Barbara Masucci
Barbara Masucci
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα dia.unisa.it - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Provably-secure time-bound hierarchical key assignment schemes
G Ateniese, A De Santis, AL Ferrara, B Masucci
Journal of cryptology 25 (2), 243-270, 2012
1892012
Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface
M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
173*2006
Ideal contrast visual cryptography schemes with reversing
S Cimato, A De Santis, AL Ferrara, B Masucci
Information Processing Letters 93 (4), 199-206, 2005
1182005
Multiple ramp schemes
A De Santis, B Masucci
IEEE Transactions on Information Theory 45 (5), 1720-1728, 1999
641999
Hierarchical and shared access control
A Castiglione, A De Santis, B Masucci, F Palmieri, A Castiglione, J Li, ...
IEEE Transactions on Information Forensics and Security 11 (4), 850-865, 2015
622015
Efficient provably-secure hierarchical key assignment schemes
A De Santis, AL Ferrara, B Masucci
International Symposium on Mathematical Foundations of Computer Science, 371-382, 2007
61*2007
Cryptographic key assignment schemes for any access control policy
A De Santis, AL Ferrara, B Masucci
Information Processing Letters 92 (4), 199-205, 2004
582004
Cryptographic hierarchical access control for dynamic structures
A Castiglione, A De Santis, B Masucci, F Palmieri, A Castiglione, X Huang
IEEE Transactions on Information Forensics and Security 11 (10), 2349-2364, 2016
532016
Visual cryptography schemes with reversing
CN Yang, CC Wang, TS Chen
The Computer Journal 51 (6), 710-722, 2008
502008
New constructions for provably-secure time-bound hierarchical key assignment schemes
A De Santis, AL Ferrara, B Masucci
Theoretical Computer Science 407 (1-3), 213-230, 2008
492008
Enforcing the security of a time-bound hierarchical key assignment scheme
A De Santis, AL Ferrara, B Masucci
Information Sciences 176 (12), 1684-1694, 2006
452006
Constructions and bounds for unconditionally secure non-interactive commitment schemes
C Blundo, B Masucci, DR Stinson, R Wei
Designs, Codes and Cryptography 26 (1), 97-110, 2002
452002
Key indistinguishability versus strong key indistinguishability for hierarchical key assignment schemes
A Castiglione, A De Santis, B Masucci
IEEE Transactions on Dependable and Secure Computing 13 (4), 451-460, 2015
372015
Metering schemes for general access structures
B Masucci, DR Stinson
European Symposium on Research in Computer Security, 72-87, 2000
372000
Unconditionally secure key assignment schemes
A De Santis, AL Ferrara, B Masucci
Discrete applied mathematics 154 (2), 234-252, 2006
362006
Variations on a theme by Akl and Taylor: Security and tradeoffs
P D’Arco, A De Santis, AL Ferrara, B Masucci
Theoretical Computer Science 411 (1), 213-227, 2010
302010
Supporting dynamic updates in storage clouds with the Akl–Taylor scheme
A Castiglione, A De Santis, B Masucci, F Palmieri, X Huang, A Castiglione
Information Sciences 387, 56-74, 2017
292017
Efficient metering schemes with pricing
B Masucci, DR Stinson
IEEE Transactions on Information Theory 47 (7), 2835-2844, 2001
292001
Hierarchical and shared key assignment
A Castiglione, A De Santis, B Masucci
2014 17th International Conference on Network-Based Information Systems, 263-270, 2014
262014
On-board format-independent security of functional magnetic resonance images
A Castiglione, R Pizzolante, F Palmieri, B Masucci, B Carpentieri, ...
ACM Transactions on Embedded Computing Systems (TECS) 16 (2), 1-15, 2017
252017
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20