Anonymous Identification in Ad Hoc Groups Y Dodis, A Kiayias, A Nicolosi, V Shoup
Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004
359 2004 Verifying and enforcing network paths with ICING J Naous, M Walfish, A Nicolosi, D Mazieres, M Miller, A Seehra
Proceedings of the Seventh Conference on Emerging Networking Experiments and …, 2011
181 2011 Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics): Preface M Abe, K Aoki, G Ateniese, R Avanzi, Z Beerliová, O Billet, A Biryukov, ...
Lecture Notes in Computer Science (including subseries Lecture Notes in …, 2006
122 2006 Proactive Two-Party Signatures for User Authentication. A Nicolosi, MN Krohn, Y Dodis, D Mazieres
NDSS, 2003
93 2003 The nebula future internet architecture T Anderson, K Birman, R Broberg, M Caesar, D Comer, C Cotton, ...
The Future Internet: Future Internet Assembly 2013: Validated Results and …, 2013
88 2013 Non-interactive zero-knowledge from homomorphic encryption I Damgård, N Fazio, A Nicolosi
Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006 …, 2006
79 2006 Cryptographic accumulators: Definitions, constructions and applications N Fazio, A Nicolosi
Paper written for course at New York University: www. cs. nyu. edu/nicolosi …, 2002
62 2002 P2PCast: A peer-to-peer multicast scheme for streaming data A Nicolosi, S Annapureddy
Proceedings of First IRIS Student Workshop August, 2003
55 2003 Efficient Private Techniques for Verifying Social Proximity. MJ Freedman, A Nicolosi
IPTPS 5, 1, 2007
43 2007 A brief overview of the NEBULA future internet architecture T Anderson, K Birman, R Broberg, M Caesar, D Comer, C Cotton, ...
ACM SIGCOMM Computer Communication Review 44 (3), 81-86, 2014
37 2014 A Policy Framework for the Future Internet. A Seehra, J Naous, M Walfish, D Mazieres, A Nicolosi, S Shenker
Hotnets, 2009
34 2009 Traitor tracing with optimal transmission rate N Fazio, A Nicolosi, DH Phan
Information Security: 10th International Conference, ISC 2007, Valparaíso …, 2007
30 2007 Efficient bounded distance decoders for Barnes-Wall lattices D Micciancio, A Nicolosi
2008 IEEE International Symposium on Information Theory, 2484-2488, 2008
29 2008 Nebula-a future internet that supports trustworthy cloud computing T Anderson, K Birman, R Broberg, M Caesar, D Comer, C Cotton, ...
White Paper, 1-31, 2010
28 2010 : An HB-like protocol secure against man-in-the-middle attacksC Bosley, K Haralambiev, A Nicolosi
Cryptology ePrint Archive, 2011
26 2011 Broadcast steganography N Fazio, AR Nicolosi, IM Perera
Topics in Cryptology–CT-RSA 2014: The Cryptographer’s Track at the RSA …, 2014
23 2014 Secure acknowledgment of multicast messages in open peer-to-peer networks A Nicolosi, D Mazieres
Peer-to-Peer Systems III: Third International Workshop, IPTPS 2004, La Jolla …, 2005
21 2005 Learning potential in mathematics through imagination and manipulation of building blocks C Pirrone, A Nicolosi, A Passanisi, S Di Nuovo
Mediterranean Journal of Social Sciences 6 (4), 152-159, 2015
20 2015 A poroplastic model for hygro-chemo-mechanical damage of concrete M Cuomo, A Nicolosi
Computational Modelling of Concrete Structures, 533-542, 2020
16 2020 Public Key Cryptography--PKC 2011: 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011, Proceedings D Catalano, N Fazio, R Gennaro, A Nicolosi
Springer Science & Business Media, 2011
16 * 2011