Остановите войну!
for scientists:
default search action
Stelvio Cimato
- > Home > Persons > Stelvio Cimato
Publications
- 2021
- [c70]Emanuele Bellini, Stelvio Cimato, Ernesto Damiani, Beniamino Di Martino, Antonio Esposito:
Towards a Trustworthy Semantic-Aware Marketplace for Interoperable Cloud Services. CISIS 2021: 606-615 - 2020
- [j21]Stelvio Cimato, Gabriele Gianini, Maryam Sepehri, Rasool Asal, Ernesto Damiani:
A cryptographic cloud-based approach for the mitigation of the airline cargo cancellation problem. J. Inf. Secur. Appl. 51: 102462 (2020) - [c69]Lara Mauri, Ernesto Damiani, Stelvio Cimato:
Be Your Neighbor's Miner: Building Trust in Ledger Content via Reciprocally Useful Work. CLOUD 2020: 53-62 - [c66]Lara Mauri, Stelvio Cimato, Ernesto Damiani:
Untangling the XRP Ledger: Insights and Analysis. ICISSP (Revised Selected Papers) 2020: 48-72 - [c65]Lara Mauri, Stelvio Cimato, Ernesto Damiani:
A Formal Approach for the Analysis of the XRP Ledger Consensus Protocol. ICISSP 2020: 52-63 - [c64]Chiara Braghin, Stelvio Cimato, Ernesto Damiani, Fulvio Frati, Elvinia Riccobene, Sadegh Astaneh:
Towards the Monitoring and Evaluation of Trainees' Activities in Cyber Ranges. MSTEC 2020: 79-91 - 2019
- [c63]Chiara Braghin, Stelvio Cimato, Simone Raimondi Cominesi, Ernesto Damiani, Lara Mauri:
Towards Blockchain-Based E-Voting Systems. BIS (Workshops) 2019: 274-286 - [c62]Chiara Braghin, Stelvio Cimato, Ernesto Damiani, Fulvio Frati, Lara Mauri, Elvinia Riccobene:
A Model Driven Approach for Cyber Security Scenarios Deployment. IOSec/MSTEC/FINSEC@ESORICS 2019: 107-122 - [c61]Stelvio Cimato, Valentina Ciriani, Ernesto Damiani, Maryam Ehsanpour:
An OBDD-Based Technique for the Efficient Synthesis of Garbled Circuits. STM 2019: 158-167 - 2018
- [c60]Perpetus Jacques Houngbo, Joël T. Hounsou, Ernesto Damiani, Rasool Asal, Stelvio Cimato, Fulvio Frati, Chan Yeob Yeun:
Embedding a Digital Wallet to Pay-with-a-Selfie, from Functional Requirements to Prototype. AFRICATEK 2018: 47-56 - [c59]Perpetus Jacques Houngbo, Joël T. Hounsou, Ernesto Damiani, Rasool Asal, Stelvio Cimato, Fulvio Frati, Chan Yeob Yeun:
Embedding a Digital Wallet to Pay-with-a-Selfie, Defining the System Architecture as Blockchain Based. AFRICATEK 2018: 109-124 - [c58]Stelvio Cimato, Ernesto Damiani:
Some Ideas on Privacy-Aware Data Analytics in the Internet-of-Everything. From Database to Cyber Security 2018: 113-124 - [c55]Lara Mauri, Stelvio Cimato, Ernesto Damiani:
A Comparative Analysis of Current Cryptocurrencies. ICISSP 2018: 127-138 - 2017
- [c53]Ernesto Damiani, Perpetus Jacques Houngbo, Joël T. Hounsou, Rasool Asal, Stelvio Cimato, Fulvio Frati, Dina Shehada, Chan Yeob Yeun:
Porting the Pay with a (Group) Selfie (PGS) Payment System to Crypto Currency. AFRICATEK 2017: 159-168 - [c52]Maryam Sepehri, Stelvio Cimato, Ernesto Damiani:
Efficient Implementation of a Proxy-based Protocol for Data Sharing on the Cloud. SCC@AsiaCCS 2017: 67-74 - [c50]Maryam Ehsanpour, Stelvio Cimato, Valentina Ciriani, Ernesto Damiani:
Exploiting Quantum Gates in Secure Computation. DSD 2017: 291-294 - [c49]Stelvio Cimato, Valentina Ciriani, Ernesto Damiani, Maryam Ehsanpour:
A multiple valued logic approach for the synthesis of garbled circuits. VLSI-SoC 2017: 1-5 - [i3]Ernesto Damiani, Perpetus Jacques Houngbo, Rasool Asal, Stelvio Cimato, Fulvio Frati, Joël T. Hounsou, Dina Shehada, Chan Yeob Yeun:
Pay-with-a-Selfie, a human-centred digital payment system. CoRR abs/1706.07187 (2017) - 2016
