breno de Medeiros: Untraceable RFID tags via insubvertible encryption. ACM Conference on Computer and Communications Security 2005: 92-101
26EEReza Curtmola, Aniello Del Sorbo, Giuseppe Ateniese: On the Performance and Analysis of DNS Security Extensions. CANS 2005: 288-303
25EEGiuseppe Ateniese, Daniel H. Chou, Breno de Medeiros, Gene Tsudik: Sanitizable Signatures. ESORICS 2005: 159-177
24EEGiuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger: Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. NDSS 2005
23EERandal C. Burns, Zachary N. J. Peterson, Giuseppe Ateniese, Stephen Bono: Verifiable audit trails for a versioning file system. StorageSS 2005: 44-50
2004
22EEGiuseppe Ateniese, Breno de Medeiros: Identity-Based Chameleon Hash and Applications. Financial Cryptography 2004: 164-180
21EEGiuseppe Ateniese, Chris Riley, Christian Scheideler: Survivable Monitoring in Dynamic Networks. IWIA 2004: 33-47
20EEGiuseppe Ateniese, Breno de Medeiros: On the Key Exposure Problem in Chameleon Hashes. SCN 2004: 165-179
19EEGiuseppe Ateniese: Verifiable encryption of digital signatures and applications. ACM Trans. Inf. Syst. Secur. 7(1): 1-20 (2004)
2003
18EEGiuseppe Ateniese, Breno de Medeiros: Efficient Group Signatures without Trapdoors. ASIACRYPT 2003: 246-268
2002
17EEGiuseppe Ateniese, Cristina Nita-Rotaru: Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption. CT-RSA 2002: 182-199
16EEGiuseppe Ateniese, Dawn Xiaodong Song, Gene Tsudik: Quasi-Efficient Revocation in Group Signatures. Financial Cryptography 2002: 183-197
15EEGiuseppe Ateniese, Reza Curtmola, Breno de Medeiros, Darren Davis: Medical Information Privacy Assurance: Cryptographic and System Aspects. SCN 2002: 199-218
14EEGiuseppe Ateniese, Breno de Medeiros: Anonymous E-prescriptions. WPES 2002: 19-31
2001
13EEGiuseppe Ateniese, Stefan Mangard: A new approach to DNS security (DNSSEC). ACM Conference on Computer and Communications Security 2001: 86-95
12EEGiuseppe Ateniese, Breno de Medeiros, Michael T. Goodrich: TRICERT: A Distributed Certified E-Mail Scheme. NDSS 2001
11EEGiuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson: Extended capabilities for visual cryptography. Theor. Comput. Sci. 250(1-2): 143-161 (2001)
2000
10EEGiuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik: A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. CRYPTO 2000: 255-270
9EEJonathan Robert Stanton, Yair Amir, Damian Hasse, Giuseppe Ateniese, Yongdae Kim, Cristina Nita-Rotaru, Theo Schlossnagle, John L. Schultz, Gene Tsudik: Secure Group Communication in Asynchronous Networks with Failures: Integration and Experiments. ICDCS 2000: 330-343
1999
8EEGiuseppe Ateniese: Efficient Verifiable Encryption (and Fair Exchange) of Digital Signatures. ACM Conference on Computer and Communications Security 1999: 138-146
7EEGiuseppe Ateniese, Gene Tsudik: Some Open Issues and New Directions in Group Signatures. Financial Cryptography 1999: 196-211
6EEGiuseppe Ateniese, Gene Tsudik: Group Signatures Á la carte. SODA 1999: 848-849
5EEGiuseppe Ateniese, Amir Herzberg, Hugo Krawczyk, Gene Tsudik: Untraceable mobility or how to travel incognito. Computer Networks 31(8): 871-884 (1999)
1998
4EEGiuseppe Ateniese, Michael Steiner, Gene Tsudik: Authenticated Group Key Agreement and Friends. ACM Conference on Computer and Communications Security 1998: 17-26
1996
3EEGiuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson: Constructions and Bounds for Visual Cryptography. ICALP 1996: 416-428
2EEGiuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson: Visual Cryptography for General Access Structures Electronic Colloquium on Computational Complexity (ECCC) 3(12): (1996)
1 Giuseppe Ateniese, Carlo Blundo, Alfredo De Santis, Douglas R. Stinson: Visual Cryptography for General Access Structures. Inf. Comput. 129(2): 86-106 (1996)

Coauthor Index

1Yair Amir [9]
2Karyn Benson [38]
3Marina Blanton (Marina Bykova) [32]
4Carlo Blundo [1] [2] [3] [11]
5Stephen Bono [23]
6Randal C. Burns [23] [34] [35]
7Jan Camenisch [10] [27] [36]
8Daniel H. Chou [25]
9Reza Curtmola [15] [26] [34] [35]
10Darren Davis [15]
11Anna Lisa Ferrara [31]
12Kevin Fu [24] [30]
13Paolo Gasti [37]
14Michael T. Goodrich [12]
15Matthew Green [24] [30] [33]
16Damian Hasse [9]
17Joseph Herring [34]
18Amir Herzberg [5]
19Susan Hohenberger [24] [28] [30] [38]
20Marc Joye [10] [36]
21Osama Khan [35]
22Yongdae Kim [9]
23Jonathan Kirsch [32]
24Lea Kissner [34]
25Hugo Krawczyk [5]
26Stefan Mangard [13]
27Barbara Masucci [31]
28Breno de Medeiros [12] [14] [15] [18] [20] [22] [25] [27]
29Cristina Nita-Rotaru [9] [17]
30Zachary N. J. Peterson [23] [34]
31Chris Riley [21] [29]
32Alfredo De Santis [1] [2] [3] [11] [31]
33Christian Scheideler [21] [29]
34Theo Schlossnagle [9]
35John L. Schultz [9]
36Dawn Xiaodong Song (Dawn Song) [16] [34]
37Aniello Del Sorbo [26]
38Jonathan Robert Stanton [9]
39Michael Steiner [4]
40Douglas R. Stinson [1] [2] [3] [11]
41Gene Tsudik [4] [5] [6] [7] [9] [10] [16] [25] [36]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)