Universally Anonymous IBE based on the Quadratic Residuosity Assumption.

Giuseppe Ateniese , Paolo Gasti
IACR Cryptology ePrint Archive 2009 280

2009
Proxy Re-Signatures: New Definitions, Algorithms, and Applications.

Giuseppe Ateniese , Susan Hohenberger
IACR Cryptology ePrint Archive 2005 433

230
2005
Practical Group Signatures without Random Oracles.

Giuseppe Ateniese , Jan Camenisch , Breno de Medeiros , Susan Hohenberger
IACR Cryptology ePrint Archive 2005 385

114
2005
Proof of Storage-Time: Efficiently Checking Continuous Data Availability.

Giuseppe Ateniese , Qiang Tang , Mohammad Etemad , Long Chen
IACR Cryptology ePrint Archive 2020 840

2020
Reducing Bias in Modeling Real-world Password Strength via Deep Learning and Dynamic Dictionaries

Giuseppe Ateniese , Marco Cianfriglia , Dario Pasquini , Massimo Bernaschi
arXiv: Cryptography and Security

18
2020
Unleashing the Tiger: Inference Attacks on Split Learning.

Giuseppe Ateniese , Dario Pasquini , Massimo Bernaschi
arXiv: Cryptography and Security

39
2020
Immunization against complete subversion without random oracles

Giuseppe Ateniese , Daniele Venturi , Bernardo Magri , Danilo Francati
Theoretical Computer Science 859 1 -36

2021
Nearly Optimal Verifiable Data Streaming

Giuseppe Ateniese , Dario Fiore , Mark Simkin , Dominique Schröder

31
2016
Verifiable Capacity-bound Functions: A New Primitive from Kolmogorov Complexity.

Giuseppe Ateniese , Qiang Tang , Dimitrios Papadopoulos , Long Chen
IACR Cryptology ePrint Archive 2021 162

2021
HELIOS: Outsourcing of Security Operations in Green Wireless Sensor Networks

Giuseppe Ateniese , Giuseppe Bianchi , Angelo T. Capossele , Chiara Petrioli
2017 IEEE 85th Vehicular Technology Conference (VTC Spring) 1 -7

2
2017
A note on time-bound hierarchical key assignment schemes

Giuseppe Ateniese , Alfredo De Santis , Anna Lisa Ferrara , Barbara Masucci
Information Processing Letters 113 ( 5) 151 -155

9
2013
Remote data checking using provable data possession

Giuseppe Ateniese , Randal Burns , Reza Curtmola , Joseph Herring
ACM Transactions on Information and System Security 14 ( 1) 12

503
2011
Efficient group signatures without trapdoors

Giuseppe Ateniese , Breno de Medeiros
international conference on the theory and application of cryptology and information security 2894 246 -268

75
2003
Is AI Taking Over the World? No, but It's Making it Less Private

Giuseppe Ateniese
international workshop on security 1

2020
Verifiable encryption of digital signatures and applications

Giuseppe Ateniese
ACM Transactions on Information and System Security 7 ( 1) 1 -20

94
2004
Identity-Based Remote Data Integrity Checking With Perfect Data Privacy Preserving for Cloud Storage

Yong Yu , Man Ho Au , Giuseppe Ateniese , Xinyi Huang
IEEE Transactions on Information Forensics and Security 12 ( 4) 767 -778

409
2017
Entangled Encodings and Data Entanglement

Giuseppe Ateniese , Özgür Dagdelen , Ivan Damgård , Daniele Venturi
international workshop on security 3 -12

3
2015
Authenticated group key agreement and friends

Giuseppe Ateniese , Michael Steiner , Gene Tsudik
computer and communications security 17 -26

172
1998
Constructions and Bounds for Visual Cryptography

Giuseppe Ateniese , Carlo Blundo , Alfrede Santis , Douglas R. Stinson
international colloquium on automata languages and programming 416 -428

107
1996
From Pretty Good to Great: Enhancing PGP Using Bitcoin and the Blockchain

Duane Wilson , Giuseppe Ateniese
Network and System Security 368 -375

48
2015