- [c47]Stelvio Cimato, Ernesto Damiani, Silvia Mella, Ching-Nung Yang:
Key Recovery in Public Clouds: A Survey on Cross-VM Side Channel Attacks. ICCCS (1) 2016: 456-467 - [p1]Valerio Bellandi, Stelvio Cimato, Ernesto Damiani, Gabriele Gianini:
Possibilistic Assessment of Process-Related Disclosure Risks on the Cloud. Computational Intelligence and Quantitative Software Engineering 2016: 173-207 - 2015
- [j19]Maryam Sepehri, Stelvio Cimato, Ernesto Damiani:
Privacy-Preserving Query Processing by Multi-Party Computation. Comput. J. 58(10): 2195-2212 (2015) - [j18]Valerio Bellandi, Stelvio Cimato, Ernesto Damiani, Gabriele Gianini, Antonio Zilli:
Toward Economic-Aware Risk Assessment on the Cloud. IEEE Secur. Priv. 13(6): 30-37 (2015) - [j17]Mohammad Ali Hadavi, Rasool Jalili, Ernesto Damiani, Stelvio Cimato:
Security and searchability in secret sharing-based data outsourcing. Int. J. Inf. Sec. 14(6): 513-529 (2015) - [c45]Stelvio Cimato, Ernesto Damiani, Fulvio Frati, Joël T. Hounsou, Judicaël Tandjiékpon:
Paying with a Selfie: A Hybrid Micro-payment Framework Based on Visual Cryptography. AFRICOMM 2015: 136-141 - [c40]Maryam Sepehri, Stelvio Cimato, Ernesto Damiani, Chan Yeob Yeun:
Data Sharing on the Cloud: A Scalable Proxy-Based Protocol for Privacy-Preserving Queries. TrustCom/BigDataSE/ISPA (1) 2015: 1357-1362 - 2014
- [j16]Ernesto Damiani, Stelvio Cimato, Gabriele Gianini:
A risk model for cloud processes. ISC Int. J. Inf. Secur. 6(2): 99-123 (2014) - 2013
- [j14]Sedigheh Abbasi, Stelvio Cimato, Ernesto Damiani:
Clustering Models in Secure Clustered Multiparty Computation. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(2): 63-76 (2013) - [c39]Maryam Sepehri, Stelvio Cimato, Ernesto Damiani:
A Scalable Multi-Party Protocol for Privacy-Preserving Equality Test. CAiSE Workshops 2013: 466-477 - [c38]Sedigheh Abbasi, Stelvio Cimato, Ernesto Damiani:
Toward Secure Clustered Multi-Party Computation: A Privacy-Preserving Clustering Protocol. ICT-EurAsia 2013: 447-452 - [c36]Maryam Sepehri, Stelvio Cimato, Ernesto Damiani:
A Multi-Party Protocol for Privacy-Preserving Range Queries. Secure Data Management 2013: 108-120 - [c35]Stelvio Cimato, Ernesto Damiani, Francesco Zavatarelli, Renato Menicocci:
Towards the Certification of Cloud Services. SERVICES 2013: 92-97 - 2012
- [c34]Stelvio Cimato, Ernesto Damiani, Gabriele Gianini:
Risk assessment of credit securities: The notion and the issues. DEST 2012: 1-5 - [c33]Mohammad Ali Hadavi, Ernesto Damiani, Rasool Jalili, Stelvio Cimato, Zeinab Ganjei:
AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing. DPM/SETOP 2012: 201-216 - 2011
- [j13]Florian Kerschbaum, Axel Schröpfer, Antonio Zilli, Richard Pibernik, Octavian Catrina, Sebastiaan de Hoogh, Berry Schoenmakers, Stelvio Cimato, Ernesto Damiani:
Secure Collaborative Supply-Chain Management. Computer 44(9): 38-43 (2011) - 2010
- [c29]Nadia Bennani, Ernesto Damiani, Stelvio Cimato:
Toward Cloud-Based Key Management for Outsourced Databases. COMPSAC Workshops 2010: 232-236 - [c28]Marco Anisetti, Ernesto Damiani, Fulvio Frati, Stelvio Cimato, Gabriele Gianini:
Using incentive schemes to alleviate supply chain risks. MEDES 2010: 221-228 - 2009
- [c24]Stelvio Cimato, Ernesto Damiani, Gabriele Gianini:
Privacy Preserving Risk Assessment of Credit Securities. SITIS 2009: 506-513
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-03 22:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint