Cimato Stelvio
Cimato Stelvio
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα unimi.it - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
Probabilistic visual cryptography schemes
S Cimato, R De Prisco, A De Santis
The Computer Journal 49 (1), 97-107, 2006
2192006
Visual cryptography and secret image sharing
S Cimato, CN Yang
CRC press, 2017
1182017
Ideal contrast visual cryptography schemes with reversing
S Cimato, A De Santis, AL Ferrara, B Masucci
Information Processing Letters 93 (4), 199-206, 2005
1182005
Optimal colored threshold visual cryptography schemes
S Cimato, R De Prisco, A De Santis
Designs, Codes and Cryptography 35 (3), 311-335, 2005
1062005
Colored visual cryptography without color darkening
S Cimato, R De Prisco, A De Santis
Theoretical Computer Science 374 (1-3), 261-276, 2007
1052007
Privacy-aware biometrics: Design and implementation of a multimodal verification system
S Cimato, M Gamassi, V Piuri, R Sassi, F Scotti
2008 Annual computer security applications conference (ACSAC), 130-139, 2008
912008
Visual cryptography schemes with optimal pixel expansion
C Blundo, S Cimato, A De Santis
Theoretical Computer Science 369 (1-3), 169-182, 2006
792006
Secure e-coupons
C Blundo, S Cimato, A De Bonis
Electronic Commerce Research 5 (1), 117-139, 2005
672005
Efficient key management for enforcing access control in outsourced scenarios
C Blundo, S Cimato, SDC di Vimercati, A De Santis, S Foresti, ...
IFIP International Information Security Conference, 364-375, 2009
502009
Secure collaborative supply-chain management
F Kerschbaum, A Schröpfer, A Zilli, R Pibernik, O Catrina, S de Hoogh, ...
Computer 44 (9), 38-43, 2011
452011
Overcoming the obfuscation of Java programs by identifier renaming
S Cimato, A De Santis, UF Petrillo
Journal of systems and software 78 (1), 60-72, 2005
412005
Towards the certification of cloud services
S Cimato, E Damiani, F Zavatarelli, R Menicocci
2013 IEEE Ninth World Congress on Services, 92-97, 2013
402013
A simple role mining algorithm
C Blundo, S Cimato
Proceedings of the 2010 ACM Symposium on Applied Computing, 1958-1962, 2010
362010
A multi-biometric verification system for the privacy protection of iris templates
S Cimato, M Gamassi, V Piuri, R Sassi, F Scotti
Proceedings of the International Workshop on Computational Intelligence in …, 2009
362009
AS5: A secure searchable secret sharing scheme for privacy preserving database outsourcing
MA Hadavi, E Damiani, R Jalili, S Cimato, Z Ganjei
Data Privacy Management and Autonomous Spontaneous Security, 201-216, 2012
352012
Toward cloud-based key management for outsourced databases
N Bennani, E Damiani, S Cimato
2010 IEEE 34th Annual Computer Software and Applications Conference …, 2010
312010
Sawm: a tool for secure and authenticated web metering
C Blundo, S Cimato
Proceedings of the 14th international conference on Software engineering and …, 2002
282002
Security and searchability in secret sharing-based data outsourcing
MA Hadavi, R Jalili, E Damiani, S Cimato
International Journal of Information Security 14 (6), 513-529, 2015
252015
Constrained role mining
C Blundo, S Cimato
International Workshop on Security and Trust Management, 289-304, 2012
252012
A lightweight protocol for the generation and distribution of secure e-coupons
C Blundo, S Cimato, A De Bonis
Proceedings of the 11th international conference on World Wide Web, 542-552, 2002
252002
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20