Giuseppe Ateniese
Titre
Citée par
Citée par
Année
Provable data possession at untrusted stores
G Ateniese, R Burns, R Curtmola, J Herring, L Kissner, Z Peterson, ...
Proceedings of the 14th ACM conference on Computer and communications …, 2007
29242007
Improved proxy re-encryption schemes with applications to secure distributed storage
G Ateniese, K Fu, M Green, S Hohenberger
ACM Transactions on Information and System Security (TISSEC) 9 (1), 1-30, 2006
16242006
Scalable and efficient provable data possession
G Ateniese, R Di Pietro, LV Mancini, G Tsudik
Proceedings of the 4th international conference on Security and privacy in …, 2008
13362008
A practical and provably secure coalition-resistant group signature scheme
G Ateniese, J Camenisch, M Joye, G Tsudik
Annual International Cryptology Conference, 255-270, 2000
11762000
Visual cryptography for general access structures
G Ateniese, C Blundo, A De Santis, DR Stinson
Information and computation 129 (2), 86-106, 1996
8401996
Identity-based proxy re-encryption
M Green, G Ateniese
International Conference on Applied Cryptography and Network Security, 288-306, 2007
7772007
Extended capabilities for visual cryptography
G Ateniese, C Blundo, A De Santis, DR Stinson
Theoretical Computer Science 250 (1-2), 143-161, 2001
5642001
MR-PDP: Multiple-replica provable data possession
R Curtmola, O Khan, R Burns, G Ateniese
2008 the 28th international conference on distributed computing systems, 411-420, 2008
5552008
New multiparty authentication services and key agreement protocols
G Ateniese, M Steiner, G Tsudik
IEEE journal on selected areas in communications 18 (4), 628-639, 2000
4602000
Remote data checking using provable data possession
G Ateniese, R Burns, R Curtmola, J Herring, O Khan, L Kissner, ...
ACM Transactions on Information and System Security (TISSEC) 14 (1), 1-34, 2011
4152011
Proofs of storage from homomorphic identification protocols
G Ateniese, S Kamara, J Katz
International conference on the theory and application of cryptology and …, 2009
4142009
Deep models under the GAN: information leakage from collaborative deep learning
B Hitaj, G Ateniese, F Perez-Cruz
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
3082017
VABKS: verifiable attribute-based keyword search over outsourced encrypted data
Q Zheng, S Xu, G Ateniese
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 522-530, 2014
3022014
Quasi-efficient revocation of group signatures
G Ateniese, D Song, G Tsudik
International Conference on Financial Cryptography, 183-197, 2002
2912002
Some open issues and new directions in group signatures
G Ateniese, G Tsudik
International Conference on Financial Cryptography, 196-211, 1999
2811999
Authenticated group key agreement and friends
G Ateniese, M Steiner, G Tsudik
Proceedings of the 5th ACM Conference on Computer and Communications …, 1998
2741998
Sanitizable signatures
G Ateniese, DH Chou, B De Medeiros, G Tsudik
European Symposium on Research in Computer Security, 159-177, 2005
2542005
Remote data checking for network coding-based distributed storage systems
B Chen, R Curtmola, G Ateniese, R Burns
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 31-42, 2010
2482010
Efficient verifiable encryption (and fair exchange) of digital signatures
G Ateniese
Proceedings of the 6th ACM conference on Computer and communications …, 1999
2231999
Key-private proxy re-encryption
G Ateniese, K Benson, S Hohenberger
Cryptographers’ Track at the RSA Conference, 279-294, 2009
2142009
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20